Sciweavers

61 search results - page 5 / 13
» Authentic Intervention in Information Systems Practice
Sort
View
KES
2007
Springer
14 years 1 months ago
An Open Source Java Framework for Biometric Web Authentication Based on BioAPI
One of the major early problems that biometrics faced was the lack of interoperability between different software applications and devices developed by different vendors. The Bio...
Elisardo González-Agulla, Enrique Otero Mur...
IWCMC
2009
ACM
14 years 2 months ago
WMNSec: security for wireless mesh networks
Wireless Mesh Networks (WMNs) are gaining popularity as a flexible and inexpensive replacement for Ethernet-based infrastructure. However, WMN security has not been covered adequ...
Georg Lukas, Christian Fackroth
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
14 years 2 months ago
Quantifying IT Value Latency: The Case of the Financial Services Industry
Both the academia and practice recognize that information technology (IT) investments may not yield immediate benefits. Nevertheless, there has been a lack of methodological devel...
Kim Huat Goh, Robert J. Kauffman
CONTEXT
2007
Springer
14 years 1 months ago
Multiuser Intelligent M-learning Environment
In this article we present the architecture of an m-learning (mobile-learning) environment using Bluetooth as communications technology. We also describe its practical implementati...
Angel Moreno, Melquiades Carbajo, Bonifacio Casta&...
CHI
2008
ACM
13 years 8 months ago
Secrets and lies in computer-mediated interaction: theory, methods and design
The keeping of secrets and practicing of deception are commonplace in everyday social interaction. They also serve an important role in encouraging social cohesion. However, for H...
Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs