We show how Semantic Web technologies can be used to build an access control system. We follow the role-based access control approach (RBAC) and extend it with contextual attribute...
In this paper, we apply the theory of task technology fit to mobile technology, focusing specifi-cally on the role of user mobility. We describe the results of an empirical study ...
The purpose of this article is to encourage research on the aspects of consumer behaviour, particularly as found in groups of consumers. For both researchers and practitioners, co...
Massimo Franco, Francesca Di Virgilio, Loredana Di...
: This research note both confirms and extends the value relevance of information technology announcements found by Im et al (2001) and Dos Santos et al. (1993). We extend their wo...
Along with increasing investments in new technologies, user technology acceptance becomes a frequently studied topic in the information systems discipline. The last two decades ha...