Sciweavers

1575 search results - page 260 / 315
» The provenance of electronic data
Sort
View
ISSA
2004
13 years 11 months ago
A General Methodology For The Development Of An Effective Information Security Policy
In today's hi-tech world, conventional physical security methods are simply insufficient for the protection of an organisation's information assets. This is because of t...
Arvish Ramdeyal
ECIS
2003
13 years 11 months ago
The impact of prior online shopping experience on future purchasing channel choice
This paper discusses the direct and indirect effects of online shopping experience on selecting and the intention to select the Internet as the purchasing channel. The theoretical...
Jonna Järveläinen
ECIS
2003
13 years 11 months ago
Implementing inter-organizational systems (IOS) for strategic advantage: a value-flow framework
Increasingly, organizations have been investing heavily in information systems for greater dyadic coordination and cooperation with each of their key business partners. In this re...
Michael T. K. Tan, K. S. Raman, Kwok Kee Wei
IADIS
2003
13 years 11 months ago
A Mobile Agent Based Registration System
A mobile agent is a software agent that has the ability to transfer its program code, data and execution state across a network to a remote computer for execution. In this paper, ...
K. K. Wong, C. K. Heng, P. C. Leong, Ma-Tit Yap
ICISC
1998
132views Cryptology» more  ICISC 1998»
13 years 11 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...