—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
—The recently developed small wireless devices ranging from sensor boards to mobile phones provide a timely opportunity to gather unique data sets on complex human interactions, ...
This article investigates the effectiveness of community generated tags as social descriptors of resources uncoordinatedly annotated by community members. Our goal is to demonstra...
Jinsheng Xu, Christo Dichev, Albert C. Esterline, ...
Website security is essential for successful e-commerce ventures, but the vital “how-to” components of security are often lacking in academic courses. This paper describes our...
Visual data mining has been established to effectively analyze large, complex numerical data sets. Especially, the extraction and visualization of inherent structures such as hie...