Sciweavers

20024 search results - page 3632 / 4005
» Database Management Systems
Sort
View
122
Voted
HICSS
2009
IEEE
105views Biometrics» more  HICSS 2009»
15 years 11 months ago
Digital Pen: Four Rounds of Ethnographic and Field Research
We report on a year-long qualitative and ethnographic project to examine the value of digital pen technology for note taking. A digital pen captures a facsimile of information wri...
Christopher N. Chapman, Michal Lahav, Susan Burges...
140
Voted
HICSS
2009
IEEE
143views Biometrics» more  HICSS 2009»
15 years 11 months ago
Bridge Methods: Using a Balanced Project Practice Portfolio to Integrate Agile and Formal Process Methodologies
This paper examines the non-linear nature of progress on software projects. It asserts that this uneven accomplishment stems from the continuous need to drive value quickly in res...
Stephen J. Cohen, William H. Money
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
15 years 11 months ago
Making it Hard to Lie: Cultural Determinants of Media Choice for Deception
In today’s business environment, deception is commonplace. In hiring situations, successful deception by job candidates can lead to a poor fit between the candidate’s abilitie...
Christopher P. Furner, Joey F. George
HICSS
2009
IEEE
123views Biometrics» more  HICSS 2009»
15 years 11 months ago
Towards Conceptual Metamodeling of IT Governance Frameworks Approach - Use - Benefits
Up to now, there has been little academic support for the challenges of IT governance/IT management. As a reaction, various best practice frameworks - like COBIT or CMMI - were de...
Matthias Goeken, Stefanie Alter
IEEEARES
2009
IEEE
15 years 11 months ago
Estimating ToE Risk Level Using CVSS
—Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, costb...
Siv Hilde Houmb, Virginia N. L. Franqueira
« Prev « First page 3632 / 4005 Last » Next »