Sciweavers

52 search results - page 3 / 11
» A DEA-based approach for information technology risk assessm...
Sort
View
WIRTSCHAFTSINFORMATI
2007
13 years 6 months ago
Perceived Usefulness of RFID-enabled Information Services - A Systematic Approach
Even though RFID technology is currently gaining importance mainly in logistics, usage areas, such as shopping or after-sales enhancements beyond the supply chain are envisioned. ...
Hanna Krasnova, Matthias Rothensee, Sarah Spiekerm...
ICEGOV
2007
ACM
13 years 8 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
OTM
2005
Springer
13 years 10 months ago
Self-tuning Personalized Information Retrieval in an Ontology-Based Framework
Reliability is a well-known concern in the field of personalization technologies. We propose the extension of an ontology-based retrieval system with semantic-based personalization...
Pablo Castells, Miriam Fernández, David Val...
TELSYS
2010
140views more  TELSYS 2010»
12 years 11 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn
EMISA
2010
Springer
12 years 11 months ago
Investigating the Process of Process Modeling with Cheetah Experimental Platform
Abstract. When assessing the usability of BPM technologies enterprises have to rely on vendor promises or qualitative data rather than on empirical or experimental research. To add...
Jakob Pinggera, Stefan Zugal, Barbara Weber