Sciweavers

180 search results - page 12 / 36
» Aligning an Enterprise System with Enterprise Requirements: ...
Sort
View
ACSAC
2006
IEEE
15 years 5 months ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
ACMICEC
2004
ACM
85views ECommerce» more  ACMICEC 2004»
15 years 5 months ago
Governance enterprise architecture (GEA): domain models for e-governance
Public administrations all over the world promote ambitious and costly e-government programmes. The required domain analysis is usually conducted on a local and ad hoc basis, due ...
Vassilios Peristeras, Konstantinos A. Tarabanis
HICSS
2002
IEEE
142views Biometrics» more  HICSS 2002»
15 years 4 months ago
Multi-perspective Enterprise Modeling (MEMO) - Conceptual Framework and Modeling Languages
For many companies, the strategic as well as the organizational fit of their information systems is a pivotal factor for staying competitive. At the same time, there is an increas...
Ulrich Frank
HICSS
2007
IEEE
258views Biometrics» more  HICSS 2007»
15 years 6 months ago
Enterprise Architecture and IT Governance: A Risk-Based Approach
The USCP had enormous challenges with its IT Program and support to the internal and external stakeholders of the Department, because of a fragile IT infrastructure. The IT Progra...
James R. Getter
CIKM
2010
Springer
14 years 10 months ago
Automatic metadata extraction from multilingual enterprise content
Enterprises provide professionally authored content about their products/services in different languages for use in web sites and customer care. For customer care, personalization...
Melike Sah, Vincent Wade