The ability to detect fragments of deleted image files and to reconstruct these image files from all available fragments on disk is a key activity in the field of digital forensic...
Sylvain Collange, Yoginder S. Dandass, Marc Daumas...
This paper introduces Mycrocosm, a microblogging site in which users communicate via statistical graphics, rather than the usual short text statements. Users of Mycrocosm can reco...
Both online and off, people frequently perform particular social roles. These roles organize behavior and give structure to positions in local networks. As more of social life bec...
Eric Gleave, Howard T. Welser, Thomas M. Lento, Ma...
We present a decision model of a firm’s optimal outsourcing rate as an extension of Cha et. al [1]’s previous work on the economic risk of knowledge loss and deskilling in the...
The requirement for power system operators to respond more efficiently to the stressed power system conditions that may create large number of alarms asks fort advanced alarm proc...
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...
This study presents an IT assessment tool that aims at capturing the level of IT sophistication in hospitals. In order to develop a measure that reflects IT capacities in hospital...
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
Within the information systems discipline, three streams have emerged that address the issue of information technology adoption, diffusion and use. The first examines the factors ...
Stacie N. Nwabueze, Peter Meso, Victor Wacham A. M...