Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
We believe that the next evolutionary step in supporting wide-area application and services delivery to customers is a network framework that provides for collocation of applicati...
David J. Korsmeyer, Edward T. Chow, Michael P. Con...
This paper focuses on ways and means of stimulating idea generation in collaborative situations involving designers, engineers, software developers, users and usability people. Pa...
This paper outlines an awareness application called Tickertape. Tickertape is a tool that displays event notifications in the form of scrolling messages across a single-line windo...
Sara Parsowith, Geraldine Fitzpatrick, Simon M. Ka...