Sciweavers

404 search results - page 69 / 81
» An Introduction to Evaluating Biometric Systems
Sort
View
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
14 years 2 months ago
Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course
The content of information security curricula spans a wide array of topics. Because of this variety, a program needs to focus on some particular aspect and provide appropriate dep...
Art Conklin
HICSS
2006
IEEE
92views Biometrics» more  HICSS 2006»
14 years 2 months ago
An Integrative Framework for Contextual Factors Affecting IT Implementation
While previous research has provided a great deal of information on individual factors that play a role in IT implementation success, a gap in the research exists when it comes to...
Barbara Edington, Namchul Shin
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
14 years 2 months ago
Mobile RFID - A Case from Volvo on Innovation in SCM
Utilization of Radio Frequency Identification (RFID) is often presented as improving supply chain management even though there are still few in-depth studies that support the hype...
Magnus Holmqvist, Gunnar Stefansson
HICSS
2006
IEEE
169views Biometrics» more  HICSS 2006»
14 years 2 months ago
Bridging the Digital Divide: Feasibility of Training Community Health Advisors to Use the Internet for Health Outreach
We assessed the feasibility of “bridging the digital divide” by training community health advisors (CHAs) from low-income communities to use high-quality Internet-based health...
Thomas K. Houston, Kimberly Robinson, Eta Berner, ...
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
14 years 2 months ago
A Preliminary Model for Generating Experience Knowledge Based Artifacts
Inspections provide an effective way of acquiring and reusing experience knowledge. Several details, in both the inspection processes and the inspection event itself, can be found...
Jouni Kokkoniemi