End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Amidst constant innovation in information and communication technologies, a new pattern of work is emerging. Hierarchical authority structures are giving way to greater decision-m...
Security managers must scan through multiple continuous data streams issuing from diverse sources in an effort to defend computer networks from attack. However, manual aggregation...
The research presented in this paper is part of a larger study of the organizational impacts of information systems on knowledge work. The phase of the research reported in the pa...
The inherent freedom due to a lack of central authority in self-organized mobile ad hoc networks introduces challenges for security and trust management. Arguably, trust managemen...