Almost any information you might want is becoming available on-line. The problem is how to find what you need. One strategy to improve access to existing information sources, is i...
Most current P2P file sharing systems treat their users as anonymous, unrelated entities, and completely disregard any social relationships between them. However, social phenomena...
Johan A. Pouwelse, Pawel Garbacki, Jun Wang, Arno ...
The adoption of information systems in healthcare is no less significant than in any other commercial or caring organisation. The literature on IS adoption in healthcare, makes it...
—The behavior of complex production automation systems is hard to predict, therefore simulation is used to study the likely system behavior. However, in a real-world system many ...
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...