Sciweavers

1422 search results - page 51 / 285
» Information security and risk management
Sort
View
HICSS
2006
IEEE
110views Biometrics» more  HICSS 2006»
14 years 2 months ago
Risk Factors in Distributed Projects
In this manuscript we develop a conceptual understanding of how key risk factors associated with Information Technology development projects are magnified or multiplied when deali...
James M. Erickson, Roberto Evaristo
WSC
2008
13 years 11 months ago
Application of spatial visualization for probabilistic hurricanes risk assessment to build environment
Hurricanes have caused extensive economic losses and social disruption in the past two decades in the United States. A key component for improving building and infrastructure prac...
Yue Li, Tyler A. Erickson
ESIAT
2009
IEEE
13 years 6 months ago
A Novel Application of Variable Fuzzy Set on Alarming of Coalmine Gas
Coalmine gas disaster is one of the severe natural disasters that restrict the safety production of coalmines. Timely monitoring and alarming of coalmine gas is an important part o...
Jinhui Zhao, Mingliang Li, Xu Qian, Lijuan Jia
CHI
2008
ACM
14 years 9 months ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...
IPCCC
2006
IEEE
14 years 2 months ago
Enabling mobility in enterprise security management
The increasing demand for and the wide adoption of mobile technologies have been witnessed in enterprise information technology (IT) environments in recent years. However, there e...
William Claycomb, Dongwan Shin