The technology for anonymous communication has been thoroughly researched. But despite the existence of several protection services, a business model for anonymous web surfing has ...
Abstract. The existing Web service management solutions are almost exclusively focused on optimization of technical QoS metrics (e.g., availability). However, financial (e.g., prof...
Spammers use questionable search engine optimization (SEO) techniques to promote their spam links into top search results. In this paper, we focus on one prevalent type of spam ? ...
Abstract. Whilst Web services can be composed by technical developers using a language such as BPEL, there is no easy way for non-technical end users to take advantage of these ser...
Much of the literature on responsibility in the IT field addresses the responsibilities of members of the IT profession. In this paper, we investigate to what extent the responsibi...