Sciweavers

3524 search results - page 341 / 705
» Issues in Active Databases
Sort
View
APSEC
2003
IEEE
15 years 10 months ago
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
Siv Hilde Houmb, Jan Jürjens
114
Voted
HICSS
2003
IEEE
113views Biometrics» more  HICSS 2003»
15 years 10 months ago
Characteristics of IT Outsourcing Contracts
Once the decision to outsource an activity has been made, managers are faced with issues related to the management of the relationship with their service providers. A critical ele...
Benoit Aubert, Jean-Francois Houde, Michel Patry, ...
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
15 years 10 months ago
Evaluating Offshore IT Outsourcing in India: Supplier and Customer Scenarios
This paper presents the findings from an ongoing research study on offshore IT outsourcing. Field work was carried out in India and in the UK to evaluate the scale and scope of ou...
Naureen Khan, Wendy Currie, Vishanth Weerakkody, B...
127
Voted
HICSS
2003
IEEE
124views Biometrics» more  HICSS 2003»
15 years 10 months ago
Virtual Organizing: Using Threads to Coordinate Distributed Work
This paper explores the critical role of conversational threads in facilitating the ongoing, distributed work of one virtual organization. In studying the electronic mail exchange...
JoAnne Yates, Wanda J. Orlikowski, Stephanie L. Wo...
UIST
2003
ACM
15 years 10 months ago
Synchronous gestures for multiple persons and computers
This research explores distributed sensing techniques for mobile devices using synchronous gestures. These are patterns of activity, contributed by multiple users (or one user wit...
Ken Hinckley