In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...
What impact do process and data standards have on business process performance? This paper shows that process and data standards have a positive combined impact on business proces...
Bjoern Muenstermann, Andreas Eckhardt, Tim Weitzel
Many groups are interested in the insider threat problem, but the model generally used by all of these groups is implicitly binary—one is either within a perimeter or not. There...
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whal...
Almost all attempts to monetize internet applications targeted at individuals to date have focused on natural extensions of traditional media or traditional retailing. Most are ei...
Recent research has begun to place greater emphasis on the strategic use of IT in seeking to build firm’s capability, thus innovating firm’s business value. In this context, m...
We define a 0Day vulnerability to be any vulnerability, in deployed software, that has been discovered by at least one person but has not yet been publicly announced or patched. T...
Miles A. McQueen, Trevor A. McQueen, Wayne F. Boye...
In the context of ERP implementation, leadership is consistently found to be the most important factor leading to implementation success. However, most of the studies focus on lea...
The Panko–Halverson Taxonomy of Spreadsheet Risks has been widely used since its creation in the 1990s. This paper revises that taxonomy. It introduces new ways to count cell er...