Large scale penetration of digital technologies led them to join roads, electricity, and water distribution, as essential infrastructures of modernity. “Digital convergence” r...
Internet security is of utmost importance in today's e-commerce environment. Many different avenues are being taken in an attempt to secure the systems of both the end user a...
Guided by knowledge transfer (KT) literature and Channel Expansion Theory (CET), we explore the relationship between the KT process, role-based experiences and media perceptions i...
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
Many groups are interested in the insider threat problem, but the model generally used by all of these groups is implicitly binary—one is either within a perimeter or not. There...
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whal...