Sciweavers

669 search results - page 105 / 134
» Managing the Risk of IT Outsourcing
Sort
View
CTW
2002
74views more  CTW 2002»
13 years 8 months ago
Nine Steps to Move Forward from Error
: Following celebrated failures stakeholders begin to ask questions about how to improve the systems and processes they operate, manage or depend on. In this process it is easy to ...
David D. Woods, Richard I. Cook
CCS
2010
ACM
13 years 7 months ago
PriMa: an effective privacy protection mechanism for social networks
In this paper, we propose PriMa (Privacy Manager), a privacy protection mechanism which supports semi-automated generation of access rules for users’ profile information. PriMa...
Anna Cinzia Squicciarini, Federica Paci, Smitha Su...
DSS
2008
109views more  DSS 2008»
13 years 7 months ago
Organizational culture and leadership in ERP implementation
In response to the call for research to unlock the mystery of benefit realization in ERP adoption and theorize the important predictors' effect on ERP implementation, we cond...
Weiling Ke, Kwok Kee Wei
ICWSM
2010
13 years 7 months ago
Faceplant: Impression (Mis)management in Facebook Status Updates
While recent research examined the impressions projected by users of Social Network Sites through their relatively static online profiles, the addition of status updates to Facebo...
Vladimir Barash, Nicolas Ducheneaut, Ellen Isaacs,...
ICOST
2011
Springer
12 years 12 months ago
Fall Detection from Depth Map Video Sequences
Falls are one of the major risks for seniors living alone at home. Computer vision systems, which do not require to wear sensors, offer a new and promising solution for fall detec...
Caroline Rougier, Edouard Auvinet, Jacqueline Rous...