gruelling 发表于 2025-3-30 10:44:15

http://reply.papertrans.cn/88/8711/871029/871029_51.png

thrombus 发表于 2025-3-30 16:09:51

http://reply.papertrans.cn/88/8711/871029/871029_52.png

Herbivorous 发表于 2025-3-30 18:47:05

http://reply.papertrans.cn/88/8711/871029/871029_53.png

Arbitrary 发表于 2025-3-30 21:01:48

Modeling Medical Ethics through Intelligent Agentsitutions have extensive Electronic Health Records (EHR), collected over several years for clinical and teaching purposes, but are uncertain as to the proper circumstances in which to use them to improve the delivery of care to the ones in need. Research Ethics Boards in Portugal and elsewhere in the

Tremor 发表于 2025-3-31 03:56:47

Requirements for Electronic Delivery Systems in eGovernment – An Austrian Experiences and businesses – subpoenas, legal verdicts, notifications, administrative penalties etc. However, official activities are more strongly linked to legal regulations than in civil law. Delivery of crucial and strictly personal documents raises the demand for qualified identification and non-repudiat

漂浮 发表于 2025-3-31 08:06:16

Facilitating Business to Government Interaction Using a Citizen-Centric Web 2.0 Model authorized citizens, representing the Business while interacting with specific governmental organizations should be explored. Novel interaction models should be introduced, transforming the way Governmental services are delivered to Businesses. To this end, we propose a Web 2.0 citizen-centric mode

旅行路线 发表于 2025-3-31 10:51:18

http://reply.papertrans.cn/88/8711/871029/871029_57.png

强有力 发表于 2025-3-31 17:17:56

Not All Adware Is Badware: Towards Privacy-Aware Advertisingient audience. While Internet technology brings the promise of extremely well-targeted ad placement, there have always been serious privacy concerns surrounding personalization. Today there is a constant battle between privacy advocates and advertisers, where advertisers try to push new personalizat

影响 发表于 2025-3-31 18:24:33

The Step Method – Battling Identity Theft Using E-Retailers’ Websitesting on their websites to address this issue. For this purpose we analyze secondary data (literature and websites of ten organizations). Secondly we investigate the good practice in this area and recommend practical steps. The key findings are that some organizations only publish minimum security in

种植,培养 发表于 2025-3-31 22:23:55

http://reply.papertrans.cn/88/8711/871029/871029_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Software Services for e-Business and e-Society; 9th IFIP WG 6.1 Conf Claude Godart,Norbert Gronau,Gérôme Canals Conference proceedings 2009