Login / Signup
Supply system's technology configuration as a contributor to end-user vulnerability.
Lindsay Robertson
Katina Michael
Albert Munoz Aneiros
Published in:
ISTAS (2015)
Keyphrases
</>
end users
user requirements
application development
case study
user acceptance
user driven
user interface
web applications
user experience
service providers
rapid development
business intelligence
data processing
search tools
database systems
multimedia
computer systems
e government
user friendliness