Sciweavers

749 search results - page 67 / 150
» The ethical nature of critical research in information syste...
Sort
View
NSPW
2006
ACM
14 years 1 months ago
Inconsistency in deception for defense
The use of deception is one of many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developin...
Vicentiu Neagoe, Matt Bishop
DEBS
2007
ACM
13 years 11 months ago
A taxonomy for denial of service attacks in content-based publish/subscribe systems
Denial of Service (DoS) attacks continue to affect the availability of critical systems on the Internet. The existing DoS problem is enough to merit significant research dedicated...
Alex Wun, Alex King Yeung Cheung, Hans-Arno Jacobs...
HICSS
2002
IEEE
154views Biometrics» more  HICSS 2002»
14 years 19 days ago
Designing Effective Incentive-Oriented Outsourcing Contracts for ERP Systems
Information systems outsourcing has been viewed as an attractive option by many senior managers generally because of the belief that IS outsourcing vendors can achieve economies o...
Kweku-Muata Bryson, William E. Sullivan
ECIS
2003
13 years 9 months ago
Politics in packaged software implementation
The academic literature relating to the political issues of information systems is fairly well established. However, there are relatively few empirical studies relating to the pol...
Christopher Bull
INFOSCALE
2007
ACM
13 years 9 months ago
Scalable problem localization for distributed systems: principles and practices
Problem localization is a critical part of providing crucial system management capabilities to modern distributed environments. One key open challenge is for problem localization ...
Rui Zhang, Bruno C. d. S. Oliveira, Alan Bivens, S...