Anargyros Plemenos

  • Citations Per Year
Learn More
Mobility data sources feed larger and larger trajectory databases nowadays. Due to the need of extracting useful knowledge patterns that improve services based on users' and customers' behavior, querying and mining such databases has gained significant attention in recent years. However, publishing mobility data may lead to severe privacy violations. In(More)
The paper presents a field study aimed at identifying and analyzing the role of boundary artifacts in cross-organization virtual communities of practice (CoP). Our analysis is informed by a recent case study in vacation package assembly (VPA), which is defined as the distributed collective practice carried out by members of a boundary-spanning virtual(More)
With the dramatic shift of internet use away from desktop and laptop PCs toward smartphones and tablets, protection thresholds for application, device and communication security have significantly lowered. Most attempts on reversing this situation by means of converting standard mobile devices into tamper-proof equipment have proven to leave ample space for(More)
  • 1