The management of operational risks, i.e., risks of loss resulting from inadequate or failed processes, people and systems or from external events, is crucial for the stability of...
How do people work with large document collections? We studied the effects of different kinds of analysis tools on the behavior of people doing rapid large-volume data assessment,...
Daniel M. Russell, Malcolm Slaney, Yan Qu, Mave Ho...
Honeypots are computer systems that try to fool cyberattackers into thinking they are ordinary computer systems, when in fact they are designed solely to collect data about attack...
The classical (ad hoc) document retrieval problem has been traditionally approached through ranking according to heuristically developed functions (such as tf.idf or bm25) or gene...
ABSTRACT. Risks associated with change in technology standards and uncertainty over the sharing of costs and benefits among trading partners impede interorganizational information ...
Interdependencies among infrastructure systems are now becoming commonplace, and present both opportunities and vulnerabilities. Initial attention was paid to functional interdepe...
Carlos E. Restrepo, Jeffrey S. Simonoff, Rae Zimme...
Retirements, restructuring, and technology changes are producing an accelerating exodus of expertise from the electric power industry. In this paper we review the major approaches...
This paper is about the design and implementation of an information system, using Wiki technology to improve the emergency preparedness efforts of the Claremont University Consort...
Inexpensive data collection and storage technologies and a global thirst for information have led to data repositories so large that users may become disoriented and unable to loc...