In recent years, an increasing amount of attention has been paid to information systems (IS) outsourcing by practitioners as well as academics. However, our understanding of the fa...
—This paper documents some of the socio-technical issues involved in developing security measures for a community environment, looking at the users of a wireless mesh network dep...
Sara Bury, Johnathan Ishmael, Nicholas J. P. Race,...
Abstract. In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requiremen...
This paper describes a software tool that demonstrates the effects of common vision and hearing impairments on image and sound files. This helps designers to understand and empath...
Joy Goodman-Deane, Patrick Langdon, P. John Clarks...
Transferring the traditional business model for selling digital goods linked to physical media to the online world leads to the need for a system to protect digital intellectual p...
Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sh...