The increased online presence of jihadists has raised the possibility of individuals being radicalised via the Internet. To date, the study of violent radicalisation has focused o...
Adam Bermingham, Maura Conway, Lisa McInerney, Nei...
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
The research design, evaluation methodology, and statistical analysis of the clinical efficacy of healthcare information technology (HIT) implementation can be a challenging task....
Lance Roberts, Marcia M. Ward, Jane M. Brokel, Dou...
Research has identified the potential and challenges of information sharing in government settings mostly within the context of a single country. The challenges facing inter-gover...
Celene Navarrete, Sehl Mellouli, Theresa A. Pardo,...
In the United States, congress has set goals for the diffusion of e-government initiatives. One of congressÂ’ goals for 2007 was for 80% of tax and informational returns to be fil...