Sciweavers

1422 search results - page 225 / 285
» Information security and risk management
Sort
View
JITECH
2007
92views more  JITECH 2007»
13 years 8 months ago
Modernization of passenger reservation system: Indian Railways' dilemma
This teaching case discusses the challenges being faced by the technology managers at Indian Railways (IR) in the current scenario of a resurgent national economy coupled with inc...
Shirish C. Srivastava, Sharat S. Mathur, Thompson ...
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
14 years 3 months ago
Virtual Networks and Ethics: An Empirical Research in a Non-Governmental Organization
– This paper analyzes the opportunities offered by information and communication technologies (ICTs) and the related ethical issues they raise within the transparency practices of...
Antonino Vaccaro, Peter Madsen
CIDM
2009
IEEE
14 years 3 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
CISS
2008
IEEE
14 years 3 months ago
Optimizing redundancy using MDS codes and dynamic symbol allocation in mobile ad hoc networks
—We consider the design of a network in which packet transmissions between two nodes are to be guaranteed a certain probability of success. There are N independent paths between ...
Anna Kacewicz, Stephen B. Wicker
DELTA
2008
IEEE
14 years 3 months ago
AES-Based BIST: Self-Test, Test Pattern Generation and Signature Analysis
Re-using embedded resources for implementing builtin self test mechanisms allows test cost reduction. In this paper we demonstrate how to implement costefficient built-in self tes...
M. Doulcier, Marie-Lise Flottes, Bruno Rouzeyre