Ausgabe 5/2015
Advances in secure knowledge management in the big data era
Inhalt (15 Artikel)
Advances in secure knowledge management in the big data era
Chittaranjan Hota, Shambhu Upadhyaya, Jamal Nazzal Al-Karaki
Surviving advanced persistent threats in a distributed environment – Architecture and analysis
Ruchika Mehresh, Shambhu Upadhyaya
Message diffusion through social network service: The case of rumor and non-rumor related tweets during Boston bombing 2013
Jaeung Lee, Manish Agrawal, H. R. Rao
Secure and privacy preserving data processing support for active authentication
Yan Sun, Shambhu Upadhyaya
Game-theoretic strategies for IDS deployment in peer-to-peer networks
Pratik Narang, Chittaranjan Hota
Examining the role of three sets of innovation attributes for determining adoption of the interbank mobile payment service
Kawaljeet Kaur Kapoor, Yogesh K. Dwivedi, Michael D. Williams
Radio frequency identification (RFID) adoption: A cross-sectional comparison of voluntary and mandatory contexts
Mohammad Alamgir Hossain, Mohammed Quaddus
Does better Internet access lead to more adoption? A new empirical study using household relocation
Junzhao Ma, Qingyi Huang
Measurements of mislead threshold of company graph distortion
Shaio Yan Huang, Tung-Hsien Wu, An-An Chiu, David C. Yen
How business process reengineering affects information technology investment and employee performance under different performance measurement
Shaio Yan Huang, Chao-Hsiung Lee, An-An Chiu, David C. Yen
Addressing the valuation problem in multi-round combinatorial auctions
Soumyakanti Chakraborty, Anup K. Sen, Amitava Bagchi
IPTV parental control: A collaborative model for the Social Web
Ana Fernández-Vilas, Rebeca P. Díaz-Redondo, Sandra Servia-Rodríguez