Sciweavers

209 search results - page 34 / 42
» hicss 2009
Sort
View
HICSS
2009
IEEE
176views Biometrics» more  HICSS 2009»
14 years 2 months ago
Adoption of Electronic Commerce Technologies by SMEs in Malaysia
Electronic commerce (EC) offers many benefits to organizations of any size including small to medium- sized enterprises (SMEs). At this stage, there is still a need for a better u...
Sherah Kurnia, Basil Alzougool, Mazen Ali, Saadat ...
HICSS
2009
IEEE
111views Biometrics» more  HICSS 2009»
14 years 2 months ago
The Financial Impact of IT Governance Mechanisms' Adoption: An Empirical Analysis with Brazilian Firms
Recently, it appears on the agenda of many organizations the concept of IT governance in order to justify and mainly optimize IT investments. Some studies have shown that companie...
Guilherme Lerch Lunardi, João Luiz Becker, ...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 2 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
14 years 2 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
HICSS
2009
IEEE
127views Biometrics» more  HICSS 2009»
14 years 2 months ago
A Conceptual and Operational Definition of 'Social Role' in Online Community
Both online and off, people frequently perform particular social roles. These roles organize behavior and give structure to positions in local networks. As more of social life bec...
Eric Gleave, Howard T. Welser, Thomas M. Lento, Ma...