Sciweavers

1776 search results - page 51 / 356
» Informational cascades in IT adoption
Sort
View
ECIS
2000
13 years 11 months ago
Authentic Intervention in Information Systems Practice
In this paper the philosophical concept of authenticity is used as a framing device for providing an interpretation of aspects of both ethical and practical action on the part of i...
Robert A. Stephens, Stephen K. Probert
IR
2000
13 years 9 months ago
A Task-Oriented Non-Interactive Evaluation Methodology for Information Retrieval Systems
Past research has identified many different types of relevance in information retrieval (IR). So far, however, most evaluation of IR systems has been through batch experiments cond...
Jane Reid
VLDB
2005
ACM
113views Database» more  VLDB 2005»
14 years 10 months ago
Mediators over taxonomy-based information sources
Abstract. We propose a mediator model for providing integrated and unified access to multiple taxonomy-based sources. Each source comprises a taxonomy and a database that indexes o...
Yannis Tzitzikas, Nicolas Spyratos, Panos Constant...
CSFW
2002
IEEE
14 years 2 months ago
Information Flow Security in Dynamic Contexts
We study a security property for processes in dynamic contexts, i.e., contexts that can be reconfigured at runtime. The security property that we propose in this paper, named Per...
Riccardo Focardi, Sabina Rossi
CACM
2010
162views more  CACM 2010»
13 years 10 months ago
Understanding the dynamics of information management costs
As data volumes rise and retention periods increase, the appearance of "better, faster and cheaper" storage infrastructure seems like an all-encompassing solution to con...
Paul P. Tallon