This paper presents research on developing a new type of software tool for training and assisting the personnel in emergency response planning. The tool, called Disciple-VPT, will...
Gheorghe Tecuci, Mihai Boicu, Thomas Hajduk, Dorin...
This research-in-progress paper describes the development of a research model exploring the antecedents and consequents of CIO role effectiveness. Specifically, we argue that CIO ...
Analog and hybrid computation methods are areas of continued interest, particularly in specific applications where traditional digital computation techniques cannot achieve the de...
Genetic anticipation for a particular disease can involve an earlier age at onset (or, diagnosis), greater severity, and/or a higher number of affected individuals in successive g...
Gleb R. Haynatzki, Randall E. Brand, Vera R. Hayna...
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Today’s search engines retrieve tens of thousands of web pages in response to fairly simple query articulations. These pages are retrieved on the basis of the query terms occurr...
Richong Zhang, Michael A. Shepherd, Jack Duffy, Ca...
Mobile payment services have, thus far, failed to entice consumers. An apparent conclusion is that these services have failed to meet consumers’ payment needs. Deeper understand...
Firms invest heavily to develop on-line cooperative systems in the hope of creating unique value in the minds of their customers. However, when system use begins to decline, firms...
Massive, multiplayer online role-playing games foster rich social environments. Within the game, players can interact with other players, make friends, create and cultivate new on...
In cyberspace, the emergence and increasing importance of search engine prompts numerous evaluation studies in regard to its effectiveness. Based on a user-oriented perspective, t...