Sciweavers

4419 search results - page 187 / 884
» Information Science in Transition
Sort
View
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
15 years 11 months ago
Information Security: User Precautions, Attacker Efforts, and Enforcement
We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
Ivan P. L. Png, Qiu-Hong Wang
HICSS
2007
IEEE
115views Biometrics» more  HICSS 2007»
15 years 10 months ago
Information losses within the collaborative integration of different process models - BPML as an XML-based interchange format fo
During the last decades market competition created various constellations of collaborative integration between enterprises: integration of parts of the value chain or integration ...
Johannsen Florian, Susanne Leist, Gregor Zellner
HICSS
2007
IEEE
170views Biometrics» more  HICSS 2007»
15 years 10 months ago
Articulation Work Supporting Information Infrastructure Design: Coordination, Categorization, and Assessment in Practice
Articulation work is a critical factor in information infrastructure building projects that involve multiple and diverse communities. It brings awareness of language differences, ...
Karen S. Baker, Florence Millerand
AUIC
2006
IEEE
15 years 10 months ago
Virtual planning rooms (ViPR): a 3D visualisation environment for hierarchical information
The Future Operations Centre Analysis Laboratory (FOCAL) at Australia’s Defence Science and Technology Organisation (DSTO) is aimed at exploring new paradigms for situation awar...
Michael Broughton
HICSS
2006
IEEE
111views Biometrics» more  HICSS 2006»
15 years 10 months ago
Fundamental Ethics in Information Systems
Information systems often present virtual spaces that are sufficient to enable important human interaction. By enabling such interaction, systems designers are inherently creating...
Christopher N. Chapman