Sciweavers

789 search results - page 85 / 158
» Pushing using Compliance
Sort
View
84
Voted
ECIS
2001
15 years 2 months ago
Cyberliability: Is the Chief Privacy Officer the Solution?
The primary responsibility of the Chief Privacy Officer (CPO) is to protect online consumer privacy by developing an organization's privacy policy and ensuring compliance wit...
Janice C. Sipior, Burke T. Ward
AAMAS
2007
Springer
15 years 1 months ago
An algebra for commitment protocols
Protocols enable unambiguous, smooth interactions among agents. Commitments among agents are a powerful means of developing protocols. Commitments enable flexible execution of pro...
Ashok U. Mallya, Munindar P. Singh
JCIT
2007
96views more  JCIT 2007»
15 years 1 months ago
A Paper-Centred Information System: Effectiveness and Quality Implications in UK Police Intelligence Units
This paper investigates the quality of information and intelligence in the United Kingdom’s (UK) police intelligence units with a particular emphasis on the role of paper-based ...
Gabriella Spinelli, Bhavna Sharma
JCM
2007
164views more  JCM 2007»
15 years 1 months ago
Body Sensor Network based on Soft Polymer Sensors and Wireless Communications
— Wireless communications is now completely pervasive, and already is used in many guises by people in everyday life. However until now, the information exchanged has been mainly...
Sarah Brady, Brian Carson, Donal O'Gorman, Niall M...
TSE
2008
128views more  TSE 2008»
15 years 1 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón