A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Multiagent research provides an extensive literature on formal Belief-Desire-Intention (BDI) based models describing the notions of teamwork and cooperation, but adversarial and c...
Inon Zuckerman, Sarit Kraus, Jeffrey S. Rosenschei...
This study investigates how customers perceive and adopt Internet Banking (IB) in Hong Kong. We developed a theoretical model based on the Technology Acceptance Model (TAM) with a...
T. C. Edwin Cheng, David Y. C. Lam, Andy C. L. Yeu...
Usually software is maintained by people different from those who developed it. In this context the maintenance activities are dominated by the comprehension effort. The study of ...
Although existing models of e-learning effectiveness in information systems (IS) have increased our understanding of how technology can support and enhance learning, most of our m...