Information Systems (IS) have a major impact on human activities. They are not only "objects or products" because they directly concern our access to knowledge, our possi...
A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical ...
Modular design methodologies, which decompose large and complex systems into components that are relatively easy to develop and maintain, have been widely adopted in the software ...
: Incident Response and Computer Forensics are two areas with similar goals but distinct process models. While in both cases the goal is to investigate computer security incidents ...
A progressive spatial query retrieves spatial data based on previous queries (e.g., to fetch data in a more restricted area with higher resolution). A direct query, on the other si...