Sciweavers

4419 search results - page 184 / 884
» Information Science in Transition
Sort
View
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
15 years 10 months ago
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
Abstract: We adapt the event study methodology from research in financial economics to study the impact of government enforcement and economic opportunities on information security...
Ivan P. L. Png, Chen-Yu Wang, Qiu-Hong Wang
IEEEARES
2008
IEEE
15 years 10 months ago
Intensive Programme on Information and Communication Security
IT Security is a problem that can only be addressed and taught holistically. Just as broad as the field of ICT itself, IT Security is an integral part of all network and software ...
Christian Schläger, Ludwig Fuchs, Günthe...
ICTAI
2007
IEEE
15 years 10 months ago
A Music Information Retrieval Approach Based on Power Laws
We present a music information retrieval approach based on power laws. Research in cognitive science and neuroscience reveals connections between power laws, human cognition, and ...
Patrick Roos, Bill Z. Manaris
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
15 years 10 months ago
Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course
The content of information security curricula spans a wide array of topics. Because of this variety, a program needs to focus on some particular aspect and provide appropriate dep...
Art Conklin
HICSS
2006
IEEE
105views Biometrics» more  HICSS 2006»
15 years 10 months ago
Unified Information Models in Support of Location Transparency for Future Utility Applications
For future scenarios of power system operations, like the self healing grid vision, system and communications architecture are key. Applications will require unlimited access to a...
Otto Preiss, Tatjana Kostic