Sciweavers

1422 search results - page 84 / 285
» Information security and risk management
Sort
View
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
14 years 3 months ago
Electronic Voting: Algorithmic and Implementation Issues
Electronic Transactions over the Internet, particularly using the World Wide Web have become an integral part of economic life. Recently also the public sector has started to use ...
Robert Kofler, Robert Krimmer, Alexander Prosser
CCS
2008
ACM
14 years 1 days ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
ELPUB
1999
ACM
14 years 2 months ago
Learning Curves: Managing Smooth Product Development Cycles in Non-Print Environments
and abstract entry. But since the burgeoning of the scholarly literature since World War II, these processes had become well-known and expertly done by most organizations in the pu...
Jill O'Neill, Chris Leonard
AOSD
2010
ACM
14 years 3 months ago
A permission system for secure AOP
The integration of third-party aspects into applications creates security challenges. Due to the intrusive impact of aspects, one cannot guarantee that the dynamic composition of ...
Wouter De Borger, Bart De Win, Bert Lagaisse, Wout...
HICSS
2008
IEEE
161views Biometrics» more  HICSS 2008»
14 years 4 months ago
A Methodological Proposal to Assess the Feasibility of ERP Systems Implementation Strategies
Continuous failures in ERP systems implementation project are today the main challenge in the feasibility of integrated information systems. Failure can be determined by different...
Guido Capaldo, Pierluigi Rippa