Trust has been considered a central aspect of successful IT outsourcing from the beginning of the outsourcing relationship to the end. A great deal of interest in trust has been d...
In this study, a mathematical model is suggested concerning the location of VHF/UHF frequency radio jammer systems to the terrain parts to conduct single frequency or sequential fr...
This article examines how emerging pervasive computing and affective computing technologies might enhance the adoption of ICT in e-Learning which takes place in the home and wider ...
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
It is now commonplace for an organization to turn to external firms for the provision of IT services and software. As technology advances and the business environment continues to ...