1 - 6 of 6 articles
The rapid adoption of the Web as a commercial medium has caused firms to experiment with innovative ways of doing business. Those firms that effectively market themselves on the Web have a distinct advantage. This paper presents two e‐commerce Web site design strategies and 12 e‐commerce models...
Information technologies have ushered in a new era for computer‐related communications. Use of the Internet for commercial applications and resource sharing has accelerated in recent years as well. Owing to such developments, computer security has become a critical issue nowadays. In some...
The security aspects of public sector information systems are important as the respective systems are often part of critical infrastructures or deal with personal or sensitive data. A set of 53 Greek public sector organizations were investigated by means of a structured questionnaire concerning...
Risk analysis, concentrating on assets, threats and vulnerabilities, used to play a major role in helping to identify the most effective set of security controls to protect information technology resources. To successfully protect information, the security controls must not only protect the...
Intrusions exploit vulnerabilities and introduce external disturbances into information systems to compromise security attributes of information systems such as availability, integrity, and confidentiality. Intrusions into information systems cause faults of software and hardware components in...
In this paper we consider the use of ontologies as the basis for structuring and simplifying the process of constructing real‐time problem‐solving tools, focusing specifically on the task of production scheduling. In spite of the commonality in production scheduling system requirements and...
Read and print from thousands of top scholarly journals.
Continue with Facebook
Sign up with Google
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.