Sciweavers

1183 search results - page 52 / 237
» Risk Management with Benchmarking
Sort
View
SIGIR
2006
ACM
15 years 5 months ago
You are what you say: privacy risks of public mentions
In today’s data-rich networked world, people express many aspects of their lives online. It is common to segregate different aspects in different places: you might write opinion...
Dan Frankowski, Dan Cosley, Shilad Sen, Loren G. T...
CLOUDCOM
2009
Springer
15 years 6 months ago
A Privacy Manager for Cloud Computing
We describe a privacy manager for cloud computing, which reduces the risk to the cloud computing user of their private data being stolen or misused, and also assists the cloud comp...
Siani Pearson, Yun Shen, Miranda Mowbray
ISCC
2000
IEEE
125views Communications» more  ISCC 2000»
15 years 4 months ago
Security Requirements for Management Systems Using Mobile Agents
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
Helmut Reiser, Gerald Vogt
HICSS
2005
IEEE
370views Biometrics» more  HICSS 2005»
15 years 5 months ago
Strategic Information Technology Management: Managing Organizational, Political, and Technological Forces
This paper explores the role of Information Technology (IT) in the management of municipally-owned and operated public utilities. Through semi-structured interviews of senior mana...
Keith Schildt, Suzanne Beaumaster, Marcie Edwards
CII
2006
125views more  CII 2006»
14 years 12 months ago
Agent-based model for managing composite product information
The importance of product information management during the whole lifetime of the product has increased due to the technical sophistication of products as well as stricter governm...
Kary Främling, Timo Ala-Risku, Mikko Kär...