: The limitations of existing proposed and operational publishing models intended to replace the academic journal are briefly reviewed. Three ‘insights’ are described, the firs...
It is increasingly recognized that business models offer an abstraction that is useful not only in the exploration of new business networks but also for the design and redesign of ...
Hans Weigand, Paul Johannesson, Birger Andersson, ...
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
We study a model of feature binding in prefrontal cortex which defers specific perceptual information to lower areas and merely maintains the identity of the combination. The mod...
Hecke Schrobsdorff, J. Michael Herrmann, Theo Geis...
: With the emergence of the Web 2.0 phenomena, technology-assisted social networking has become the norm. The potential of social software for collaborative learning purposes is cl...