Sciweavers

180 search results - page 12 / 36
» Aligning an Enterprise System with Enterprise Requirements: ...
Sort
View
ACSAC
2006
IEEE
15 years 3 months ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
ACMICEC
2004
ACM
85views ECommerce» more  ACMICEC 2004»
15 years 3 months ago
Governance enterprise architecture (GEA): domain models for e-governance
Public administrations all over the world promote ambitious and costly e-government programmes. The required domain analysis is usually conducted on a local and ad hoc basis, due ...
Vassilios Peristeras, Konstantinos A. Tarabanis
HICSS
2002
IEEE
142views Biometrics» more  HICSS 2002»
15 years 2 months ago
Multi-perspective Enterprise Modeling (MEMO) - Conceptual Framework and Modeling Languages
For many companies, the strategic as well as the organizational fit of their information systems is a pivotal factor for staying competitive. At the same time, there is an increas...
Ulrich Frank
HICSS
2007
IEEE
258views Biometrics» more  HICSS 2007»
15 years 3 months ago
Enterprise Architecture and IT Governance: A Risk-Based Approach
The USCP had enormous challenges with its IT Program and support to the internal and external stakeholders of the Department, because of a fragile IT infrastructure. The IT Progra...
James R. Getter
CIKM
2010
Springer
14 years 8 months ago
Automatic metadata extraction from multilingual enterprise content
Enterprises provide professionally authored content about their products/services in different languages for use in web sites and customer care. For customer care, personalization...
Melike Sah, Vincent Wade