Sciweavers

14 search results - page 3 / 3
» Improving information security compliance - A process-orient...
Sort
View
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
13 years 11 months ago
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...
DISCEX
2003
IEEE
13 years 10 months ago
The STRONGMAN Architecture
The design principle of restricting local autonomy only where necessary for global robustness has led to a scalable Internet. Unfortunately, this scalability and capacity for dist...
Angelos D. Keromytis, Sotiris Ioannidis, Michael B...
AMKM
2003
Springer
13 years 10 months ago
Towards Agent-Mediated Knowledge Management
Abstract. In this paper, we outline the relation between Knowledge Management (KM) as an application area on the one hand, and software agents as a basic technology for supporting ...
Ludger van Elst, Virginia Dignum, Andreas Abecker
HICSS
2007
IEEE
135views Biometrics» more  HICSS 2007»
13 years 11 months ago
Framework for Establishing Enterprise Modeling in the Context of Collaborative Enterprises
Increased market dynamics, shorter product lifecycles and a higher customer involvement in product design have caused great changes to competitive conditions and many companies ar...
Thomas Knothe, Timo Kahl, Dieter Boell, Kristof Sc...