Sciweavers

Share
HICSS
2009
IEEE
113views Biometrics» more  HICSS 2009»
10 years 1 months ago
TinyOS-Based Quality of Service Management in Wireless Sensor Networks
Nina Peterson, Lohith Anusuya-Rangappa, Behrooz Sh...
HICSS
2009
IEEE
140views Biometrics» more  HICSS 2009»
10 years 1 months ago
Blocking Skype through Deep Packet Inspection
Peter Renals, Grant A. Jacoby
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
10 years 1 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...
HICSS
2009
IEEE
102views Biometrics» more  HICSS 2009»
10 years 1 months ago
Join the Standard Forces - Examining the Combined Impact of Process and Data Standards on Business Process Performance
What impact do process and data standards have on business process performance? This paper shows that process and data standards have a positive combined impact on business proces...
Bjoern Muenstermann, Andreas Eckhardt, Tim Weitzel
HICSS
2009
IEEE
124views Biometrics» more  HICSS 2009»
10 years 1 months ago
Case Studies of an Insider Framework
Many groups are interested in the insider threat problem, but the model generally used by all of these groups is implicitly binary—one is either within a perimeter or not. There...
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whal...
HICSS
2009
IEEE
196views Biometrics» more  HICSS 2009»
10 years 1 months ago
Monetizing the Internet: Surely There Must be Something other than Advertising
Almost all attempts to monetize internet applications targeted at individuals to date have focused on natural extensions of traditional media or traditional retailing. Most are ei...
Eric K. Clemons
HICSS
2009
IEEE
136views Biometrics» more  HICSS 2009»
10 years 1 months ago
New Development of Advanced ITG Framework
Recent research has begun to place greater emphasis on the strategic use of IT in seeking to build firm’s capability, thus innovating firm’s business value. In this context, m...
Jung-Hoon Lee, S.-H. Juhn, K.-T. Hwang
HICSS
2009
IEEE
122views Biometrics» more  HICSS 2009»
10 years 1 months ago
Empirical Estimates and Observations of 0Day Vulnerabilities
We define a 0Day vulnerability to be any vulnerability, in deployed software, that has been discovered by at least one person but has not yet been publicly announced or patched. T...
Miles A. McQueen, Trevor A. McQueen, Wayne F. Boye...
HICSS
2009
IEEE
321views Biometrics» more  HICSS 2009»
10 years 1 months ago
A Conceptual Model for Studying the Influence of Charismatic Leadership on ERP Implementation Lifecycle
In the context of ERP implementation, leadership is consistently found to be the most important factor leading to implementation success. However, most of the studies focus on lea...
Zhen Shao, Yuqiang Feng, Qing Hu, Yang Liu
HICSS
2009
IEEE
84views Biometrics» more  HICSS 2009»
10 years 1 months ago
Revising the Panko-Halverson Taxonomy of Spreadsheet Risks
The Panko–Halverson Taxonomy of Spreadsheet Risks has been widely used since its creation in the 1990s. This paper revises that taxonomy. It introduces new ways to count cell er...
Raymond R. Panko
books