Sciweavers

16921 search results - page 4 / 3385
» Information Technology
Sort
View
IFIP
1992
Springer
13 years 9 months ago
Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability?
On initiative of the Commission of the European Communities, the Information Technology Security Evaluation Criteria (ITSEC) are designed to provide a yardstick for the evaluation...
Michael Gehrke, Andreas Pfitzmann, Kai Rannenberg
HICSS
2002
IEEE
79views Biometrics» more  HICSS 2002»
13 years 10 months ago
Information Technology, Responsibility, and Anthropology
Information technology is one potential object of responsibility as we know from texts about computer ethics, information ethics etc. This article aims to demonstrate that the eth...
Bernd Carsten Stahl
HICSS
2007
IEEE
151views Biometrics» more  HICSS 2007»
13 years 11 months ago
The Impact of Information Technology on the Temporal Optimization of Supply Chain Performance
The objective of this paper is to suggest a systematic means by which the timing and focus of information technology policies can be used to optimize supply chain performance and ...
Ken Dozier, David Chang
IJEP
2011
63views more  IJEP 2011»
13 years 9 days ago
Support Structures for Women in Information Technology Careers
This paper examines issues of support for women with Information Technology (IT) careers. Interviews of 38 women with careers in information technology sectors of different indust...
Ruth A. Guthrie, Louise Soe, Elaine K. Yakura
ACMDIS
2006
ACM
13 years 11 months ago
Morphome: a constructive field study of proactive information technology in the home
This paper presents the main results of a three-year long field and design study of proactive information technology in the home. This technology uses sensors to track human activ...
Ilpo Koskinen, Kristo Kuusela, Katja Battarbee, An...