This paper examines the concept of cyberterrorism. Fringe activity on the Internet ranges from nonviolent `Use' at one end to `Cyberterrorism' at the other. Rejecting th...
Computer science algorithms can be used to improve user interfaces. Using data structures as a source of design ideas, a new interface was constructed for a cellular telephone han...
Gary Marsden, Harold W. Thimbleby, Matt Jones, Pau...
Avoidance and discovery of security vulnerabilities in information systems requires awareness of typical risks and a good understanding of vulnerabilities and their exploitations....
Case studies are widely used in business and medicine to help students learn from the successes and failures of practitioners in the field. This paper discusses the potential bene...
Kay A. Robbins, Catherine Sauls Key, Keith Dickins...
Inductive databases tightly integrate databases with data mining. The key ideas are that data and patterns (or models) are handled in the same way and that an inductive query lang...