Programming has recently become more common among ordinary end users of computer systems. We believe that these end-user programmers are not just coders but also designers, in tha...
Jill Cao, Yann Riche, Susan Wiedenbeck, Margaret M...
The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an...
David S. H. Rosenthal, Petros Maniatis, Mema Rouss...
As the field of e-government expands and grows, the number of academic courses, professional workshops, online courses, and continuing education opportunities in this field also i...
Nathan Botts, Benjamin L. Schooley, Thomas A. Hora...
Whereas previous studies have been primarily focused on the structural features of Information Technology governance, this paper describes an exploratory study of IT governance pr...
Pieter M. A. Ribbers, Ryan Peterson, Marylin M. Pa...
This research analyzes consumer privacy issues pertaining to the newly developing wireless marketing context, specifically, wireless advertising messaging (WAM). We develop a conce...