Sciweavers

2208 search results - page 252 / 442
» Memory Practices in the Sciences
Sort
View
HICSS
2010
IEEE
155views Biometrics» more  HICSS 2010»
15 years 6 months ago
Experiences Validating the Access Policy Tool in Industrial Settings
—The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with global access policy, e.g., such as describes the industry’s be...
David M. Nicol, William H. Sanders, Mouna Seri, Sa...
HICSS
2010
IEEE
157views Biometrics» more  HICSS 2010»
15 years 6 months ago
Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols
Recently, there has been an increased focus and a sense of urgency in developing standards for Power Grid systems centered on the need for interoperability. Given the threat again...
Himanshu Khurana, Rakeshbabu Bobba, Timothy M. Yar...
HICSS
2009
IEEE
137views Biometrics» more  HICSS 2009»
15 years 5 months ago
Consumer Informedness and Hyperdifferentiation: An Empirical Test of the 'Trading Down' and 'Trading Out' Hypotheses
Consumer informedness plays a critical role in determining consumer choice. Companies now use hyperdifferentiation and resonance marketing strategies to benefit from the long-tail....
Robert J. Kauffman, Ting Li, Eric van Heck, Peter ...
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
15 years 5 months ago
Virtual Networks and Ethics: An Empirical Research in a Non-Governmental Organization
– This paper analyzes the opportunities offered by information and communication technologies (ICTs) and the related ethical issues they raise within the transparency practices of...
Antonino Vaccaro, Peter Madsen
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
15 years 5 months ago
Quantifying IT Value Latency: The Case of the Financial Services Industry
Both the academia and practice recognize that information technology (IT) investments may not yield immediate benefits. Nevertheless, there has been a lack of methodological devel...
Kim Huat Goh, Robert J. Kauffman