Filters








27,587 Hits in 14.5 sec

"If It's Important It Will Be A Headline"

James Nicholson, Lynne Coventry, Pamela Briggs
2019 Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems - CHI '19  
Following a thematic analysis of these interviews, we developed a cybersecurity information access framework that highlights shortcomings in older adults' choice of information resources.  ...  Specifically, we find that older users prioritise social resources based on availability, rather than cybersecurity expertise, and that they avoid using the Internet for cybersecurity information searches  ...  journey: Female 903: "Uhm, again, I would probably ask <son 1> first -if he said -he might say 'ignore it', you know, it's just not true... but he might say 'oh dear, you know, someone has got into your  ... 
doi:10.1145/3290605.3300579 dblp:conf/chi/NicholsonCB19 fatcat:uc2ab6q6xbeabedwlr3edbtud4

Cybersecurity in Hospitals: A Systematic, Organizational Perspective

Mohammad Jalali, Jessica Kaiser
2018 Social Science Research Network  
Objective: The purpose of this study was to develop a systematic and organizational perspective for studying (1) the dynamics of cybersecurity capability development at hospitals and (2) how these internal  ...  Although resource availability is important in fueling efforts to close cybersecurity capability gaps, low levels of resources could be compensated for by setting a high target level of cybersecurity.  ...  Multimedia Appendix 1 Supplementary information including four sections: (1) interview data summary, (2) effects of heterogeneity in resource availability on cyber-criminal activities, (3) effects of heterogeneity  ... 
doi:10.2139/ssrn.3100364 fatcat:i7sf4ilh7ne3jait6jyqa7mpbu

Cloud Computing –Its Prospects and Challenges

Mrs.Papri Das, Dr. Pravin Bhatawala
2014 IOSR Journal of Computer Engineering  
For such organizations choosing cloud computing is a cost effective alternative but with obvious concerns.  ...  Whilst cloud computing is gaining growing popularity in the IT industry, it also meets with some challenges like data security, integrity, availability.  ...  Below, we sum up the key feature of cloud computing:  Agility-helps in rapid and inexpensive provision of resources.  Location Independence-resources can be accessed from anywhere and everywhere.  Multi-Tenancy-resources  ... 
doi:10.9790/0661-16421520 fatcat:rer3qad3zzaydno2xdi253fyli

INSPECTING THE DYNAMICS OF FASTER WEB

Pradeek P Mohandas .
2016 International Journal of Research in Engineering and Technology  
Paper also discuss about the practices that a developer can follow to create faster loading pages.  ...  Thus fast internet access has become one of the highest priorities. Every company is in race to provide faster loading web pages. There are many methods in existence to load a web page faster.  ...  Website speed test helps us to analyze the load speed of websites and learn how to make them faster.  ... 
doi:10.15623/ijret.2016.0531008 fatcat:hhhea42aenhmzdx444ewj5nxa4

A Brief History of Software Technology

Christof Ebert
2008 IEEE Software  
through the rear Mirror But where to start? Journals and Internet resources have changed dramatically in the past 25 years.  ...  Software technology knowledge has a half-life of less than two years, so you'll inevitably have to look beyond what you know.  ... 
doi:10.1109/ms.2008.141 fatcat:huwa37nvlfgr7bn4gefsadki3y

"If it is too inconvenient I'm not going after it:" Convenience as a critical factor in information-seeking behaviors

Lynn Sillipigni Connaway, Timothy J. Dickey, Marie L. Radford
2011 Library & Information Science Research  
What might convince you to ask a librarian for help using a chat reference service?  ...  How might it be different to use one of more of these forms of communication with a librarian than with colleagues, family, and friends? 6.  ...  These questions can be of any kind --your hobbies, for example; or your future plans; or your major interest. Once again, teach me how you use this website and how it helps you.  ... 
doi:10.1016/j.lisr.2010.12.002 fatcat:55rc3psisrehjgxyereokp7ccm

Networking and Security Issues

محمد الهادی
2013 مجلة الجمعیة المصریة لنظم المعلومات وتکنولوجیا الحاسبات  
Organizations need to share services resources and information but they still need to protect these from people who should not have access to them, while at the same time making those resources available  ...  For instance, the goal could be to disrupt normal business operations, thereby denying data availability and production.  ...  When you want to access the resources offered by the Internet, you don't really connect to the Internet; you connect to a network that is eventually connected to the Internet backbone, a network of extremely  ... 
doi:10.21608/jstc.2013.119825 fatcat:n2mzxdvxx5fvbnls62ih37hjwu

Everything Wired Must CONVERGE

Christopher Elliott
1997 Journal of Business Strategy  
But it will be faster, safer, and more perva- sive than today’s Internet. To be sure, there are obstacles to this kind of convergence.  ...  “This will help it develop its on-line marketing and commerce strategy.”  ... 
doi:10.1108/eb039894 fatcat:b6uwgd3zizac5mu63zgmvwxnf4

Regional Cooperation―Electronic Commerce Impact

Xhensila Abazi, Blandor Abazi
2014 Open Journal of Social Sciences  
Albania is also an attractive tourist destination as a result of its natural beauty and rich cultural heritage but now days it can't be understood the development of a country without considering the others  ...  Albania has a great development potential, deriving its comparative advantages from its geographical position, human resources and physical endowments.  ...  But if anybody can set up a store, how do we know that the store we are purchasing from is genuine? The lowered barriers to entry might be a great attraction to the aspiring e-commerce entrepreneur.  ... 
doi:10.4236/jss.2014.26053 fatcat:cv5bwvh2rzapxd74oapl3lp7nm

Looking to the Future [chapter]

Malcolm Harkins
2013 Managing Risk and Information Security  
A simple case might utilize the device's camera, microphone, and GPS receiver to help authenticate you as the device's owner.  ...  Cars might include a maintenance mode that lets mechanics drive it while when it's being serviced, but only within a radius of a few miles.  ... 
doi:10.1007/978-1-4302-5114-9_8 fatcat:tfi26o2el5al5fppxtj7yv5mfq

Cloud Computing - Key Pillar for Digital India

Kirtan kumar, Rathod R
2016 International Journal of Information Sciences and Techniques  
A lot of departments are showing interest to adopt Cloud technology, but awareness on Cloud security needs to be increased.  ...  The adoption of Cloud is helping organizations innovate, do things faster, become more agile and enhance their revenue stream.  ...  This might not be totally secure and it requires having a strong architecture principle and policy to host data and services to relevant cloud delivery model.  ... 
doi:10.5121/ijist.2016.6203 fatcat:bnmoxty3mbbtlduu3xcbku4bzm

Operating Systems- Now And In The Future

D. Milojicic
1999 IEEE Concurrency  
The market presence might rebalance and realign dominance in low-, mid-, and high-end computer systems, but OS development seems to exist at each level.  ...  Indicators of decline included the reduced number of Unix systems being developed, domination of the Microsoft NT at the lower end, and the attractiveness of the Java and Web research that redirected R  ...  This might sound heretical, but I think that absolute performance becomes increasingly less important as machines get faster.  ... 
doi:10.1109/mcc.1999.749132 fatcat:gnhnntwp5vgxvcmgxgk6ld2hom

Trojan detection using MIB-based IDS / IPS system

Colin Pattinson, Kemal Hajdarevic
2009 2009 XXII International Symposium on Information, Communication and Automation Technologies  
This is can be used to isolate a process to a local spot. Other useful ones might be "HrSWrunPerfCPU" which can see how much CPU is being used at one time to process a process.  ...  Creating a new web site today adds you to this list and practically makes you invisible. Without allocated resources for marketing your store will never be found.  ...  A web site should be designed from the ground up starting with the most important question, "What do you hope to accomplish with your web site?"  ... 
doi:10.1109/icat.2009.5348410 dblp:conf/icatech/PattinsonH09 fatcat:gfxsw7siazhhtbo3xr52saukcm

The Lowly API Is Ready to Step Front and Center

Lee Garber
2013 Computer  
Aggregation Working with individual APIs might be relatively simple, but application development that entails multiple APIs-such as those for storage, email, multimedia, and voice services-can be complex  ...  "Compared to desktop apps or Web apps, mobile apps have less Internet bandwidth and higher network latency, and work with a slower CPU," Brail said.  ... 
doi:10.1109/mc.2013.290 fatcat:jh7l7fohxjcklngok4jo3aaqzm

Internet of Things: A Privacy Law Case Study

Sarah McMahon
2015 Social Science Research Network  
A professor might use this document or portions of it in her classroom, or a student may find this resource useful as a starting point for further research.  ...  Indeed, two of the most discussed topics in the legal profession right now are privacy law and the implications that IoT may have on data privacy and security.  ...  As Jim's friend, you agree to help him scour the internet for resources to find a way to sanction Apple and anyone else who might be responsible for betraying his trust and leaking his personal information  ... 
doi:10.2139/ssrn.2608473 fatcat:d4trwh7du5c5tl53thwmai23he
« Previous Showing results 1 — 15 out of 27,587 results