Ad-hoc data exchange, e.g., by sending email attachments, leads to multiple copies or versions of a document at dispersed nodes in a network. However, their relationships such as ...
We present a qualitative, exploratory study to examine the space of electronic communication (e.g. instant messaging, short message service, email) by Deaf teenagers in the greater...
Valerie Henderson-Summet, Rebecca E. Grinter, Jenn...
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Corporate information infrastructures are deployed to reduce risks of data fragmentation and misalignment between the computing resources and the business objectives. However, the...
Abstract-- In the age of Web 2.0 people organize large collections of web pages, articles, or emails in hierarchies of topics, or arrange a large body of knowledge in ontologies. T...