Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caus...
In this paper, we examine the relationship between users’ technology readiness (specifically employees) and their adoption of wireless technology and services in a longitudinal ...
This study examines the roles of gender and visual realism in the persuasiveness of speakers. Participants were presented with a persuasive passage delivered by a male or female p...
Catherine A. Zanbaka, Paula Goolkasian, Larry F. H...
Abstract. The use of Information and Communication Technology (ICT) in education is one important competence that student teacher should develop in their academic studies. To be ca...
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...