• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 319
  • 88
  • 30
  • 25
  • 15
  • 6
  • 6
  • 5
  • 5
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 589
  • 589
  • 198
  • 165
  • 111
  • 99
  • 89
  • 86
  • 73
  • 73
  • 71
  • 69
  • 66
  • 54
  • 53
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Access anytime anyplace an empircal investigation of patterns of technology use in nomadic computing environments /

Cousins, Karlene C. January 2004 (has links)
Thesis (Ph.D.)--Georgia State University, 2004. / Ttitle from title screen. Daniel Robey, committee chair; Marie Claude-Boudreau , Michale Gallivan, Upkar Varshney, committee members. 191 p. [numbered vi, 181] : ill. (some col.). Description based on contents viewed Feb. 26, 2007. Includes bibliographical references.
2

Effective content adaptation strategies for mobile computing /

Lum, Wai-yip, Vincent. January 2002 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2002. / Includes bibliographical references (leaves 97-103).
3

Mobile image communication using JPEG2000 technology to handle large visual contents in resource-limited environments

Rosenbaum, René January 1900 (has links)
Zugl.: Rostock, Univ., Diss., 2006 / Hergestellt on demand
4

Effective content adaptation strategies for mobile computing

林偉業, Lum, Wai-yip, Vincent. January 2002 (has links)
published_or_final_version / Computer Science and Information Systems / Master / Master of Philosophy
5

Designing energy and user efficient interactions with mobile systems

Luo, Lu. January 1900 (has links)
Thesis (Ph.D.)--Carnegie Mellon University, 2008. / Adviser: Daniel P. Siewiorek. Includes bibliographical references.
6

Ein komponentenbasiertes Meta-Modell kontextabhängiger Adaptionsgraphen für mobile und ubiquitäre Anwendungen

Springer, Thomas. January 2004 (has links) (PDF)
Dresden, Techn. Universiẗat, Diss., 2004.
7

Mobile Geräte in verteilten Anwendungsumgebungen ein Integrationsansatz zwischen Abstraktion und Migration /

Müller-Wilken, Stefan. January 2002 (has links) (PDF)
Hamburg, Universiẗat, Diss., 2002.
8

Vorabübertragung ortsbezogener Informationen zur Unterstützung mobiler Systeme

Kubach, Uwe. January 2002 (has links) (PDF)
Stuttgart, Universiẗat, Diss., 2002.
9

Vorabübertragung ortsbezogener Informationen zur Unterstützung mobiler Systeme /

Kubach, Uwe. January 2002 (has links)
Stuttgart, Universiẗat, Diss., 2002 (Nicht für den Austausch).
10

A framework for secure mobile computing in healthcare

Thomas, Godwin Dogara Ayenajeh January 2007 (has links)
Mobile computing is rapidly becoming part of healthcare’s electronic landscape, helping to provide better quality of care and reduced cost. While the technology provides numerous advantages to the healthcare industry, it is not without risk. The size and portable nature of mobile computing devices present a highly vulnerable environment, which threaten the privacy and security of health information. Since these devices continually access possibly sensitive healthcare information, it is imperative that these devices are considered for security in order to meet regulatory compliance. In fact, the increase in government and industry regulation to ensure the privacy and security of health information, makes mobile security no longer just desirable, but mandatory. In addition, as healthcare becomes more aware of the need to reinforce patient confidence to gain competitive advantage, it makes mobile security desirable. Several guidelines regarding security best practices exist. Healthcare institutions are thus faced with matching the guidelines offered by best practices, with the legal and regulatory requirements. While this is a valuable question in general, this research focuses on the aspect of considering this question when considering the introduction of mobile computing into the healthcare environment. As a result, this research proposes a framework that will aid IT administrators in healthcare to ensure that privacy and security of health information is extended to mobile devices. The research uses a comparison between the best practices in ISO 17799:2005 and the regulatory requirements stipulated in HIPAA to provide a baseline for the mobile computing security model. The comparison ensures that the model meets healthcare specific industry requirement and international information security standard. In addition, the framework engages the Information Security Management System (ISMS) model based on the ISO 27000 standard. The framework, furthermore, points to existing technical security measurers associated with mobile computing. It is believed that the framework can assist in achieving mobile computing security that is compliant with the requirements in the healthcare industry.

Page generated in 0.1072 seconds