Contained nomadic information environments: Technology, organization, and environment influences on adoption of hospital RFID patient tracking

Q Cao, DR Jones, H Sheng - Information & management, 2014 - Elsevier
This paper reports on a case study of adoption of a contained nomadic information
environment, exemplified by the use of Radio Frequency Identification (RFID) to keep track …

E-commerce: protecting purchaser privacy to enforce trust

G Antoniou, L Batten - Electronic commerce research, 2011 - Springer
It has been well documented that lack of trust between commercial entities and purchasers
can restrict the potential of e-commerce. This may be because the purchaser is required to …

Attack intention analysis model for network forensics

M Rasmi, A Jantan - … , ICSECS 2011, Kuantan, Pahang, Malaysia, June 27 …, 2011 - Springer
In network forensics, attack intentions analyses play a major role to help and accelerate
decision-making for apprehending the real perpetrator. In fact, attack intention analysis is a …

[PDF][PDF] Improving Analysis Phase in Network Forensics By Using Attack Intention Analysis

M Rasmi, KE Al-Qawasmi - International Journal of Security and Its …, 2016 - academia.edu
The increasing amount of cyber crimes has motivated network forensics researchers to
develop new techniques to analyze and investigate these crimes. Reconstructing useful …

[PDF][PDF] Formalizing business process specifications

A Speck, S Feja, S Witt, E Pulvermüller… - Computer Science and …, 2011 - eudml.org
1 Ch ri st i an-A lb rechts-U n ive rs i ty K iel O ls hausenstrasse 40, 24098 K iel, Germany
{aspe, svfe, swi l@ i nformatik. uni-kiel. de 2 U n ive rs i ty of Osnabrueck A lb rechtstr. 28 …

Metamodeling to control and audit e-commerce web applications

SM Huang, JS Hua, H Will, JW Wu - International Journal of …, 2012 - Taylor & Francis
With the increasing popularity of e-commerce, the growth potential of business is
extraordinary; however, the path toward success can also be dangerous because of …

[图书][B] Leadership styles and information security in small businesses: An empirical investigation

D Bhattacharya - 2008 - search.proquest.com
Small businesses often display a lack of concern towards cybercrime and information
security problems. A lack of concern usually results in delayed or incorrectly implemented …

Framework for business process verification

A Speck, S Witt, S Feja, A Lotyzc… - … Information Systems: 14th …, 2011 - Springer
There are numerous concepts and tools for modeling business processes and several
academic approaches to verify business processes. However, most modeling tools don't …

Multi-sensorial inputs for the identification of persons with synergetic computers

T Wagner, U Dieckmann - Proceedings of 1st International …, 1994 - ieeexplore.ieee.org
We present an approach to combine the optical motion analysis of the lips and acoustic
voice analysis of defined single words for identifying the people speaking. Due to the …

[图书][B] Risk Service Engineering: Informationsmodelle für das Risikomanagement

M Schermann - 2011 - books.google.com
Michael Schermann präsentiert eine Modellierungsmethode, die Risikomanager bei der
systematischen Entwicklung von Maßnahmen zur Risikosteuerung unterstützt. Im Kern steht …