{"title":"Session details: Paper session B3: security 1","authors":"L. Hill","doi":"10.1145/3250595","DOIUrl":"https://doi.org/10.1145/3250595","url":null,"abstract":"","PeriodicalId":286396,"journal":{"name":"Proceedings of the 2nd annual conference on Research in information technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134371361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Paper session F3: security 2","authors":"H. Jasani","doi":"10.1145/3250597","DOIUrl":"https://doi.org/10.1145/3250597","url":null,"abstract":"","PeriodicalId":286396,"journal":{"name":"Proceedings of the 2nd annual conference on Research in information technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122254420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Paper session E3: software development","authors":"Amos O. Olagunju","doi":"10.1145/3250596","DOIUrl":"https://doi.org/10.1145/3250596","url":null,"abstract":"","PeriodicalId":286396,"journal":{"name":"Proceedings of the 2nd annual conference on Research in information technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133400240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Paper session G3: UML & UI","authors":"Thomas E. Gibbons","doi":"10.1145/3250598","DOIUrl":"https://doi.org/10.1145/3250598","url":null,"abstract":"","PeriodicalId":286396,"journal":{"name":"Proceedings of the 2nd annual conference on Research in information technology","volume":"343 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132072357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Paper session A3: defining IT","authors":"B. Lunt","doi":"10.1145/3250594","DOIUrl":"https://doi.org/10.1145/3250594","url":null,"abstract":"","PeriodicalId":286396,"journal":{"name":"Proceedings of the 2nd annual conference on Research in information technology","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115083750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Paper session H3: browser and network analytics","authors":"Tsunenori Mine","doi":"10.1145/3250599","DOIUrl":"https://doi.org/10.1145/3250599","url":null,"abstract":"","PeriodicalId":286396,"journal":{"name":"Proceedings of the 2nd annual conference on Research in information technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130110254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}