Sciweavers

56 search results - page 8 / 12
» Corporate Policies for Electronic Commerce
Sort
View
JAMIA
2011
94views more  JAMIA 2011»
13 years 3 months ago
Challenges in ethics, safety, best practices, and oversight regarding HIT vendors, their customers, and patients: a report of an
The current commercial health information technology (HIT) arena encompasses a number of competing firms that provide electronic health applications to hospitals, clinical practi...
Kenneth W. Goodman, Eta S. Berner, Mark A. Dente, ...
ECIS
2004
13 years 10 months ago
A conceptual framework of e-fraud control in an integrated supply chain
The integration of supply chains offers many benefits; yet, it may also render organisations more vulnerable to electronic fraud (e-fraud). E-fraud can drain on organisations'...
Lucian Vasiu
HICSS
2005
IEEE
103views Biometrics» more  HICSS 2005»
14 years 2 months ago
Legal and Ethical Implications of Employee Location Monitoring
Location technologies allow employers to monitor the location of employees. The technologies range from global positioning systems able to determine outdoor locations worldwide to...
Gundars Kaupins, Robert P. Minch
WWW
2003
ACM
14 years 9 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski
WWW
2008
ACM
14 years 9 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth