


default search action
9. I3E 2009: Nancy, France
- Claude Godart, Norbert Gronau, Sushil K. Sharma, Gérôme Canals:

Software Services for e-Business and e-Society, 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, Nancy, France, September 23-25, 2009. Proceedings. IFIP 305, Springer 2009, ISBN 978-3-642-04279-9
e-Government 1
- Thomas Rössler:

Electronic Voting Using Identity Domain Separation and Hardware Security Modules. 1-12 - Roberto Caldelli

, Rudy Becarelli, Francesco Filippini, Francesco Picchioni, Riccardo Giorgetti:
Electronic Voting by Means of Digital Terrestrial Television: The Infrastructure, Security Issues and a Real Test-Bed. 13-25
Security 1
- Thamer Alhussain, Steve Drew:

Towards User Acceptance of Biometric Technology in E-Government: A Survey Study in the Kingdom of Saudi Arabia. 26-38 - Bobby L. Tait

, Sebastiaan H. von Solms:
Biovault: Biometrically Based Encryption. 39-50
e-Commerce 1
- Hans Weigand:

Value Encounters - Modeling and Analyzing Co-creation of Value. 51-64 - Hong Hong Qing, Zi Shan Xue:

A Model for Value-Added E-Marketplace Provisioning: Case Study from Alibaba.com. 65-72 - Wojciech Cellary

:
Networked Virtual Organizations: A Chance for Small and Medium Sized Enterprises on Global Markets. 73-81
Modelling 1
- Emilian Pascalau, Adrian Giurca:

A Rule-Based Approach of Creating and Executing Mashups. 82-95 - Massimo Strano, Carlos Molina-Jiménez, Santosh K. Shrivastava:

Implementing a Rule-Based Contract Compliance Checker. 96-111 - José Machado

, Miguel F. M. Miranda, António Abelha
, José Neves
, João Neves
:
Modeling Medical Ethics through Intelligent Agents. 112-122
e-Government 2
- Arne Tauber:

Requirements for Electronic Delivery Systems in eGovernment - An Austrian Experience. 123-133 - Alexandros Dais, Mara Nikolaidou, Dimosthenis Anagnostopoulos:

Facilitating Business to Government Interaction Using a Citizen-Centric Web 2.0 Model. 134-147 - Thomas Rössler:

Empowerment through Electronic Mandates - Best Practice Austria. 148-160
Security 2
- Hamed Haddadi, Saikat Guha, Paul Francis:

Not All Adware Is Badware: Towards Privacy-Aware Advertising. 161-172 - Marion Schulze, Mahmood Hussain Shah

:
The Step Method - Battling Identity Theft Using E-Retailers' Websites. 173-183 - Yusuke Kosuda, Ryôichi Sasaki:

Proposal and Implementation of SSH Client System Using Ajax. 184-196
e-Commerce 2
- Bartholomäus Ende, Peter Gomber, Marco Lutat:

Smart Order Routing Technology in the New European Equity Trading Landscape. 197-209 - Sven S. Groth:

Algorithmic Trading Engines and Liquidity Contribution: The Blurring of "Traditional" Definitions. 210-224 - Prasit Bikash Chanda, Vincent Naessens, Bart De Decker:

Anonymous, Yet Trustworthy Auctions. 225-239
Modelling 2
- Sonja Zaplata, Viktor Dreiling, Winfried Lamersdorf:

Realizing Mobile Web Services for Dynamic Applications. 240-254 - Michael Chlistalla, Torsten Schaper:

Modifying the Balanced Scorecard for a Network Industry The Case of the Clearing Industry. 255-271 - Djamel Belaïd, Hamid Mukhtar

, Alain Ozanne, Samir Tata:
Dynamic Component Selection for SCA Applications. 272-286
User Interactions
- Csilla Herendy

:
How to Research People's First Impressions of Websites? Eye-Tracking as a Usability Inspection Method and Online Focus Group Research. 287-300 - Ivanna M. Lazarte

, Omar Chiotti
, Pablo David Villarreal:
Transforming Collaborative Process Models into Interface Process Models by Applying an MDA Approach. 301-315 - Tuomas Lehto, Harri Oinas-Kukkonen:

The Persuasiveness of Web-Based Alcohol Interventions. 316-327
Simulation
- Yumiko Kinoshita:

Analysis of Macro-micro Simulation Models for Service-Oriented Public Platform: Coordination of Networked Services and Measurement of Public Values. 328-340 - Marco Remondino

, Marco Pironti, Paola Pisano
:
Enterprise Networks for Competences Exchange: A Simulation Model. 341-356 - Elena Orta

, Mercedes Ruiz
, Miguel Toro
:
Analyzing Strategic Business Rules through Simulation Modeling. 357-368
Security 3
- Renato Iannella:

Towards E-Society Policy Interoperability. 369-384 - Torsten Schaper:

Integrating the European Securities Settlement. 385-399 - Khaled Gaaloul, François Charoy:

Task Delegation Based Access Control Models for Workflow Systems. 400-414
Modelling 3
- Olli Sjöblom:

Data Refining for Text Mining Process in Aviation Safety Data. 415-426 - Luz-María Priego-Roche, Dominique Rieu, Agnès Front:

A 360degree Vision for Virtual Organizations Characterization and Modelling: Two Intentional Level Aspects. 427-442

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














