Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Privacy (3)
- Business Model (2)
- Computer Forensics (2)
- Critical Infrastructure Assurance (2)
- Data disposal (2)
-
- Data recovery (2)
- Digital Forensics (2)
- Digital forensics (2)
- EMI/EMC Protection (2)
- Education (2)
- Electronic data destruction (2)
- Information Systems. (2)
- Intentional EMI (2)
- Network economic effects (2)
- System Effects and Hardening (2)
- System Vulnerabilities (2)
- Access control (1)
- Analysis (1)
- Annotation (1)
- Bayesian Network (1)
- Blogs (1)
- Business Models (1)
- Cable modem (1)
- Cellular Network and Telecommunication Operators (1)
- Civil Procedure (1)
- Complex systems (1)
- Computer forensics (1)
- Computer law (1)
- Computer security (1)
- Confusion Matrix (1)
- Publication
- Publication Type
Articles 31 - 38 of 38
Full-Text Articles in Computer Engineering
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Towards A Business Model For Cellular Network And Telecommunication Operators: A Theoretical Framework, Mutaz M. Al-Debei, Ramzi El-Haddadeh, David Avison
Towards A Business Model For Cellular Network And Telecommunication Operators: A Theoretical Framework, Mutaz M. Al-Debei, Ramzi El-Haddadeh, David Avison
Dr. Mutaz M. Al-Debei
Cellular networks and telecommunications bring major change to the way businesses are conducted. Mobility has become one of the main priorities for users and this has impacted on cellular networks and telecommunication operators (CNTOs). However, entrants into the cellular industry have been confounded primarily by inexistent or weak Business Models (BMs). Designing a BM for a CNTO is complex and requires multiple actors to balance different and often conflicting design requirements. Nevertheless, most research about CNTOs has been technically oriented and has mainly addressed the technological and engineering issues related to their infrastructure. Less attention has been given to the …
Defining The Business Model In The New World Of Digital Business, Mutaz M. Al-Debei, Ramzi El-Haddadeh, David Avison
Defining The Business Model In The New World Of Digital Business, Mutaz M. Al-Debei, Ramzi El-Haddadeh, David Avison
Dr. Mutaz M. Al-Debei
Recent rapid advances in ICTs, specifically in Internet and mobile technologies, have highlighted the rising importance of the Business Model (BM) in Information Systems (IS). Despite agreement on its importance to an organization’s success, the concept is still fuzzy and vague, and there is no consensus regarding its definition. Furthermore, understanding the BM domain by identifying its meaning, fundamental pillars, and its relevance to other business concepts is by no means complete. In this paper we aim to provide further clarification by first presenting a classification of definitions found in the IS literature; second, proposing guidelines on which to develop …
Technology-Aided Participative Methods In Environmental Assessment: An International Perspective, Ainhoa Gonzalez, Alan Gilmer, Ronan Foley, John Sweeney, John Fry
Technology-Aided Participative Methods In Environmental Assessment: An International Perspective, Ainhoa Gonzalez, Alan Gilmer, Ronan Foley, John Sweeney, John Fry
Articles
Provisions for citizen involvement in the assessment of potential environmental effects of certain plans, programmes and projects are present in current legislation. An international survey revealed that public participation is common practice in European and some other countries worldwide. However, a number of issues are observed to affect public involvement in EIA/SEA processes and expert opinion differs when evaluating the effectiveness of existing participative methods. Results suggest that technology-aided methods can improve traditional participation processes. In particular, GIS has the potential to increase community knowledge and enhance involvement by communicating information more effectively. Variable accessibility to technology and data quality …
Who Is Reading The Data On Your Old Computer?, Vivienne Mee
Who Is Reading The Data On Your Old Computer?, Vivienne Mee
Journal of Digital Forensics, Security and Law
Researchers at Rits Information Security performed a study in how the Irish population disposes of their old computers. How would you dispose of your old computer, or how would the company you work for dispose of their old computers?
The majority of Irish homeowners, would bring their old computers to local civic amenity centres, give it away to a relative or sell it on to another party.
Some organisations would give their old equipment to a staff member, as a gift gesture, others may simply discard in the local civic amenity site.
What is wrong with the methods currently being …
Analysis Of Information Remaining On Hand Held Devices Offered For Sale On The Second Hand, Andy Jones, Craig Valli, Iain Sutherland
Analysis Of Information Remaining On Hand Held Devices Offered For Sale On The Second Hand, Andy Jones, Craig Valli, Iain Sutherland
Journal of Digital Forensics, Security and Law
The ownership and use of mobile phones, Personal Digital Assistants and other hand held devices is now ubiquitous both for home and business use. The majority of these devices have a high initial cost, a relatively short period before they become obsolescent and a relatively low second hand value. As a result of this, when the devices are replaced, there are indications that they tend to be discarded. As technology has continued to develop, it has led to an increasing diversity in the number and type of devices that are available, and the processing power and the storage capacity of …
Book Review: The Dotcrime Manifesto: How To Stop Internet Crime, Gary C. Kessler
Book Review: The Dotcrime Manifesto: How To Stop Internet Crime, Gary C. Kessler
Journal of Digital Forensics, Security and Law
No abstract provided.
Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler
Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler
Journal of Digital Forensics, Security and Law
Apple's hold on the personal computer marketplace started dwindling on August 12, 1981, the day that the IBM PC was introduced. As an Apple ][+ bigot myself, I refused to touch a PC for some years. But I was also a command line bigot, so when the first Macintosh was introduced in 1983 and hermetically sealed the operating system from users, I did not go out and buy one. In fact, like many of my era, I did eventually end up on the PC side which, ironically, let me do many of the things that my trusty Apple ][+ had …