End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Investments in innovative technologies face uncertainties and are often made in stages. We develop a multi-period game-theoretical model where the potential of a new technology is...
: Study variables in clinical trial specifications are often defined manually, depending on the knowledge and experience of the author rather than on commonly agreed methods and st...
One of the main difficulties of pattern mining is to deal with items of different nature in the same itemset, which can occur in any domain except basket analysis. Indeed, if we co...
In this paper, we assess the possibility of a critical knowledge of technology. In the case of facial recognition systems, ‘FRS’, we argue that behaviorism underlies this tech...