Sciweavers

347 search results - page 40 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
HICSS
2005
IEEE
136views Biometrics» more  HICSS 2005»
15 years 3 months ago
Assessing the Readiness of Internet-Based IOS and Evaluating Its Impact on Adoption
This study explores the readiness factors for the adoption of Internet-based inter-organizational systems (IOS) via a case analysis of fifteen Taiwanese firms. By proposing a thre...
Hsin-Lu Chang, Shin-Horng Chen
HICSS
2000
IEEE
107views Biometrics» more  HICSS 2000»
15 years 2 months ago
A Project Management Model based on Shared Understanding
Traditionally in industrial system development, the total project is decomposed into phases. The result from one phase, normally a document or a system component, is passed to the...
Ulf Cederling, Roland Ekinge, Bengt Lennartsson, L...
HICSS
2005
IEEE
82views Biometrics» more  HICSS 2005»
15 years 3 months ago
To the Question "Does IT Matter?" Hollywood Answers "Yes"
Nicholas Carr’s question “Does IT Matter?”(to the maintenance of competitive advantage) has been applied to many industries but the one that depends on IT almost exclusively...
David A. Cook, Wenli Wang
HICSS
2005
IEEE
96views Biometrics» more  HICSS 2005»
15 years 3 months ago
Network Centric Warfare in the U.S. Navy's Fifth Fleet
This case study was commissioned by the Office of Force Transformation in the United States Department of Defense to examine the employment of Network Centric Warfare (NCW) system...
John Kruse, Mark Adkins, Kimberly A. Holloman
HICSS
1999
IEEE
78views Biometrics» more  HICSS 1999»
15 years 2 months ago
A Structured Transformation Approach for Legacy Information Systems - A Cash Receipts/Reimbursements Example
Legacy information systems are difficult to transform into the new or upgraded information systems. Part of the reason is being the incompatibility and the unscalability between t...
Jia-Lang Seng, Wayne Tsai