Sciweavers

59 search results - page 5 / 12
» A Study on the Convergence of FingerHashing and a Secured Bi...
Sort
View
HICSS
2007
IEEE
99views Biometrics» more  HICSS 2007»
14 years 1 months ago
Delta Hedging Energy Portfolios: an Exploratory Study
1 Delta hedging, although widely used in commodity markets, needs to be further adapted to electricity markets. Given the extreme volatility of electricity prices, even a portfolio...
Richard Goldberg, James Read, Art Altman, Remi Aud...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 1 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
14 years 1 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood
HICSS
2006
IEEE
123views Biometrics» more  HICSS 2006»
14 years 1 months ago
Reexamining Media Capacity Theories Using Workplace Instant Messaging
This study empirically examines the general propositions of media capacity theories using a newer and increasing popular communication medium: Instant Messaging. We developed hypo...
Yu-Ting Caisy Hung, Wei-Chang Kong, Ai-Ling Chua, ...
HICSS
2003
IEEE
102views Biometrics» more  HICSS 2003»
14 years 27 days ago
Public Attitudes towards a National Identity "Smart Card: " Privacy and Security Concerns
Tracking technologies use pervasive information systems to scan and record the location of individuals and to transfer information about them to and from a central database. One p...
Starr Roxanne Hiltz, Hyo-Joo Han, Vladimir Brille