Sciweavers

2270 search results - page 232 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
DASFAA
2009
IEEE
151views Database» more  DASFAA 2009»
15 years 11 months ago
The Challenge of Assuring Data Trustworthiness
Abstract. With the increased need of data sharing among multiple organizations, such as government organizations, financial corporations, medical hospitals and academic institution...
Elisa Bertino, Chenyun Dai, Murat Kantarcioglu
HICSS
2008
IEEE
109views Biometrics» more  HICSS 2008»
15 years 11 months ago
Understanding the Blog Service Switching in Hong Kong: An Empirical Investigation
Blogs have become an increasingly popular form of displaying online content for general Internet users. Attracting new bloggers and retaining existing bloggers are crucial to blog...
Kem Z. K. Zhang, Christy M. K. Cheung, Matthew K. ...
122
Voted
DATE
2006
IEEE
91views Hardware» more  DATE 2006»
15 years 10 months ago
How OEMs and suppliers can face the network integration challenges
Systems integration is a major challenge in many industries. Systematic analysis of the complex integration effects, especially with respect to timing and performance, significant...
Kai Richter, Rolf Ernst
HICSS
2003
IEEE
180views Biometrics» more  HICSS 2003»
15 years 10 months ago
Impact of Electronic Commerce Customer Relationship Management on Corporate Success - Results from an Empirical Investigation
In this contribution, we study companies engaging in B2C-E-Commerce and their ability to manage the relationship with their customers. We refer to this as companies’ ECCRM-capab...
Nils Madeja, Detlef Schoder
131
Voted
WETICE
1997
IEEE
15 years 8 months ago
Boundaries, Awareness and Interaction in Collaborative Virtual Environments
This paper is concerned with how collaborative virtual environments can be structured in order to enable greater scalability and yet maintain a richness of communication. Based on...
Chris Greenhalgh, Steve Benford