The Internet and Intranet reduce much of the costs of information sharing, but they do not solve receivers' reading and interpretation limitations. Alternatively, browsers an...
The majority of steganographic utilities for the camouflage of confidential communication suffers from fundamental weaknesses. On the way to more secure steganographic algorithm...
Abstract. As mobility permeates into todays computing and communication arena, we envision application infrastructures that will increasingly rely on mobile technologies. Tradition...
The purpose of this paper is to introduce the use of an object-oriented methodology called TAD in the field of business process reengineering. TAD methodology consists of six phas...
Information systems (IS) research on user involvement has primarily theorized relationships between developers, managers and users in systems development. However, so far, marginal...