GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Application software-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (455 pages)
    Edition: 1st ed.
    ISBN: 9783642042805
    Series Statement: IFIP Advances in Information and Communication Technology Series ; v.305
    DDC: 005.1
    Language: English
    Note: Intro -- Title Page -- Preface -- Organization -- Table of Contents -- Session 1: e-Government 1 -- Electronic Voting Using Identity Domain Separation and Hardware Security Modules -- Introduction -- Core Elements of the EVITA Schema -- Encryption Using a Hardware Security Module -- Domain Separation and Identification Model -- Registration Domain - Creation and Use of ssPIN(v) -- Election Domain - Creation and Use of vPIN -- Sketch of the Cast Vote and Counting Phase -- Conclusions -- References -- Electronic Voting by Means of Digital Terrestrial Television: The Infrastructure, Security Issues and a Real Test-Bed -- Introduction -- System Description -- Set-Top-Box, Smart Card and Client Application -- Server Application -- Security Issues -- System Characteristics: An Analysis -- Usability -- Advantages and Drawbacks -- A Real Test Bed (Election Night) -- Conclusions -- References -- Session 2: Security 1 -- Towards User Acceptance of Biometric Technology in E-Government: A Survey Study in the Kingdom of Saudi Arabia -- Introduction -- Background -- E-government -- Saudi Arabia and Its Adoption of Technology -- Digital and Cultural Gap -- Biometric Authentication Technology -- Examples of Biometric Technology in E-government Applications -- Concerns about the Use of Biometric Technology -- Methodology -- Interviews -- Questionnaire -- Data Collection and Analysis -- Results -- Interview Results of Managers -- Questionnaire Results of Government Employees -- Discussion -- Conclusion -- References -- Biovault: Biometrically Based Encryption -- Introduction -- Encryption Using a Secret Key or Biometric Data -- Secret Key Encryption -- Brief Introduction to BioVault Version 3.0 -- Symmetry and Asymmetry -- BioVault Components -- BioVault Mechanism -- Biometric Encryption Using BioVault -- Biometric Encryption Overview. , Biometric Encryption Discussion -- Conclusion -- References -- Session 3: e-Commerce 1 -- Value Encounters - Modeling and Analyzing Co-creation of Value -- Introduction -- Background: Value Modeling -- Motivating Example -- Value Encounter Modeling -- Value Encounter Analysis -- Value Encounter Ontology -- Discussion -- References -- A Model for Value-Added E-Marketplace Provisioning: Case Study from Alibaba.com -- Introduction -- Overview of the Online Marketplace -- Research Method -- Alibaba.com Strategies Analysis -- Trust -- Market -- Search -- Payment -- Tools -- Alibaba.com Industry Analysis and Discussion -- Conclusion -- References -- Networked Virtual Organizations:A Chance for Small and Medium Sized Enterprises on Global Markets -- Introduction -- Business Environment -- Concept of Networked Virtual Organizations -- Features of Networked Virtual Organizations -- NVO Requirements for SMEs -- Two Integrations: Computer Management Systems and Virtual Teams -- Ongoing Research -- Conclusions -- References -- Session 4: Modelling 1 -- A Rule-Based Approach of Creating and Executing Mashups -- Introduction -- Introduction to JSON Rules -- Creating Mashups with JSON Rules -- Monster Job Search -- Google Maps -- Modeling the Mashup Rules -- Towards a Common Sense for Mashup and Software as Service -- Conclusions and Future Work -- References -- Implementing a Rule-Based Contract Compliance Checker -- Introduction -- Contracts and Business Operations -- The EROP Language -- Language Example -- Architecture of the CCC -- Implementation of the CCC -- Implementation of the Relevance Engine -- The EROP Ontology -- The Historical Database -- Translation to Drools -- Declarations in Augmented Drools and EROP -- Actions in EROP and Augmented Drools -- Conditional Structures -- Examples of Translation to Augmented Drools -- Performance Considerations. , Related Work -- Conclusion and Future Work -- References -- Modeling Medical Ethics through Intelligent Agents -- Introduction -- Intelligent Agents and Medical Ethics -- Intelligent Agents in Medicine -- Moral Capacity -- Moral Decisions -- Modelling Morality with Extended Logic Programming -- Conclusions -- References -- Session 5: e-Government 2 -- Requirements for Electronic Delivery Systems in eGovernment - An Austrian Experience -- Introduction -- Requirements and Challenges to eDelivery Systems -- Architectural and Technical Considerations -- The Austrian Delivery System for eGovernment Applications -- Ongoing and Future Work -- Conclusions -- References -- Facilitating Business to Government Interaction Using a Citizen-Centric Web 2.0 Model -- Introduction -- Transforming B2G Service Delivery -- B2G Interaction Modeling Based on a Web 2.0 Citizen-Centric Model -- MyCPP Platform -- Architecture -- Integration Layer -- Interaction Layer -- Application Layer -- Case Study -- Conclusions -- References -- Empowerment through Electronic Mandates - Best Practice Austria -- Introduction -- The Austrian E-ID System at a Glance -- Scenarios and Types of Representations -- Types of Representations -- Chained Mandates -- The Concept of Electronic Mandates in Austria -- Specialtiy: Professional Representatives -- Conclusions -- References -- Session 6: Security 2 -- Not All Adware Is Badware: Towards Privacy-Aware Advertising -- Introduction -- Advertising Basics -- The Privad Framework -- Profiling -- Ad Database Dissemination -- Related Work -- Future Directions and Conclusions -- References -- The Step Method - Battling Identity Theft Using E-Retailers' Websites -- Introduction -- Research Methodology -- Findings -- Trust-Building Information -- Empowering Information - How Customers Can Protect Themselves. , Supporting Information - What Companies Do When Identity Fraud Occurs -- Types of Information Policies on Websites -- Discussion -- "S" for Support -- "T" for Trust -- "E" for Empowerment -- "P" for Prevention -- Conclusion -- References -- Proposal and Implementation of SSH Client System Using Ajax -- Introduction -- Elemental Technologies -- Outline of Ajax -- Outline of SSH -- Existing Systems -- Outline of Existing Systems -- Problems of Existing Systems -- Proposed System -- Concept -- System Configurations -- Operation Outline -- Implementation -- Operation Check -- Support of Cell Phone -- Evaluations of Proposed System -- Safety Evaluation -- Performance Evaluation -- Conclusion -- References -- Session 7: e-Commerce 2 -- Smart Order Routing Technology in the New European Equity Trading Landscape -- Introduction -- Related Literature -- Methodology, Data and Assumptions -- Hypothesis and Statistical Testing -- Instrument and Market Choice -- Description of the Data Set -- Data Handling and Data Cleaning -- Results -- Conclusion -- References -- Algorithmic Trading Engines and Liquidity Contribution: The Blurring of "Traditional" Definitions -- Introduction -- Related Work and Derived Hypotheses -- Description of the Market and the Dataset -- Xetra Trading System -- Dataset -- Evaluation of Order Lifespan -- Evaluation of Order Types -- Evaluation of Liquidity Measures -- Pure Order Volume -- Option Value -- Passive Trading Counterparty -- Results -- Conclusion -- References -- Anonymous, Yet Trustworthy Auctions -- Introduction -- Requirements -- Assumptions and Notations -- Building Blocks -- Guarantees -- Bonuses and Compensations -- Design of an Anonymous, Yet Trustworthy Auction System -- Initial Certification -- Registration and Trust Calculation -- Auctions -- Updating Credentials -- Evaluation -- Related Work. , Conclusion and Future Work -- References -- Session 8: Modelling 2 -- Realizing Mobile Web Services for Dynamic Applications -- Introduction -- Existing and Related Work -- A Flexible Mobile Service Architecture -- An Example Configuration for Mobile Web Services -- Prototype Implementation and Use Case Scenario -- Conclusion and Future Work -- References -- Modifying the Balanced Scorecard for a Network Industry -- Introduction -- Theoretical Foundations of the BSC -- The Balanced Scorecard -- Literature Review -- Deriving a BSC for a Clearing House -- Central Counterparty Clearing -- The European Clearing Industry -- Stakeholders of a Clearing House -- Company Visions of Clearing Houses -- The Modified BSC for a Clearing House -- Validating the BSC -- Case Study -- Cause-and-Effect Relationships within the Modified BSC -- Conclusion and Further Research -- References -- Dynamic Component Selection for SCA Applications -- Introduction -- Related Work -- Service Component Architecture -- SCA Example Application -- Abstract and Concrete Composition -- SCA Applications as Composition Trees -- Transformation of Tree -- Semantic Description -- System Architecture and Implementation -- Architectural Components -- Implementation -- Evaluation -- Conclusions and Future Work -- References -- Session 9: User Interactions -- How to Research People's First Impressions of Websites? Eye-Tracking as a Usability Inspection Method and Online Focus Group Research -- Introduction -- Method -- Participants -- Eye Tracking and Online Focus Group Research on the Hungarian Governmental Portal -- Eye Tracking Research -- Results of the Eye Tracking Research -- Online Focus Group Research -- Discussion -- The Eye Tracking Research -- The Online Focus Group -- Semantic Differential -- Incomplete Sentences -- Conclusion -- References. , Transforming Collaborative Process Models into Interface Process Models by Applying an MDA Approach.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Forschungsbericht ; Wasserversorgung
    Type of Medium: Online Resource
    Pages: 1 Online-Ressource (122 Seiten, 7,80 MB) , Illustrationen, Diagramme
    Language: German
    Note: Förderkennzeichen BMBF 16KIS0202K. - Verbund-Nummer 01157282 , Paralleltitel dem englischen Berichtsblatt entnommen , Autoren dem Berichtsblatt entnommen , Unterschiede zwischen dem gedruckten Dokument und der elektronischen Ressource können nicht ausgeschlossen werden , Sprache der Zusammenfassung: Deutsch, Englisch
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Forschungsbericht ; Aufsatzsammlung ; Anwendungssystem ; Softwareentwicklung ; Wissensmanagement ; Entwurfssprache ; UML
    Type of Medium: Online Resource
    Pages: 541 S , graph. Darst , Digitalisierungsvorlage: Primärausg.
    Edition: Online-Ausg. Berlin SRZ 2008 Online-Ressource (547 S., 43,17 MB)
    ISBN: 3936771804
    DDC: 650
    Language: German
    Note: Förderkennzeichen BMBF 01ISC06A/B - 01ISC06D/E. - Verbund-Nr. 01030425 , TIB Hannover , Systemvoraussetzungen: Acrobat reader.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Forschungsbericht
    Type of Medium: Online Resource
    Pages: Online-Ressource (554 S., 15,1 MB) , graph. Darst
    Language: German
    Note: Förderkennzeichen BMBF 01 IS C06 A/B - 01 IS C06 D/E. - Verbund-Nr. 01030425. - Mit engl. Zsfassung , Unterschiede zwischen dem gedruckten Dokument und der elektronischen Ressource können nicht ausgeschlossen werden. - Auch als gedr. Ausg. vorhanden , Systemvoraussetzungen: Acrobat reader.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Forschungsbericht ; Kaizen ; Gamification ; Vorschlagswesen ; Klein- und Mittelbetrieb
    Type of Medium: Online Resource
    Pages: 1 Online-Ressource (311 Seiten, 4,74 MB) , Illustrationen
    Language: German
    Note: Förderkennzeichen AiF 19841 N , Literaturverzeichnis: Seite 268-297
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...