Sciweavers

335 search results - page 53 / 67
» Biometrics and Security
Sort
View
HICSS
2006
IEEE
94views Biometrics» more  HICSS 2006»
15 years 8 months ago
Reporting On-Campus Crime Online: User Intention to Use
National surveys demonstrate that millions of crimes go unreported in the United States. Several reasons may contribute to this lack of reporting and we are investigating these po...
Alicia Iriberri, Gondy Leroy, Nathan Garrett
119
Voted
HICSS
2006
IEEE
153views Biometrics» more  HICSS 2006»
15 years 8 months ago
IT Governance: Reviewing 17 IT Governance Tools and Analysing the Case of Novozymes A/S
Complexity in information technology architectures and infrastructures, and an increasing need for executives to verify and secure value generation processes in private as well as...
Michael Holm Larsen, Mogens Kühn Pedersen, Ki...
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
15 years 7 months ago
Peer-to-Peer Networks for Virtual Home Environments
This paper presents au approach to extend OSGi server based home networks with JXTA’s peer-topeer (PZP) technoIogy to a mzdti-server home environment connecting multiple private...
Chris Loeser, Wolfgang Müller 0003, Frank Ber...
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
15 years 7 months ago
Trusted Software's Holy Grail
In this paper, we discuss what we believe is the grand challenge facing the software quality research community: the ability to accurately define, in the very earliest stages of d...
Jeffrey M. Voas
HICSS
2000
IEEE
147views Biometrics» more  HICSS 2000»
15 years 6 months ago
Persistence and Lurkers in Discussion Lists: A Pilot Study
In email-based discussion lists (DLs), messages resident in archives, email clients and elsewhere are persistent. One way of examining persistent messages is through the eyes of l...
Blair Nonnecke, Jennifer Preece