Sciweavers

200 search results - page 5 / 40
» Positivist single case study research in information systems...
Sort
View
CODES
2007
IEEE
14 years 1 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...
ECIS
2003
13 years 9 months ago
An exploratory case study on IS implementation and organizational change in China
Owing to the turbulent and fast changing environment in which Chinese firms operate, Information Systems (IS) implementation triggers important organizational changes in these fir...
Huixian Li, John Lim, K. S. Raman
HICSS
2008
IEEE
146views Biometrics» more  HICSS 2008»
14 years 2 months ago
Toward a Generic Model of Security in an Organizational Context: Exploring Insider Threats to Information Infrastructure
This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical in...
Ignacio J. Martinez-Moyano, Michael E. Samsa, Jame...
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
14 years 26 days ago
The Illusion of Effective Management Information: A Critical Perspective
The availability of effective management information is essential when coping with today’s complexity and dynamism, both within and around organizations. Information technology ...
Fred A. B. Lohman, Henk G. Sol, Gert-Jan de Vreede
HASE
1998
IEEE
13 years 11 months ago
Formal Specification in Collaborative Design of Critical Software Tools
Engineers use software tools to analyze designs for critical systems. Because important decisions are based on tool results, tools must provide valid modeling constructs; engineer...
David Coppit, Kevin J. Sullivan