Filters








102 Hits in 6.8 sec

E-Commerce Security: No Silver Bullet [chapter]

Anup K. Ghosh
1999 Database Security XII  
The discovery of this bug in the Internet Explorer has resulted in careful scrutiny of the Internet Explorer software, resulting in yet more security bug findings by groups at MIT and the University of  ...  WEAK LlNKS Electronic commerce systems are of ten implemented as a three-tiered architecture consisting of client software, network server software, and back-end databases.  ... 
doi:10.1007/978-0-387-35564-1_1 fatcat:5ry5zyy3w5aerapptgmiltyeo4

Sustainable and Security Focused Multimodal Models for Distance Learning

Vacius Jusas, Rita Butkiene, Algimantas Venčkauskas, Šarūnas Grigaliūnas, Daina Gudoniene, Renata Burbaite, Boriss Misnevs
2022 Sustainability  
The research aims to develop a sustainable strategy based on a security concept model that consists of three main components: (1) security assurance; (2) users, including administration, teachers, and  ...  The problem addressed in the paper is related to the increased necessity for the capacity of data, secure infrastructure, Wi-Fi possibilities, and equipment, learning resources which are needed when students  ...  [24] identified ten deadly cybersecurity threats during the COVID-19 pandemic.  ... 
doi:10.3390/su14063414 doaj:a265a498197041cebb7f10fee1556bda fatcat:aq64nd4p5nbcxawlxp7ttv3oc4

Security of Virtual Private Networks

James S. Tiller
2001 Information Systems Security  
Moats were filled, traps were laid, and deadly focal points were engineered to halt an attack.  ...  In contrast, there are tens of thousands of ISPs worldwide that can provide access to the Internet, not including the very large ISPs that provide phone numbers globally.  ...  The Internet has grown to permeate our lives and daily activities, but there has always been a line drawn in the sand by which separation  ... 
doi:10.1201/1086/43313.10.1.20010304/31393.5 fatcat:4amup2smqnddpp64hxjfj3e6pa

Archetypical Approaches of Fast Software Development and Slow Embedded Projects

Ulrik Eklund, Jan Bosch
2013 2013 39th Euromicro Conference on Software Engineering and Advanced Applications  
The approaches range from "traditional" stage-gate projects focusing on product qualities and large integration efforts, to fast development in short loops by autonomous teams based on a composable software  ...  The model allows an research & development(R&D) organisation to identify where it is positioned and to evolve its software development approach.  ...  ACKNOWLEDGMENT This work has been financially supported by the Swedish Agency for Innovation Systems (VINNOVA) and Volvo Car Corporation within the partnership for Strategic Vehicle Research and Innovation  ... 
doi:10.1109/seaa.2013.38 dblp:conf/euromicro/EklundB13 fatcat:mkgryetjhvdi7nrix36q2oqcaq

Big data: Welcome to the petacentre

Cory Doctorow
2008 Nature  
DOCTOROW "If the emergency system didn't come on the temperature would hit 42 °C in ten minutes." : the data centre at the Wellcome Trust Sanger Institute in Cambridge, UK, under development.  ...  These are the PetaBoxes, the Internet Archive's web-in-a-box systems.  ... 
doi:10.1038/455016a pmid:18769411 fatcat:4oqadpj6fzedhoqqu5zudtiioi

From Maintenance to Evolutionary Development of Web Applications: A Pragmatic Approach [chapter]

Rudolf Ramler, Klaus Wolfmaier, Edgar Weippl
2004 Lecture Notes in Computer Science  
This paper discusses the use of conventional methods and tools for maintenance and change management as an infrastructure for evolutionary development of Web applications.  ...  Development of Web applications is dynamic by its very nature. Web development processes have to facilitate a Web application's continual refinement and evolution based on feedback from end-users.  ...  This work has accrued in the framework of the K-plus Competence Center Program, which is funded by the Austrian Government, the Province of Upper Austria and the Chamber of Commerce of Upper Austria.  ... 
doi:10.1007/978-3-540-27834-4_36 fatcat:ihhrsqjvbrh2bph7zbovm5mei4

Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks

Shalini Kumari H. A
2012 IOSR Journal of Computer Engineering  
A Hybrid Wireless Sensor network (HWSN) with static and mobile nodes is considered. Static sensors monitor the environment and report events occurring in the sensing field.  ...  Mobile sensor will collect the information about the event and in turn will send it to the base station.  ...  Acknowledgment We are thankful Software Engineering Research Group at University of Malakand (SERG_UOM) for the Review and their valuable comments in validation process of the protocol.  ... 
doi:10.9790/0661-0320105 fatcat:j3oxmdkdfbdath32olceuftbm4

Cybersecurity and Countermeasures at the Time of Pandemic

Rabie A. Ramadan, Bassam W. Aboshosha, Jalawi Sulaiman Alshudukhi, Abdullah J. Alzahrani, Ayman El-Sayed, Mohamed M. Dessouky, Muhammad Arif
2021 Journal of Advanced Transportation  
This paper surveys the cybersecurity attacks and their countermeasures and reports the ongoing cybersecurity attacks and threats at this period of time.  ...  This paper then classifies the cybersecurity attacks and threats at the period of COVID-19 and provides recommendations and countermeasures for each type.  ...  the Internet.  ... 
doi:10.1155/2021/6627264 fatcat:knguxbwufvan5ip5cm3tdaczdm

Competence of IT Professionals in E-Business Venture Teams: The Effect of Experience and Expertise on Preference Structure

Tobias Kollmann, Matthias Häsel, Nicola Breugst
2009 Journal of Management Information Systems  
Ten deadly risks in Internet and intranet software development. /EEE Soft- ware, 19, 2 (2002), 12-14. 78. Rossiter, J.R. The C-OAR-SE procedure for scale development in marketing.  ...  software development teams.  ... 
doi:10.2753/mis0742-1222250402 fatcat:p5yjyj55ezdvtpw4z5su5h7vzy

Online Education in Promoting Continued Education during Coronavirus Outbreak in Zimbabwe: 'Challenges and Solutions'

Cassim Silumba, Show Chibango
2020 Asian Journal of Interdisciplinary Research  
The idea of social-distancing and self-isolation has resulted in the closures of schools, universities and colleges as Ministry of Primary and Secondary Education try to control the spread of the contagious  ...  Snowballing, interviews, observations and document reviews were made use of in gathering the data for this article.  ...  (Kalaivani, 2014) concurs with (Guragain, 2016) by arguing that in e-learning the instructional material and content may be delivered by any one of all electronic media including the internet, intranet  ... 
doi:10.34256/ajir2047 fatcat:ks3s6okpnfflrogdmdlofjf42a

Page 78 of Journal of Management Information Systems Vol. 25, Issue 4 [page]

Journal of Management Information Systems  
Ten deadly risks in Internet and intranet software development. /EEE Soft- ware, 19, 2 (2002), 12-14. 78. Rossiter, J.R. The C-OAR-SE procedure for scale development in marketing.  ...  ., and Jorgensen, M. Expert estimation of Web-development projects: Are software professionals in technical roles more optimistic than those in non-technical roles?  ... 

Against the Odds: Managing the Unmanagable in a Time of Crisis [chapter]

Diomidis Spinellis
2014 Lecture Notes in Computer Science  
This experience report details some unconventional measures, tools, and techniques that were adopted to sidestep the barriers in a time of crisis.  ...  On balance, it demonstrates that in any large organization there are ample opportunities to bring about change, even against considerable odds.  ...  Acknowledgements I am immensely grateful to the countless permanent gsis employees as well as the advisors and the seconded members of our team who worked during my term with zeal and diligence to achieve  ... 
doi:10.1007/978-3-319-07881-6_3 fatcat:aap5v5krxreq3k7ebmstku6gku

Information technologies and Indigenous communities

Lyndon Ormond-Parker, Aaron Corn
2019 Archives and Manuscripts  
In addition, considerable inkind support was received from the Northern Territory Library, Ngaanyatjarra Media (Aboriginal Corporation), Warlpiri Education and Training Trust, Warlpiri IK Youth Development  ...  Acknowledgments The authors would like to thank former mayor Desmond Tayley and the elected councillors of the Wujal Wujal Aboriginal Shire Council for facilitating our study of mobile technology in their  ...  developed and delivered the software.  ... 
doi:10.1080/01576895.2019.1587809 fatcat:676oulyhmnaj3hoeluavwyeklm

Knowing in Practice: Enacting a Collective Capability in Distributed Organizing

Wanda J. Orlikowski
2002 Organization science (Providence, R.I.)  
In interpreting the findings of an empirical study conducted in a geographically dispersed hightech organization, I suggest that the competence to do global product development is both collective and distributed  ...  Endnote 1 Names of the firm, its organizational units, products, and locations have all been disguised.  ...  She would like to thank Bruce Kogut and the anonymous reviewers for their very helpful comments in her revisions of this paper.  ... 
doi:10.1287/orsc.13.3.249.2776 fatcat:mk3rg4yaoraprars4lgvvclkja

Gangs in a Global Comparative Perspective [chapter]

Dennis Rodgers, Jennifer M. Hazen
2014 Global Gangs  
Choose a location, establish your connection to the Internet, run the software to establish your WiFi presence in the targeted location, and the software does the rest.  ...  Brazilians are generally not common users of internet security protection software and many internet users lack basic cyber security knowledge. 15 Moreover, in Brazil there is widespread use of pirated  ...  The book describes how the internet is used for 'washing' illicit proceeds of crime and explores the problematic aspects of cyberlaundering, in particular how it manifests itself in practice, whether current  ... 
doi:10.5749/minnesota/9780816691470.003.0001 fatcat:cby7mjoiqradni64s7eqhyxwqm
« Previous Showing results 1 — 15 out of 102 results