Sciweavers

708 search results - page 56 / 142
» Information system life cycle and management roles
Sort
View
ACSAC
1998
IEEE
15 years 4 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
CSCW
2006
ACM
15 years 5 months ago
Of pill boxes and piano benches: "home-made" methods for managing medication
We report on the results of an ethnographic study of how elders manage their medication with the objective of informing the design of in-home assistive health technology to suppor...
Leysia Palen, Stinne Aaløkke Ballegaard
ECIS
2004
15 years 1 months ago
Change management: the contribution of personal construct theory (PCT)
This paper explores the use of two complementary approaches, each stemming from Personal Construct Theory (PCT), to investigate the interdependence of organizations and informatio...
Laurence Brooks, Christopher J. Davis, Mark Lycett
DSVIS
2008
Springer
15 years 1 months ago
Multi-fidelity User Interface Specifications
Specifying user interfaces consists in a fundamental activity in the user interface development life cycle as it informs the subsequent steps. Good quality specifications could lea...
Thomas Memmel, Jean Vanderdonckt, Harald Reiterer
CHI
2010
ACM
15 years 6 months ago
Transforming clinic environments into information workspaces for patients
Although clinic environments are a primary location for exchanging information with clinicians, patients experience these spaces as harsh environments to access, use, exchange, an...
Kenton T. Unruh, Meredith M. Skeels, Andrea Civan-...