The threat of abandoned or extensively overhauled IS is a major concern for both MIS specialists and businesses. This concern may stem from the mismatch between MIS specialist cha...
Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are g...
Companies invest large amounts of money in new technologies. Not surprisingly, much of the research carried out in relation to IT-investments has focused on the adoption of new te...
This paper proposes an approach for the automatic recognition of roles in settings like news and talk-shows, where roles correspond to specific functions like Anchorman, Guest or ...
We are investigating how to provide intelligent, pervasive support of group of people within so-called “smart environments”. Our current main assumption, based on literature in...