This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...
Abstract- This paper deals with "Knowledge Management Systems" (KMS) which are seen as a new kind of information systems supporting organizational information processing....
As more firms embrace CRM as a core business strategy, it is getting more important to assess firms’ CRM readiness and performance for diagnosing, guiding, managing, and evaluat...
This paper reports on a research study concerning the integration of electronic commerce (EC) into the pre-sales business processes of small firms. By means of a field survey, 17 ...
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...