When experts participate in collaborative systems, tension may arise between them and novice contributors. In particular, when experts perceive novices as a bother or a threat, th...
Although clinic environments are a primary location for exchanging information with clinicians, patients experience these spaces as harsh environments to access, use, exchange, an...
Kenton T. Unruh, Meredith M. Skeels, Andrea Civan-...
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
This paper extends pre-existing digital divide conceptualizations to further investigate the important issue of mismatches between the ontologies of state-created information syst...
Most people-centric delay tolerant networks have been shown to exhibit power-law behavior. Analysis of the temporal connectivity graph of such networks reveals the existence of hu...