Sciweavers

2163 search results - page 100 / 433
» cases 2004
Sort
View
CAU
2004
192views Cryptology» more  CAU 2004»
14 years 11 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
CSAC
2004
14 years 11 months ago
CoMex - A Mechanism for Coordination of Task Execution in Group Work
CoMex (Coordination Mechanism) is a system to coordinate the execution of tasks accessing coordinable entities. It uses coordination rules to describe the temporal and logical orde...
Hilda Tellioglu
EAI
2004
14 years 11 months ago
Integrating Product Catalogs via Multi-language Ontologies
A vertically integrated market consists of potentially competing companies who supply each other with products and services. Information technology can be employed to improve the b...
Manfred A. Jeusfeld
ECIS
2004
14 years 11 months ago
Seeking legitimation for an information system: a preliminary process model
This research throws light on to the role of social issues in developing a successful information system. In a case study of a community health organization, we describe how IT ma...
Donal J. Flynn, Zahid Hussain
ECIS
2004
14 years 11 months ago
Change management perspectives in an ERP implementation
This case study analyses a multiyear ERP (SAP R/3) implementation project in a global company from perspectives of conflicts and problems the project faced. The paper reports on t...
Ilkka Kemppainen