Sciweavers

4874 search results - page 69 / 975
» Information theory for data management
Sort
View
UTP
2010
14 years 7 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
HICSS
2003
IEEE
88views Biometrics» more  HICSS 2003»
15 years 3 months ago
Information Technology Fashions: Lifecycle Phase Analysis
Over the last decade, studies of management fashions have shown that the rise and fall of the fashions can be seen as a reflection of a knowledge enterprise, where knowledge of ne...
Jintae Lee, Emilio Collar Jr.
DGO
2008
112views Education» more  DGO 2008»
14 years 11 months ago
Mapping theory to practice: a cartographic analysis of public safety networks
This paper provides an interim report on ongoing data collection and analysis efforts as part of a large-scale study of information technology- focused interagency collaborations ...
Christine B. Williams, M. Lynne Markus, Michael Ty...
ECIS
2004
14 years 11 months ago
Seeking legitimation for an information system: a preliminary process model
This research throws light on to the role of social issues in developing a successful information system. In a case study of a community health organization, we describe how IT ma...
Donal J. Flynn, Zahid Hussain
JUCS
2008
341views more  JUCS 2008»
14 years 9 months ago
IQM3: Information Quality Management Maturity Model
: In order to enhance their global business performance, organizations must be careful with the quality of their information since it is one of their main assets. Analogies to qual...
Ismael Caballero, Angelica Caro, Coral Calero, Mar...