In multi-synchronous collaboration users replicate shared data, modify it and redistribute modified versions of this data without the need of a central authority. However, in this model …
Restrictions and permissions in information systems--Authorization--can cause problems for those interacting with the systems. Often, the problems materialize as an interference with …
Nowadays, information technologies provide users ability to work with anyone, at any time, from everywhere and with several heterogeneous devices. This evolution fosters a new …
AI Mørch, R Andersen - End-User Computing, Development, and …, 2012 - igi-global.com
The article presents and analyzes data from a case study in customer-initiated software product development. We have observed and participated in system development activities …
Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of …
Managing access to shared digital information, such as photographs and documents, is difficult for end users who are accumulating an increasingly large and diverse collection of …
This paper explores the effectiveness of usage control deterrents. Usage control enables finer-grained control over the usage of objects than do traditional access control models …