2014
DOI: 10.1016/j.cose.2014.05.012
|View full text |Cite
|
Sign up to set email alerts
|

Complexity is dead, long live complexity! How software can help service providers manage security and compliance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 47 publications
0
3
0
Order By: Relevance
“…If a solution is still not found the case will be analyzed by experts who will likely resolve the issue and then update the knowledge base with additional troubleshooting steps [30]. Such IT support is inefficient and expensive to execute [10]. For example each service desk tier will re-evaluate the device status to achieve a "clean" starting point before administering additional troubleshooting steps.…”
Section: A Example 1: Automated Operational Supportmentioning
confidence: 98%
See 1 more Smart Citation
“…If a solution is still not found the case will be analyzed by experts who will likely resolve the issue and then update the knowledge base with additional troubleshooting steps [30]. Such IT support is inefficient and expensive to execute [10]. For example each service desk tier will re-evaluate the device status to achieve a "clean" starting point before administering additional troubleshooting steps.…”
Section: A Example 1: Automated Operational Supportmentioning
confidence: 98%
“…Also in the public administration cross-organizational business processes are very common for example to administer digital government services [4], [5], [6], [7], [8] and to exchange complex data [9]. However, the increasingly widespread distribution of business processes also creates new challenges such as [10] cloud auditing, management of service heterogeneity, coordination of involved parties, management of client-vendor relationships, localizing and migrating data, and coping with a significant lack of security awareness [11], [12]. One of most evident challenges is distributed process tracing and validation which directly affects cross-organizational security management [13], [14], [15].…”
Section: Introductionmentioning
confidence: 99%
“…In support of a thorough software, the author proposed [ 13 ] a robust architecture for security and compliance challenges. Furthermore, by establishing software requirements based on a study of work patterns of service providers acting in complex IT outsourcing agreements and proposing a software architecture that meets these requirements, this study contributes to filling the gap in software support.…”
Section: Introductionmentioning
confidence: 99%