Sciweavers

HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
14 years 5 months ago
Analysis of Payload Based Application level Network Anomaly Detection
Most network anomaly detection research is based on packet header fields, while the payload is usually discarded. Preventing unknown attacks and Internet worms has led to a need f...
Like Zhang, Gregory B. White
HICSS
2007
IEEE
139views Biometrics» more  HICSS 2007»
14 years 5 months ago
Broadband and e-Government Diffusion
This article focuses on the relationship between eGovernment services and broadband connections. The importance of broadband availability for a sound economic development has been...
Enrico Ferro, Daniele De Leonardis, Lucy Dadayan
HICSS
2007
IEEE
131views Biometrics» more  HICSS 2007»
14 years 5 months ago
The Use of Attack and Protection Trees to Analyze Security for an Online Banking System
Online banking has become increasingly important to the profitability of financial institutions as well as adding convenience for their customers. As the number of customers using...
Kenneth S. Edge, Richard A. Raines, Michael R. Gri...
HICSS
2007
IEEE
93views Biometrics» more  HICSS 2007»
14 years 5 months ago
Community Crisis Response Teams: Leveraging Local Resources through ICT E-Readiness
Dynamic community crisis response teams form quickly at the onset of a crisis providing assistance until external specialty resources arrive. FEMA recommends individual preparedne...
Elizabeth Avery Gomez, Murray Turoff
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
14 years 5 months ago
Modeling Network Decisions under Uncertainty: Countervailing Externalities and Embedded Options
The analysis of externalities in technology-based networks continues to be of significant managerial importance in e-commerce and traditional IS operations. Competitive strategy, ...
Robert J. Kauffman, Ajay Kumar
HICSS
2007
IEEE
105views Biometrics» more  HICSS 2007»
14 years 5 months ago
Leveraging Social Networks To Motivate Individuals to Reduce their Ecological Footprints
What role can social networking websites play in supporting large-scale group action and change? We are proposing to explore their use in supporting individual reduction in person...
Jennifer Mankoff, Deanna Matthews, Susan R. Fussel...
HICSS
2007
IEEE
103views Biometrics» more  HICSS 2007»
14 years 5 months ago
Colombia Firm Energy Market
A firm energy market for Colombia is presented. Firm energy—the ability to provide energy in a dry period—is the product needed for reliability in Colombia’s hydrodominated ...
Peter Cramton, Steven Stoft
HICSS
2007
IEEE
103views Biometrics» more  HICSS 2007»
14 years 5 months ago
Understanding Context through a Comprehensive Prototyping Experience: A Testbed Research Strategy for Emerging Technologies
Information and Communication Technologies (ICTs) are rapidly changing and new technologies, processes, and skills are constantly emerging. An important challenge for the research...
José Ramón Gil-García, Theres...
HICSS
2007
IEEE
109views Biometrics» more  HICSS 2007»
14 years 5 months ago
Fine-Tuning the Human-Computer Interface: Verbal versus Keyboard Input in an Idea Generation Context
Voice recognition technologies are rapidly evolving to help humans interact with computers more efficiently and effectively. Despite their potential advantages, their impact on sy...
Jay J. H. Jung, Clayton A. Looney, Joseph S. Valac...
HICSS
2007
IEEE
123views Biometrics» more  HICSS 2007»
14 years 5 months ago
Dynamic Supply Chain Integration through Intelligent Agents
The success of supply chains depends on the match between the requirements and offerings that deliver the services. It can be ensured by separating requirements from the means of ...
Minhong Wang, Huaiqing Wang, Jiming Liu