Sciweavers

HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
14 years 1 months ago
Web Application Scanners: Definitions and Functions
There are many commercial software security assurance tools that claim to detect and prevent vulnerabilities in application software. However, a closer look at the tools often lea...
Elizabeth Fong, Vadim Okun
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
14 years 1 months ago
Second-Best Combinatorial Auctions - The Case of the Pricing-Per-Column Mechanism
One of the main contributions of classical mechanism design is the derivation of the Groves mechanisms. The class of Groves mechanisms are the only mechanisms that are strategy-pr...
Dirk Neumann, Björn Schnizler, Ilka Weber, Ch...
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
14 years 1 months ago
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology
This paper describes how the curriculum and course format at the Air Force Institute of Technology (AFIT) has evolved based on our experience with the highly-successful Cyber Defe...
Barry E. Mullins, Timothy H. Lacey, Robert F. Mill...
HICSS
2007
IEEE
181views Biometrics» more  HICSS 2007»
14 years 1 months ago
Potentials of Social Networks for Knowledge Management with Regard to the Development of Stable Competences and Dynamic Capabili
In order to balance the tensions of the concepts of organizational core competencies and dynamic capability we introduce social knowledge networks as a strategic means from a know...
Harald F. O. von Kortzfleisch, Ines Mergel, Christ...
HICSS
2007
IEEE
172views Biometrics» more  HICSS 2007»
14 years 1 months ago
Support for Computer Forensics Examination Planning with Domain Modeling: A Report of One Experiment Trial
In any forensic investigation, planning and analysis activities are required in order to determine what digital media will be seized, what types of information will be sought in t...
Alfred C. Bogen, David A. Dampier, Jeffrey C. Carv...
HICSS
2007
IEEE
114views Biometrics» more  HICSS 2007»
14 years 1 months ago
Organizational Assimilation of Vertical Standards: An Integrative Model
Vertical standards are complex networked technologies whose assimilation is subject to extensive interorganizational dependence and network effects. Classical theories of diffusio...
Rubén A. Mendoza, T. Ravichandran
HICSS
2007
IEEE
112views Biometrics» more  HICSS 2007»
14 years 1 months ago
E-Risk Management through Self Insurance: An Option Model
e-business organizations are under constant threat of their business being disrupted by hackers, viruses and a host of malicious attackers. This would lead to loses to the tune of...
Arunabha Mukhopadhyay, Binay Bhushan, Debashis Sah...
HICSS
2007
IEEE
123views Biometrics» more  HICSS 2007»
14 years 1 months ago
Dynamic Address Allocation for Management and Control in Wireless Sensor Networks
Several data-centric communication paradigms have been proposed in the domain of wireless sensor networks (WSN). Therefore, the principles of operation and maintenance in such net...
Zheng Yao, Falko Dressler
HICSS
2007
IEEE
123views Biometrics» more  HICSS 2007»
14 years 1 months ago
The Case of Honda: A Dialectical yet Coherent Firm
—This conceptual paper proposes that Honda’s innovative prowess of producing both radical and disruptive innovations within their aerospace and automotive/pick-up truck develop...
W. David Holford, Mehran Ebrahimi
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
14 years 1 months ago
Challenges in Health Informatics
Early grand challenge papers in health informatics identified numerous challenges, many of which either remain as open questions or have been resolved within fairly narrow domains...
Michael A. Shepherd