Sciweavers

519 search results - page 36 / 104
» Enhancing information systems security in an academic organi...
Sort
View
HICSS
2006
IEEE
261views Biometrics» more  HICSS 2006»
14 years 2 months ago
e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks
: e-business organizations are heavily dependent on distributed 24X7 robust information computing systems, for their daily operations. To secure distributed online transactions, th...
Arunabha Mukhopadhyay, Samir Chatterjee, Debashis ...
OZCHI
2006
ACM
14 years 2 months ago
Beyond security: implications for the future of federated digital identity management systems
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...
OKCON
2011
39views more  OKCON 2011»
12 years 11 months ago
Paragogy
This paper describes a new theory of peer-to-peer learning and teaching that we call paragogy. Paragogy's principles were developed by adapting the Knowles's principles...
Joseph Corneli, Charles Jeffrey Danoff
IV
2008
IEEE
133views Visualization» more  IV 2008»
14 years 2 months ago
Mining Scholarly Semantic Networks from the Web
With the increased usage of the Web and its availability of data, various scholarly information is now available on the Web. Extraction, aggregation, and visualization of such inf...
Mizuki Oka, Yutaka Matsuo
JDCTA
2008
160views more  JDCTA 2008»
13 years 8 months ago
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...