This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Today’s search engines retrieve tens of thousands of web pages in response to fairly simple query articulations. These pages are retrieved on the basis of the query terms occurr...
Richong Zhang, Michael A. Shepherd, Jack Duffy, Ca...
Mobile payment services have, thus far, failed to entice consumers. An apparent conclusion is that these services have failed to meet consumers’ payment needs. Deeper understand...
Firms invest heavily to develop on-line cooperative systems in the hope of creating unique value in the minds of their customers. However, when system use begins to decline, firms...
Massive, multiplayer online role-playing games foster rich social environments. Within the game, players can interact with other players, make friends, create and cultivate new on...
In cyberspace, the emergence and increasing importance of search engine prompts numerous evaluation studies in regard to its effectiveness. Based on a user-oriented perspective, t...
Abstract— In recent years business-to-business (B2B) ecommerce has been subject to major rethinking. A paradigm shift from document centric file-based interchange of business in...
The deployment of e-Government continues at a significant cost and pace in the worldwide public sector. An important area of research is that of the evaluation of e-Government. In...
— Bayesian networks play a key role in decision support within health care. Physicians rely on Bayesian networks to give medical treatment, generate what-if scenarios, and other ...
— Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. In this environment, the risk...