Sciweavers

1342 search results - page 203 / 269
» Managing Collaboration in the nanoManipulator
Sort
View
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 2 months ago
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...
SIGUCCS
2009
ACM
14 years 2 months ago
Getting iTunes U at Ithaca College up and running!
iTunes U is a free service from Apple that allows for the easy organization and distribution of content through iTunes. In the spring of 2008, Ithaca College signed a contract wit...
Beth M. Rugg
HICSS
2008
IEEE
91views Biometrics» more  HICSS 2008»
14 years 2 months ago
Governance Structures in Cross-Boundary Information Sharing: Lessons from State and Local Criminal Justice Initiatives
Governments are increasingly using collaborative, cross-boundary strategies to face complex social problems. Many of these cross-boundary initiatives have at their core the use, a...
Theresa A. Pardo, José Ramón Gil-Gar...
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
14 years 2 months ago
Service Oriented Architecture: Challenges for Business and Academia
Today, the means for attaining competitive advantage with information technology (IT) has shifted from efficiently managing the organization's operations to discovering ways ...
Amelia Maurizio, James Sager, Peter Jones, Gail Co...
ICSM
2007
IEEE
14 years 2 months ago
The Social Context of Software Maintenance
Software maintenance is a highly collaborative activity whose social context is rarely addressed. To explore this context, we conducted an ethnographic study at a large technology...
Jonathan Sillito, Eleanor Wynn