Sciweavers

519 search results - page 20 / 104
» Enhancing information systems security in an academic organi...
Sort
View
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
14 years 2 months ago
Information Security: User Precautions, Attacker Efforts, and Enforcement
We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
Ivan P. L. Png, Qiu-Hong Wang
HICSS
2008
IEEE
237views Biometrics» more  HICSS 2008»
14 years 2 months ago
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
14 years 2 months ago
The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
Qing Hu, Paul Hart, Donna Cooke
JSW
2008
116views more  JSW 2008»
13 years 8 months ago
A Task-oriented Approach to Search Engine Usability Studies
Usability is a multi-dimensional characteristic of a computer system. This paper focuses on usability as a measurement of interaction between the user and the system. The research ...
Isak Taksa, Amanda Spink, Robert Goldberg
IIWAS
2007
13 years 9 months ago
Security aspects in Semantic Web Services Filtering
Security and trust aspects, perceived as difficult to quantify, have been neglected in various service interactions. However, factors related to security and trust are in fact cru...
Witold Abramowicz, Andreas Ekelhart, Stefan Fenz, ...