Sciweavers

536 search results - page 6 / 108
» Embedding Information Security into the Organization
Sort
View
CIKM
2009
Springer
14 years 1 months ago
Beyond hyperlinks: organizing information footprints in search logs to support effective browsing
While current search engines serve known-item search such as homepage finding very well, they generally cannot support exploratory search effectively. In exploratory search, user...
Xuanhui Wang, Bin Tan, Azadeh Shakery, ChengXiang ...
BMCBI
2005
94views more  BMCBI 2005»
13 years 7 months ago
T.I.M.S: TaqMan Information Management System, tools to organize data flow in a genotyping laboratory
Background: Single Nucleotide Polymorphism (SNP) genotyping is a major activity in biomedical research. The Taqman technology is one of the most commonly used approaches. It produ...
Stéphanie Monnier, David G. Cox, Tim Albion...
HICSS
2008
IEEE
146views Biometrics» more  HICSS 2008»
14 years 1 months ago
Toward a Generic Model of Security in an Organizational Context: Exploring Insider Threats to Information Infrastructure
This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical in...
Ignacio J. Martinez-Moyano, Michael E. Samsa, Jame...
ISI
2008
Springer
13 years 5 months ago
Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime
We discuss how methods from social network analysis could be combined with methodologies from database mediator technology and information fusion in order to give police and other ...
Luigi Ferrara, Christian Mårtenson, Pontus S...
NDSS
1997
IEEE
13 years 11 months ago
Hierarchical Organization of Certification Authorities for Secure Environments
This paper presents a model of hierarchical organization of Certification Authorities which can be applied to any open system network. In order to study the feasibility of the pro...
Lourdes López Santidrián, Justo Carr...