User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Abstract. Modern premium automobiles are equipped with an increasing number of Electronic Control Units (ECUs). These ECUs are interconnected and form a complex network to provide ...
Michael Sedlmair, Benjamin Kunze, Wolfgang Hinterm...
With the increasing popularity of location tracking services such as GPS, more and more mobile data are being accumulated. Based on such data, a potentially useful service is to m...
Vincent Wenchen Zheng, Bin Cao, Yu Zheng, Xing Xie...
Purpose – This paper sets out to present the concept of the value of information, review the descriptive, rational, social and behavioral approaches for assessing the value of i...
: The purpose of this research was to develop an approach to artifact design based on information technology. To make interactive systems easy to use, many companies utilize a user...