: The use of information technology (IT) in organizations has undergone dramatic changes the past 30 years. As a result, it has become increasingly common to adopt a services rathe...
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
CellCircuits (http://www.cellcircuits.org) is an openaccess database of molecular network models, designed to bridge the gap between databases of individual pairwise molecular int...
H. Craig Mak, Mike Daly, Bianca Gruebel, Trey Idek...
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
We performed a content analysis of the information shared in a locally and culturally focused health application, EatWell. In EatWell, information is shared via the creation of au...
Andrea Grimes, Brian M. Landry, Rebecca E. Grinter