Open source projects do have requirements; they are, however, mostly informal, text descriptions found in requests, forums, and other correspondence. Understanding of such require...
Idea generation techniques provide a variety of approaches for supporting an innovation process. Until recently, the space of techniques has been unstructured, and no clear guidel...
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
Social network games embedded within social network sites (SNSs) such as Facebook facilitate play with “Friends” within the SNS. In this study, we look at different dimensions...
Donghee Yvette Wohn, Cliff Lampe, Rick Wash, Nicol...
Hemorrhages of confidential patient health data create privacy and security concerns. While the US HIPAA legislation on privacy and security went into effect over five years ago, ...