Sciweavers

HICSS
2012
IEEE
265views Biometrics» more  HICSS 2012»
12 years 13 hour ago
Change and Control Paradoxes in Mobile Infrastructure Innovation: The Android and iOS Mobile Operating Systems Cases
The advent of the smartphone as a highly complex technology has been accompanied by mobile operating systems (OS), large communities of developers, diverse content providers, and ...
David Tilson, Carsten Sørensen, Kalle Lyyti...
HICSS
2012
IEEE
260views Biometrics» more  HICSS 2012»
12 years 13 hour ago
Effort Estimates for Vulnerability Discovery Projects
Security vulnerabilities continue to be an issue in the software field and new severe vulnerabilities are discovered in software products each month. This paper analyzes estimates...
Teodor Sommestad, Hannes Holm, Mathias Ekstedt
HICSS
2012
IEEE
293views Biometrics» more  HICSS 2012»
12 years 13 hour ago
Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters
—Security will be critical for the wireless interface offered by soon-to-be-ubiquitous smart meters — since if not secure, this technology will provide an remotely accessible a...
Travis Goodspeed, Sergey Bratus, Ricky Melgares, R...
HICSS
2012
IEEE
291views Biometrics» more  HICSS 2012»
12 years 13 hour ago
Product Performance Based Business Models: A Service Based Perspective
The migration to a service based economy has led many firms to emphasize the service component of their product offerings. This shift has led to the emergence of a business model ...
Morris A. Cohen
HICSS
2012
IEEE
285views Biometrics» more  HICSS 2012»
12 years 13 hour ago
Identifying Informational Needs for Open Government: The Case of Egypt
The success of open government initiatives depends on understanding the informational needs of the concerned citizens and other stakeholders as prerequisite for open access to rel...
Ralf Klischewski