Abstract. A simple one-way function along with its proposed application in symmetric cryptography is described. The function is computable with three elementary operations on permu...
Both Knowledge Management and Appreciative Inquiry attempt to amplify human and organizational capacities by leveraging the best of each. Whereas knowledge management systems aim ...
The adoption and implementation of interorganizational information systems (IOS) heavily depend upon the trading partner(s) of the focal organization. Power structures have been s...
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
The advantages that Internet as a new technology offers to business and individuals can't be fully exploited without taking under consideration a number of social issues that...