Language use in 1,000 randomly-selected and 5,025 crawled LiveJournals was analyzed in order to determine the overall language demographics, the robustness of four non-English lan...
Susan C. Herring, John C. Paolillo, Irene Ramos-Vi...
We propose a framework for constructing secure systems at the architectural level. This framework is composed of an implementation-oriented formalization of a system’s architect...
Daniel Conte de Leon, Jim Alves-Foss, Paul W. Oman
Our study examines the fit concept in the context of IS planning, a major research stream in the IS literature. Previous research reveals inconsistencies in the IS planning litera...
Victoria Mitchell, Hasan Mohammad, Tracey Stock, X...
A massive rise in the number and expenditure of pathology ordering by general practitioners (GPs) concerns the government and attracts various studies with the aim to understand a...
Zoe Yan Zhuang, Rasika Amarasiri, Leonid Churilov,...
Spam, or unsolicited email, has become an unavoidable fact of life for anyone with an email account. Spam emails generally reflect genres seen in traditional print format such as ...