poster we present several methods for abstracting data into information and then integrating and organizing it for the purpose of display. We use an example from analysis of pilot...
Information Technology system administrators (sysadmins) perform the crucial and never-ending work of maintaining the technical infrastructure on which our society depends. Comput...
Growth, adaptability, innovation, and cost control are leading concerns of businesses, especially with respect to use of information technology (IT). Though standards such as the ...
John H. Bailey, Eser Kandogan, Eben M. Haber, Paul...
This paper presents an innovative approach to solve the problem of missing transparency of competencies within virtual organizations. We based our work on empirical studies to cop...
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...