Sciweavers

519 search results - page 27 / 104
» Enhancing information systems security in an academic organi...
Sort
View
IHI
2012
353views Healthcare» more  IHI 2012»
12 years 3 months ago
Enhancing accountability of electronic health record usage via patient-centric monitoring
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and effi...
Daisuke Mashima, Mustaque Ahamad
KES
2005
Springer
14 years 1 months ago
A Network Service Access Control Framework Based on Network Blocking Algorithm
Abstract. Currently, the major focus on the network security is securing individual components as well as preventing unauthorized access to network service. In this paper, we propo...
Jahwan Koo, Seong-Jin Ahn
ICPR
2008
IEEE
14 years 2 months ago
Enhanced speaker recognition based on intra-modal fusion and accent modeling
Speaker recognition systems, even though they have been around for four decades, have not been widely considered as standalone systems for biometric security because of their unac...
Srikanth Mangayyagari, Tanmoy Islam, Ravi Sankar
WSC
2007
13 years 10 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
HICSS
2007
IEEE
85views Biometrics» more  HICSS 2007»
14 years 2 months ago
Neither Here nor There: Knowledge Sharing and Transfer with Proactive Structuration
Information technologies hold great promise in their ability to link distributed workers, allowing organizations to take advantage of the potential benefits of effectively gatheri...
Terri L. Griffith, Mark A. Fuller, Gregory B. Nort...