Evaluating complex identity management systems - the futureid approach
暂无分享,去创建一个
[1] Jan Muntermann,et al. Mobile Emergency Management Services Targeting Large Public Events , 2011, Int. J. Serv. Sci. Manag. Eng. Technol..
[2] Jay F. Nunamaker,et al. Systems Development in Information Systems Research , 1990, J. Manag. Inf. Syst..
[3] Joan Feigenbaum,et al. Economic Barriers to the Deployment of Existing Privacy Technologies , 2002 .
[4] Jan Zibuschka,et al. A Structured Approach to the Design of Viable Security Systems , 2012 .
[5] Heiko Rossnagel,et al. On Diffusion and Confusion - Why Electronic Signatures Have Failed , 2006, TrustBus.
[6] Alan R. Hevner,et al. Design Science in Information Systems Research , 2004, MIS Q..
[7] Les Gasser,et al. A Design Theory for Systems That Support Emergent Knowledge Processes , 2002, MIS Q..
[8] Adir Even,et al. Data quality assessment in context: A cognitive perspective , 2009, Decis. Support Syst..
[9] Victor Raskin,et al. The user non-acceptance paradigm: INFOSEC's dirty little secret , 2004, NSPW '04.