Sciweavers

21490 search results - page 429 / 4298
» Business Process Modeling
Sort
View
152
Voted
GLOBECOM
2009
IEEE
15 years 8 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
118
Voted
ECIS
2004
15 years 5 months ago
From asp to web services: identifying key performance areas and indicators for healthcare
Value creation from e-business for customers in healthcare is an important topic in academic and practitioner circles. This paper reports the findings from a two-year research stu...
Matthew W. Guah, Wendy L. Currie
ECIS
2004
15 years 5 months ago
The Medium Matters: The Effects Of Media Attributes And Evidence Strength On Belief Revision
Face-to-face meetings between auditors and their clients are increasingly difficult to arrange, due to business globalization and the growing need for rapid audit decision-making....
Anna H. Nöteberg
ECIS
2000
15 years 5 months ago
Perspectives on Knowledge Management Systems - Theoretical Framework and Design of an Empirical Study
Abstract- This paper deals with "Knowledge Management Systems" (KMS) which are seen as a new kind of information systems supporting organizational information processing....
Ronald Maier, Franz Lehner
113
Voted
ICIS
1997
15 years 5 months ago
Selling in the era of the "Net": integration of electronic commerce in small firms
This paper reports on a research study concerning the integration of electronic commerce (EC) into the pre-sales business processes of small firms. By means of a field survey, 17 ...
William J. Kettinger, Gary Hackbarth