Sciweavers

1556 search results - page 16 / 312
» Information Envelope and its Information Integrity Implicati...
Sort
View
COMPSAC
2009
IEEE
14 years 2 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
INFOSECCD
2006
ACM
14 years 1 months ago
Campus-wide spyware and virus removal as a method of teaching information security
As Armstrong Atlantic State University prepares to enter the wireless world during the 2006-07 academic year, it is important that those connecting to the university’s network u...
Frank H. Katz
PERCOM
2007
ACM
14 years 7 months ago
Dual Ownership: Access Management for Shared Item Information in RFID-enabled Supply Chains
RFID tags combined with globally unique numbering schemes such as the Electronic Product Code (EPC) help standardizing the communication along the supply chain. Participants gener...
Alexander Ilic, Florian Michahelles, Elgar Fleisch
IANDO
2010
112views more  IANDO 2010»
13 years 2 months ago
Generative mechanisms for innovation in information infrastructures
This paper investigates how innovation of ICT based services takes place within existing infrastructures, including the whole network of technology, vendors and customers. Our res...
Bendik Bygstad
HICSS
2008
IEEE
127views Biometrics» more  HICSS 2008»
14 years 2 months ago
Beyond Cognitions: A Call for Greater Consideration of Emotion in Information Systems Decision Theories
Emotion has been identified as a salient dimension of organizational life and this has led to the emergence of a growing body of literature that suggests its importance to a wide ...
Brent Furneaux, Dorit Nevo