115
click to vote
ICEB
14 years 10 months ago
2004
Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as wel...
114
click to vote
ICETE
14 years 10 months ago
2004
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
112
click to vote
IFIP11
14 years 10 months ago
2004
Identity management systems help users to organise their digital profiles in order to communicate parts of them, whenever needed and wanted, to communication partners like internet...
106
click to vote
BPM
15 years 2 months ago
2004 Springer
Increasingly information systems log historic information in a systematic way. Workflow management systems, but also ERP, CRM, SCM, and B2B systems often provide a so-called “ev...
ICEB
14 years 10 months ago
2004
This research gives empirically grounded insights into e-business adoption in conjunction with factors usually considered in SWOT (Strengths, Weaknesses, Opportunities, and Threat...
|