ThelinkagesbetweenISandbusinessunitsarerecognizedasbeingcriticaltoinformationsystemsdevelopment processes and outcomes. Previous research has found that they are associated with b...
Amrit Tiwana, Anandhi S. Bharadwaj, V. Sambamurthy
Authentication systems for public terminals – and thus public spaces – have to be fast, easy and secure. Security is of utmost importance since the public setting allows manif...
Alexander De Luca, Martin Denzel, Heinrich Hussman...
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
The proliferation of affordable mobile devices with processing and sensing capabilities, together with the rapid growth in ubiquitous network connectivity, herald an era of Mobisc...