Information systems (IS) research employs a wide range of theory, drawn from numerous disciplines. Over the course of the past three decades, the proliferation of theory has creat...
This paper describes an approach to support practitioners in the analysis of computer-supported learning processes by utilizing logfiles of learners’ actions captured by the sys...
Intrusion detection for IP networks has been a research theme for a number of years already. One of the challenges is to keep up with the ever increasing Internet usage and network...
Although there has been much progress in developing process mining algorithms in recent years, no effort has been put in developing a common means of assessing the quality of the ...
Anne Rozinat, Ana Karla Alves de Medeiros, Christi...
Abstract. Large financial firms with thousands of employees face many challenges ensuring workers have access to the right information, yet controlling access to unneeded data. We ...
Sara Sinclair, Sean W. Smith, Stephanie Trudeau, M...