Sciweavers

ICEB
2004
297views Business» more  ICEB 2004»
14 years 10 months ago
Security Measures in Mobile Commerce: Problems and Solutions
Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as wel...
Sanwar Ali, Waleed Farag, Mohammad A. Rob
ICETE
2004
253views Business» more  ICETE 2004»
14 years 10 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
IFIP11
2004
141views Business» more  IFIP11 2004»
14 years 10 months ago
Identity Management for Self-Portrayal
Identity management systems help users to organise their digital profiles in order to communicate parts of them, whenever needed and wanted, to communication partners like internet...
Tobias Baier, Christian P. Kunze
BPM
2004
Springer
167views Business» more  BPM 2004»
15 years 2 months ago
Mining Social Networks: Uncovering Interaction Patterns in Business Processes
Increasingly information systems log historic information in a systematic way. Workflow management systems, but also ERP, CRM, SCM, and B2B systems often provide a so-called “ev...
Wil M. P. van der Aalst, Minseok Song
ICEB
2004
158views Business» more  ICEB 2004»
14 years 10 months ago
E-Business Adoption in Marketing and Its Relationship with Factors in SWOT Analysis: an Empirical Investigation of Small Softwar
This research gives empirically grounded insights into e-business adoption in conjunction with factors usually considered in SWOT (Strengths, Weaknesses, Opportunities, and Threat...
Edward Bernroider, Alexander Hampel
Business
Top of PageReset Settings