Sciweavers

485 search results - page 48 / 97
» Biometrics: A Grand Challenge
Sort
View
HICSS
2008
IEEE
137views Biometrics» more  HICSS 2008»
15 years 8 months ago
Marketing Using Web 2.0
The increasing popularity of Web 2.0 tools, such as blogs, wikis, and virtual worlds, is fundamentally changing how consumers use the Web. The basic core of Web 2.0, that users ca...
Salvatore Parise, Patricia J. Guinan
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 8 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
HICSS
2008
IEEE
126views Biometrics» more  HICSS 2008»
15 years 8 months ago
The Impact of Cultural Diversity on Global Virtual Team Collaboration A Social Identity Perspective
Global Virtual Teams (GVTs) – teams with geographically and temporally dispersed members who heavily rely on computer-mediated communications (CMC) – face significant collabor...
Yu-Ting Caisy Hung, Mary Thi Thao Duyen Nguyen
HICSS
2008
IEEE
174views Biometrics» more  HICSS 2008»
15 years 8 months ago
Business and IT Governance Alignment Simulation Essay on a Business Process and IT Service Model
One of the main concerns of IT governance is IT’s delivery of value to the business, which is driven by strategic business and IT alignment (SBITA). How to operationally assess ...
Enrique Silva, Yves Chaix
HICSS
2007
IEEE
108views Biometrics» more  HICSS 2007»
15 years 8 months ago
Addressing IT Security for Critical Control Systems
— Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. In this environment, the risk...
Martin Naedele