expunge 发表于 2025-3-26 21:52:24
Conference proceedings 2019isation of Industry, Infrastructure and E-Mobility. -Best Practices in Implementing Traceability. -Good and Bad Practices in Improvement. -Functional Safety and Cybersecurity. -Experiences with Agile and Lean. -Standards and Assessment Models. -Team Skills and Diversity Strategies. -Recent Innovations..同谋 发表于 2025-3-27 02:09:35
http://reply.papertrans.cn/89/8851/885010/885010_32.png斗争 发表于 2025-3-27 05:30:16
Shifting Paradigms in Innovation Management – Organic Growth Strategies in the CloudCan we under these circumstances still use the typical innovation strategies or do we need new paradigms for generating innovation and managing innovation? This paper will deal with new patterns and concepts that will substitute the previous patterns and concepts promoted by the innovation manager job role from ECQA.PACT 发表于 2025-3-27 10:34:49
Assessing Personality Traits in a Large Scale Software Development Company: Exploratory Industrial Clts indicate that higher introversion is observed most commonly in isolated teams that has less contact with customers. Moreover, high levels of agreeableness and conscientiousness personality traits are observed in most of the agile software development teams.cyanosis 发表于 2025-3-27 16:55:28
http://reply.papertrans.cn/89/8851/885010/885010_35.pngArroyo 发表于 2025-3-27 18:51:45
RISKEE: A Risk-Tree Based Method for Assessing Risk in Cyber Securitylo simulation, and propagating the resulting risk backward again. The method can be applied throughout all development phases and even be refined at runtime of a system. It involves system analysts, cyber security experts as well as domain experts for judgement of the attack frequencies, system vulnerabilities, and loss magnitudes.PALL 发表于 2025-3-28 00:12:20
Designing a Data Protection Process Assessment Model Based on the GDPRhe GDPR, to identification of rights and obligations for eliciting processes and describing their main components (purpose and outcomes). The support of additional document sources enabled to formulate process assessment indicators.CLEAR 发表于 2025-3-28 05:22:27
Designing and Integrating IEC 62443 Compliant Threat Analysisfor the development process of the industrial control systems manufacturer Phoenix Contact. Phoenix Contact was successfully certified for its compliance with IEC 62443. We illustrate the requirements of the standard, the resulting threat analysis process, and its tight integration into the existing development process and its tools.angina-pectoris 发表于 2025-3-28 08:19:30
Extending the Shell Model via Cause/Consequence Analysis of Component Failuresd and guided way. The identified deviations can be apportioned to the different components within the system, thus defining specific top-level requirements upon them. These requirements should be forwarded to the component suppliers, to enhance system quality and safety.curettage 发表于 2025-3-28 13:35:08
Maturity in IT Service Management: A Longitudinal Studylties faced during the implementation and maintenance of the improvement program. The study was based on a survey conducted on the officially assessed companies. The results point to significant improvements in productivity, quality of service, the organization’s image, and profitability.