Sciweavers

1407 search results - page 227 / 282
» Systems Theory Model for Information Security
Sort
View
WWW
2003
ACM
14 years 10 months ago
From Individuals to the Global Community: the Hidden Contradiction of the Cultural History of Classification and the latest brow
We would like to show that the collective production of knowledge and the individual creation of its organizational casting mould, which is therefore incapable of following the gr...
László Z. Karvalics
VISUAL
2005
Springer
14 years 2 months ago
Wayfinding Choreme Maps
This contribution details how conceptual characterizations of route knowledge can provide the basis for graphical route information in a cognitively adequate way. The approach is b...
Alexander Klippel, Kai-Florian Richter, Stefan Han...
DB
2011
12 years 9 months ago
Open source software adoption: motivations of adopters and amotivations of non-adopters
Adoption of an information system could be reflected in two ways: through the adoption intentions of the non-adopters and the extent of adoption for the adopters. This study seeks...
Yan Li, Chuan-Hoo Tan, Heng Xu, Hock-Hai Teo
KESAMSTA
2009
Springer
14 years 1 months ago
Structural Changes in an Email-Based Social Network
ent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory Chung-Ming Ou, C.R. Ou Ants-like Agents: a Model and Analysis Based on Natural Ants Be...
Krzysztof Juszczyszyn, Katarzyna Musial
CSCW
2010
ACM
14 years 2 months ago
Sending mixed signals: multilevel reputation effects in peer-to-peer lending markets
Online peer-to-peer (P2P) lending organizations enable an individual to obtain an unsecured loan from a collection of individuals without the participation of a bank. Previous res...
Benjamin C. Collier, Robert Hampshire