Sciweavers

376 search results - page 7 / 76
» Teaching context in information security
Sort
View
ISI
2008
Springer
13 years 8 months ago
Using "Cited by" Information to Find the Context of Research Papers
This paper proposes a novel method of analyzing data to find important information about the context of research papers. The proposed CCTVA (Collecting, Cleaning, Translating, Visu...
Chun-Hung Lu, Chih-Chien Wang, Min-Yuh Day, Chorng...
ECIS
2003
13 years 9 months ago
Development of a security methodology for cooperative information systems: the cooPSIS project
Since networks and computing systems are vital components of today's life, it is of utmost importance to endow them with the capability to survive physical and logical faults...
Mariagrazia Fugini, Mario Mezzanzanica
IJVR
2008
118views more  IJVR 2008»
13 years 8 months ago
Use of Technology Enhanced Education to Improve Teaching and Learning Process
The modern world continues to change as Information Technology (IT) related applications proceed to evolve at a rapid pace. The need for IT continues to grow as we begin to meaning...
Daniela Marghitu, Elizabeth Zylla-Jones, Santosh B...
HICSS
2008
IEEE
143views Biometrics» more  HICSS 2008»
14 years 2 months ago
Soft Innovation as Data-Driven Process Improvement Exploited via Integrated Hospital Information Systems
Soft innovations are regarded as insightful, useful ideas originating from stakeholders within the organization. This study takes a new approach to examining the origins of soft i...
Jim Ryan, Barbara Doster, Sandra Daily, Marty Hesl...
ACSAC
2002
IEEE
14 years 27 days ago
A Context-Aware Security Architecture for Emerging Applications
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...