Explaining the role of trust in cloud computing services

JK Adjei - info, 2015 - emerald.com
Purpose–The purpose of this paper is to explain the role of trust in cloud computing services
based on empirical evidence from interviewing executives of financial institutions in Ghana …

Network-code machine: Programmable real-time communication schedules

S Fischmeister, O Sokolsky, I Lee - 12th IEEE Real-Time and …, 2006 - ieeexplore.ieee.org
Distributed hard real-time systems require guaranteed communication. One common
approach is to restrict network access by enforcing a time-division multiple access (TDMA) …

Monetization of personal identity information: Technological and regulatory framework

JK Adjei - 2015 2nd International Conference on Information …, 2015 - ieeexplore.ieee.org
Monetization of personal identity information has become a major component of modern
business models, driving innovation in many industries. This phenomena is common place …

Monetization of Personal Digital Identity Information: Technological and Regulatory Framework

JK Adjei - … , and Privacy: Concepts, Methodologies, Tools, and …, 2019 - igi-global.com
Monetization of personal identity information has become a major component of modern
business models, contributing to dramatic innovations in the collection, aggregation, and …