Sciweavers

17456 search results - page 3469 / 3492
» Governing with information technologies
Sort
View
JTAER
2008
82views more  JTAER 2008»
13 years 9 months ago
The Use of Digital Watermarking for Intelligence Multimedia Document Distribution
Digital watermarking is a promising technology to embed information as unperceivable signals in digital contents. Various watermarking techniques have been proposed to protect cop...
Shing-Chi Cheung, Dickson K. W. Chiu, Cedric Ho
JUCS
2008
161views more  JUCS 2008»
13 years 9 months ago
A Model-Driven Approach to Align Business Processes with User Interfaces
: Information Technology (IT) has evolved over time from its traditional use as administrative support towards a more strategic role to enforce business processes (BP). But several...
Kênia Soares Sousa, Hildeberto Mendonç...
ECRA
2007
141views more  ECRA 2007»
13 years 9 months ago
A growth theory perspective on B2C e-commerce growth in Europe: An exploratory study
Information and communication technologies (ICTs) continue to have a profound effect on the economies and societies where they are used. In this article, we propose three related...
Shuchun Ho, Robert J. Kauffman, Ting-Peng Liang
SIGCSE
2008
ACM
171views Education» more  SIGCSE 2008»
13 years 9 months ago
Contributing student pedagogy
A Contributing Student Pedagogy (CSP) is a pedagogy that encourages students to contribute to the learning of others and to value the contributions of others. CSP in formal educat...
John Hamer, Quintin I. Cutts, Jana Jacková,...
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 9 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
« Prev « First page 3469 / 3492 Last » Next »