141
click to vote
IFIP11
15 years 1 months ago
2004
Identity management systems help users to organise their digital profiles in order to communicate parts of them, whenever needed and wanted, to communication partners like internet...
140
click to vote
ICETE
15 years 1 months ago
2004
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
137
click to vote
ICEB
15 years 1 months ago
2004
Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as wel...
123
click to vote
BPM
15 years 5 months ago
2004 Springer
Increasingly information systems log historic information in a systematic way. Workflow management systems, but also ERP, CRM, SCM, and B2B systems often provide a so-called “ev...
121
click to vote
ICEB
15 years 1 months ago
2004
This research gives empirically grounded insights into e-business adoption in conjunction with factors usually considered in SWOT (Strengths, Weaknesses, Opportunities, and Threat...
|