Sciweavers

54 search results - page 5 / 11
» Technical Writing
Sort
View
ECIS
2001
14 years 11 months ago
Gender, Emancipation and Critical Information Systems
This paper addresses ways in which theorizing gender may be important in forming an understanding of the topic of emancipation which is central to the new critical information sys...
Alison E. Adam
OTM
2010
Springer
14 years 7 months ago
Towards Using Semantic Decision Tables for Organizing Data Semantics
In the ITEA2 Do-It-Yourself Smart Experiences project (DIY-SE), we are required to design an ontology-based ambient computing environment to support users to DIY their personalized...
Yan Tang
ISSA
2008
14 years 11 months ago
The Impact of Information Security Awareness Training on Information Security Behaviour: The Case for Further Research
Information Security awareness initiatives are seen as critical to any information security programme. But, how do we determine the effectiveness of these awareness initiatives? W...
Tony Stephanou, Rabelani Dagada
TOPLAS
2010
93views more  TOPLAS 2010»
14 years 8 months ago
Semantics of fractional permissions with nesting
Fractional permissions use fractions to distinguish write access (1) from read access (any smaller fraction). Nesting (an extension of adoption) can be used to model object invari...
John Tang Boyland
COMPUTER
2006
84views more  COMPUTER 2006»
14 years 9 months ago
Testable, Reusable Units of Cognition
The educational content of a technical topic consists, ultimately, of elementary chunks of knowledge. Identifying and classifying such units -- Testable, Reusable Units of Cogniti...
Bertrand Meyer