Sciweavers

519 search results - page 13 / 104
» Enhancing information systems security in an academic organi...
Sort
View
CSREASAM
2010
13 years 6 months ago
A Security Measure Selection Scheme with Consideration of Potential Lawsuits
- Information breaches on ITC systems may result in lawsuits. Information security countermeasures such as firewalls, data encryption, and so on, are essential; protecting systems ...
Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshi...
VVEIS
2007
13 years 9 months ago
UML-driven Information Systems and their Formal Integration Validation and Distribution
Being the de-facto standard (object-oriented-OO) method(-logy) for software-intensive systems development, UML with its different diagrams and supporting tools represent nowadays t...
Nasreddine Aoumeur, Gunter Saake
EDOC
2005
IEEE
14 years 1 months ago
Assessment of Enterprise Information Security - The Importance of Prioritization
Assessing the level of information security in an enterprise is a serious challenge for many organizations. This paper considers the prioritization of the field of enterprise info...
Erik Johansson, Pontus Johnson
LREC
2010
151views Education» more  LREC 2010»
13 years 9 months ago
Modeling Wikipedia Articles to Enhance Encyclopedic Search
Reflecting the rapid growth of science, technology, and culture, it has become common practice to consult tools on the World Wide Web for various terms. Existing search engines pr...
Atsushi Fujii
DGO
2007
150views Education» more  DGO 2007»
13 years 9 months ago
Event-triggered data and knowledge sharing among collaborating government organizations
Solving complex global problems such as illegal immigration, border control, and terrorism requires government organizations at all levels to share not only data but, more importa...
Seema Degwekar, Jeff DePree, Howard W. Beck, Carla...