While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some t...
Simon Byers, Lorrie Faith Cranor, David P. Kormann...
The context of information security is changing dramatically. Networking technologies have driven the global expansion of electronic commerce. Electronic commerce is increasingly ...
This paper presents joint work by the California Institute of Technology’s Jet Propulsion Laboratory and the University of California at Davis (UC Davis) sponsored by the Nation...
: Sharing health data for research purposes across data custodian boundaries poses technical, organisational and ethical challenges. We describe a service oriented architecture for...
Kerry L. Taylor, Christine M. O'Keefe, John Colton...