Mobile advertising has emerged as one of the most popular applications in mobile commerce, particularly in the form of SMS advertising campaigns. However, looking at the process o...
Dimitris Drossos, George M. Giaglis, George Lekako...
Studies of Internet use continue to show a gap between those with and without access to the Internet and its resources. However, recent work indicates that this is not a straightf...
Critical infrastructures have some of the characteristic properties of complex systems. They exhibit infrequent large failures events. These events, though infrequent, often obey ...
Security breaches deter e-commerce activities. Organizations spend millions of dollars on security appliances to make online transactions more secure. Nonetheless, a new virus or ...
When dealing with genres of web pages, there are two important aspects to be taken into account. On the one hand, the web is fluid, unstable and fast-paced. On the other hand, gen...
The limits of human multitasking capabilities in intense conditions are well understood. However, little is known about how increasing and continuous multitasking impacts innovati...
Karen Sobel Lojeski, Richard Reilly, Peter Dominic...
— IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-se...
Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, E...
Previous research in Group Support Systems does not include a design theory for GSS-enabled meetings. As a consequence, problems are experienced in the design, implementation and ...
So far, empirically grounded studies, which compare the phenomena of e-Commerce and e-Government, have been in short supply. However, such studies it has been argued would most li...
Existing studies on IT outsourcing have mainly examined partnership factors that influence IT outsourcing effectiveness. This stream of IT outsourcing research has largely ignored...