Sciweavers

3193 search results - page 42 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
WSC
1998
13 years 9 months ago
Evaluation of Electronic Cash Threat Scenarios Using Micro Dynamic Simulation
This paper discusses the evaluation of the electronic cash counterfeit threat scenarios using micro dynamic simulation. This modeling technique provides information needed for the...
Kazuo J. Ezawa, Gregory Napiorkowski, Mariusz Koss...
SOUPS
2006
ACM
14 years 1 months ago
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
Previous research has found graphical passwords to be more memorable than non-dictionary or “strong” alphanumeric passwords. Participants in a prior study expressed concerns t...
Furkan Tari, A. Ant Ozok, Stephen H. Holden
HICSS
2008
IEEE
114views Biometrics» more  HICSS 2008»
14 years 2 months ago
The Factors that Affect the Implementation Success of IS
How to implement an IS (information system) successfully remains a problem. To address this, drawing on information processing theory, this study proposes an integrated model that...
Shih-Wei Chou, Mong-Young He, Pi-Yi Chen
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
13 years 12 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
RE
2001
Springer
14 years 4 days ago
Evolving Beyond Requirements Creep: A Risk-Based Evolutionary Prototyping Model
Evolutionary prototyping focuses on gathering a correct and consistent set of requirements. The process lends particular strength to building quality software by means of the ongo...
Ryan A. Carter, Annie I. Antón, Laurie A. W...