Sciweavers

25 search results - page 3 / 5
» An empirical evaluation of information security awareness le...
Sort
View
KDD
2004
ACM
213views Data Mining» more  KDD 2004»
13 years 11 months ago
Analytical view of business data
This paper describes a logical extension to Microsoft Business Framework (MBF) called Analytical View (AV). AV consists of three components: Model Service for design time, Busines...
Adam Yeh, Jonathan Tang, Youxuan Jin, Sam Skrivan
BPM
2009
Springer
134views Business» more  BPM 2009»
14 years 28 days ago
Business Process-Based Resource Importance Determination
Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...
Stefan Fenz, Andreas Ekelhart, Thomas Neubauer
PET
2005
Springer
13 years 11 months ago
Privacy in India: Attitudes and Awareness
Abstract. In recent years, numerous surveys have been conducted to assess attitudes about privacy in the United States, Australia, Canada, and the European Union. Very little infor...
Ponnurangam Kumaraguru, Lorrie Faith Cranor
ISSA
2008
13 years 7 months ago
The Principle of Security Safeguards: Accidental Activities
The principle of information security safeguards is a key information principle contained in every privacy legislation measure, framework, and guideline. This principle requires d...
Rasika Dayarathna
SAC
2009
ACM
13 years 11 months ago
Annotating UDDI registries to support the management of composite services
The future of service-centric environments suggests that organizations will dynamically discover and utilize web services for new business processes particularly those that span m...
M. Brian Blake, Michael F. Nowlan, Ajay Bansal, Sr...