找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Systems, Software and Services Process Improvement; 26th European Confer Alastair Walker,Rory V. O‘Connor,Richard Messnarz Conference proce

[复制链接]
楼主: Flexibility
发表于 2025-3-26 21:52:24 | 显示全部楼层
Conference proceedings 2019isation of Industry, Infrastructure and E-Mobility. -Best Practices in Implementing Traceability. -Good and Bad Practices in Improvement. -Functional Safety and Cybersecurity. -Experiences with Agile and Lean. -Standards and Assessment Models. -Team Skills and Diversity Strategies. -Recent Innovations..
发表于 2025-3-27 02:09:35 | 显示全部楼层
发表于 2025-3-27 05:30:16 | 显示全部楼层
Shifting Paradigms in Innovation Management – Organic Growth Strategies in the CloudCan we under these circumstances still use the typical innovation strategies or do we need new paradigms for generating innovation and managing innovation? This paper will deal with new patterns and concepts that will substitute the previous patterns and concepts promoted by the innovation manager job role from ECQA.
发表于 2025-3-27 10:34:49 | 显示全部楼层
Assessing Personality Traits in a Large Scale Software Development Company: Exploratory Industrial Clts indicate that higher introversion is observed most commonly in isolated teams that has less contact with customers. Moreover, high levels of agreeableness and conscientiousness personality traits are observed in most of the agile software development teams.
发表于 2025-3-27 16:55:28 | 显示全部楼层
发表于 2025-3-27 18:51:45 | 显示全部楼层
RISKEE: A Risk-Tree Based Method for Assessing Risk in Cyber Securitylo simulation, and propagating the resulting risk backward again. The method can be applied throughout all development phases and even be refined at runtime of a system. It involves system analysts, cyber security experts as well as domain experts for judgement of the attack frequencies, system vulnerabilities, and loss magnitudes.
发表于 2025-3-28 00:12:20 | 显示全部楼层
Designing a Data Protection Process Assessment Model Based on the GDPRhe GDPR, to identification of rights and obligations for eliciting processes and describing their main components (purpose and outcomes). The support of additional document sources enabled to formulate process assessment indicators.
发表于 2025-3-28 05:22:27 | 显示全部楼层
Designing and Integrating IEC 62443 Compliant Threat Analysisfor the development process of the industrial control systems manufacturer Phoenix Contact. Phoenix Contact was successfully certified for its compliance with IEC 62443. We illustrate the requirements of the standard, the resulting threat analysis process, and its tight integration into the existing development process and its tools.
发表于 2025-3-28 08:19:30 | 显示全部楼层
Extending the Shell Model via Cause/Consequence Analysis of Component Failuresd and guided way. The identified deviations can be apportioned to the different components within the system, thus defining specific top-level requirements upon them. These requirements should be forwarded to the component suppliers, to enhance system quality and safety.
发表于 2025-3-28 13:35:08 | 显示全部楼层
Maturity in IT Service Management: A Longitudinal Studylties faced during the implementation and maintenance of the improvement program. The study was based on a survey conducted on the officially assessed companies. The results point to significant improvements in productivity, quality of service, the organization’s image, and profitability.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-25 05:45
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表