Sciweavers

2028 search results - page 306 / 406
» Deriving Relation Keys from XML Keys
Sort
View
CSREASAM
2006
15 years 5 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
ECIS
2004
15 years 5 months ago
The overconfidence effect and IT professionals
Information Technology has become a core activity in most, if not all, corporations. Although IT managers continue to be under-represented in executive management, the very centra...
Glen L. Van der Vyver
IADIS
2004
15 years 5 months ago
Electronic case studies: a problem-based learning approach
E-Cases is an innovative approach to management development. Traditional case studies typically describe a decision or a problem in a real-life setting. E-Cases encourage students...
Philip M. Drinkwater, Christopher P. Holland, K. N...
ISSA
2004
15 years 5 months ago
Intrinsic Legal Issues In It Security
E-commerce is a rapidly expanding sector all over the world. While this is apparently good news to the world's consumers and business companies, it is creating big challenges...
Respickius Casmir
ECIS
2003
15 years 5 months ago
An exploratory case study on IS implementation and organizational change in China
Owing to the turbulent and fast changing environment in which Chinese firms operate, Information Systems (IS) implementation triggers important organizational changes in these fir...
Huixian Li, John Lim, K. S. Raman