A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
E-Commerce Security: No Silver Bullet
[chapter]
1999
Database Security XII
The discovery of this bug in the Internet Explorer has resulted in careful scrutiny of the Internet Explorer software, resulting in yet more security bug findings by groups at MIT and the University of ...
WEAK LlNKS Electronic commerce systems are of ten implemented as a three-tiered architecture consisting of client software, network server software, and back-end databases. ...
doi:10.1007/978-0-387-35564-1_1
fatcat:5ry5zyy3w5aerapptgmiltyeo4
Sustainable and Security Focused Multimodal Models for Distance Learning
2022
Sustainability
The research aims to develop a sustainable strategy based on a security concept model that consists of three main components: (1) security assurance; (2) users, including administration, teachers, and ...
The problem addressed in the paper is related to the increased necessity for the capacity of data, secure infrastructure, Wi-Fi possibilities, and equipment, learning resources which are needed when students ...
[24] identified ten deadly cybersecurity threats during the COVID-19 pandemic. ...
doi:10.3390/su14063414
doaj:a265a498197041cebb7f10fee1556bda
fatcat:aq64nd4p5nbcxawlxp7ttv3oc4
Security of Virtual Private Networks
2001
Information Systems Security
Moats were filled, traps were laid, and deadly focal points were engineered to halt an attack. ...
In contrast, there are tens of thousands of ISPs worldwide that can provide access to the Internet, not including the very large ISPs that provide phone numbers globally. ...
The Internet has grown to permeate our lives and daily activities, but there has always been a line drawn in the sand by which separation ...
doi:10.1201/1086/43313.10.1.20010304/31393.5
fatcat:4amup2smqnddpp64hxjfj3e6pa
Archetypical Approaches of Fast Software Development and Slow Embedded Projects
2013
2013 39th Euromicro Conference on Software Engineering and Advanced Applications
The approaches range from "traditional" stage-gate projects focusing on product qualities and large integration efforts, to fast development in short loops by autonomous teams based on a composable software ...
The model allows an research & development(R&D) organisation to identify where it is positioned and to evolve its software development approach. ...
ACKNOWLEDGMENT This work has been financially supported by the Swedish Agency for Innovation Systems (VINNOVA) and Volvo Car Corporation within the partnership for Strategic Vehicle Research and Innovation ...
doi:10.1109/seaa.2013.38
dblp:conf/euromicro/EklundB13
fatcat:mkgryetjhvdi7nrix36q2oqcaq
Big data: Welcome to the petacentre
2008
Nature
DOCTOROW "If the emergency system didn't come on the temperature would hit 42 °C in ten minutes." : the data centre at the Wellcome Trust Sanger Institute in Cambridge, UK, under development. ...
These are the PetaBoxes, the Internet Archive's web-in-a-box systems. ...
doi:10.1038/455016a
pmid:18769411
fatcat:4oqadpj6fzedhoqqu5zudtiioi
From Maintenance to Evolutionary Development of Web Applications: A Pragmatic Approach
[chapter]
2004
Lecture Notes in Computer Science
This paper discusses the use of conventional methods and tools for maintenance and change management as an infrastructure for evolutionary development of Web applications. ...
Development of Web applications is dynamic by its very nature. Web development processes have to facilitate a Web application's continual refinement and evolution based on feedback from end-users. ...
This work has accrued in the framework of the K-plus Competence Center Program, which is funded by the Austrian Government, the Province of Upper Austria and the Chamber of Commerce of Upper Austria. ...
doi:10.1007/978-3-540-27834-4_36
fatcat:ihhrsqjvbrh2bph7zbovm5mei4
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks
2012
IOSR Journal of Computer Engineering
A Hybrid Wireless Sensor network (HWSN) with static and mobile nodes is considered. Static sensors monitor the environment and report events occurring in the sensing field. ...
Mobile sensor will collect the information about the event and in turn will send it to the base station. ...
Acknowledgment We are thankful Software Engineering Research Group at University of Malakand (SERG_UOM) for the Review and their valuable comments in validation process of the protocol. ...
doi:10.9790/0661-0320105
fatcat:j3oxmdkdfbdath32olceuftbm4
Cybersecurity and Countermeasures at the Time of Pandemic
2021
Journal of Advanced Transportation
This paper surveys the cybersecurity attacks and their countermeasures and reports the ongoing cybersecurity attacks and threats at this period of time. ...
This paper then classifies the cybersecurity attacks and threats at the period of COVID-19 and provides recommendations and countermeasures for each type. ...
the Internet. ...
doi:10.1155/2021/6627264
fatcat:knguxbwufvan5ip5cm3tdaczdm
Competence of IT Professionals in E-Business Venture Teams: The Effect of Experience and Expertise on Preference Structure
2009
Journal of Management Information Systems
Ten deadly risks in Internet and intranet software development. /EEE Soft- ware, 19, 2 (2002), 12-14.
78. Rossiter, J.R. The C-OAR-SE procedure for scale development in marketing. ...
software development teams. ...
doi:10.2753/mis0742-1222250402
fatcat:p5yjyj55ezdvtpw4z5su5h7vzy
Online Education in Promoting Continued Education during Coronavirus Outbreak in Zimbabwe: 'Challenges and Solutions'
2020
Asian Journal of Interdisciplinary Research
The idea of social-distancing and self-isolation has resulted in the closures of schools, universities and colleges as Ministry of Primary and Secondary Education try to control the spread of the contagious ...
Snowballing, interviews, observations and document reviews were made use of in gathering the data for this article. ...
(Kalaivani, 2014) concurs with (Guragain, 2016) by arguing that in e-learning the instructional material and content may be delivered by any one of all electronic media including the internet, intranet ...
doi:10.34256/ajir2047
fatcat:ks3s6okpnfflrogdmdlofjf42a
Page 78 of Journal of Management Information Systems Vol. 25, Issue 4
[page]
Journal of Management Information Systems
Ten deadly risks in Internet and intranet software development. /EEE Soft- ware, 19, 2 (2002), 12-14.
78. Rossiter, J.R. The C-OAR-SE procedure for scale development in marketing. ...
., and Jorgensen, M. Expert estimation of Web-development projects: Are software professionals in technical roles more optimistic than those in non-technical roles? ...
Against the Odds: Managing the Unmanagable in a Time of Crisis
[chapter]
2014
Lecture Notes in Computer Science
This experience report details some unconventional measures, tools, and techniques that were adopted to sidestep the barriers in a time of crisis. ...
On balance, it demonstrates that in any large organization there are ample opportunities to bring about change, even against considerable odds. ...
Acknowledgements I am immensely grateful to the countless permanent gsis employees as well as the advisors and the seconded members of our team who worked during my term with zeal and diligence to achieve ...
doi:10.1007/978-3-319-07881-6_3
fatcat:aap5v5krxreq3k7ebmstku6gku
Information technologies and Indigenous communities
2019
Archives and Manuscripts
In addition, considerable inkind support was received from the Northern Territory Library, Ngaanyatjarra Media (Aboriginal Corporation), Warlpiri Education and Training Trust, Warlpiri IK Youth Development ...
Acknowledgments The authors would like to thank former mayor Desmond Tayley and the elected councillors of the Wujal Wujal Aboriginal Shire Council for facilitating our study of mobile technology in their ...
developed and delivered the software. ...
doi:10.1080/01576895.2019.1587809
fatcat:676oulyhmnaj3hoeluavwyeklm
Knowing in Practice: Enacting a Collective Capability in Distributed Organizing
2002
Organization science (Providence, R.I.)
In interpreting the findings of an empirical study conducted in a geographically dispersed hightech organization, I suggest that the competence to do global product development is both collective and distributed ...
Endnote 1 Names of the firm, its organizational units, products, and locations have all been disguised. ...
She would like to thank Bruce Kogut and the anonymous reviewers for their very helpful comments in her revisions of this paper. ...
doi:10.1287/orsc.13.3.249.2776
fatcat:mk3rg4yaoraprars4lgvvclkja
Gangs in a Global Comparative Perspective
[chapter]
2014
Global Gangs
Choose a location, establish your connection to the Internet, run the software to establish your WiFi presence in the targeted location, and the software does the rest. ...
Brazilians are generally not common users of internet security protection software and many internet users lack basic cyber security knowledge. 15 Moreover, in Brazil there is widespread use of pirated ...
The book describes how the internet is used for 'washing' illicit proceeds of crime and explores the problematic aspects of cyberlaundering, in particular how it manifests itself in practice, whether current ...
doi:10.5749/minnesota/9780816691470.003.0001
fatcat:cby7mjoiqradni64s7eqhyxwqm
« Previous
Showing results 1 — 15 out of 102 results