The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
— Organizations use security policies to regulate how they share and exchange information, e.g., under what conditions data can be exchanged, what protocols are to be used, who i...
We present an application for accessing and creating socially constructed sets of information. Users store and retrieve information, such as bits of text, through the use of "...
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Provision of services within a virtual framework for resource sharing across institutional boundaries has become an active research area. Many such services encode access to compu...