s of titles and abstracts) as irrelevant to our focus. We read the remaining 519 papers in full to establish our final list. The 92 papers we chose were originally published in the...
Tracy Hall, Helen Sharp, Sarah Beecham, Nathan Bad...
One of the major challenges in IT security management is determining how much to spend and where to spend. This requires understanding of the economic issues regarding IT security...
While weblogs have been conceptualised as personal thinking spaces since their early days, those uses have not been studied in detail. The purpose of this paper is to explore how ...
User interface designers still have to rely on personal creativity and skill when designing computer icons for program functions that have no existing conventional representation....
The Internet no longer meets the world’s requirements. Recognition of the Internet architecture’s inherent flaws has opened a window of opportunity for fresh thinking: granti...