Extremists’ exploitation of computer-mediated communications such as online forums has recently gained much attention from academia and the government. However, due to the cover...
Firms involved in open source software face inherent limits on their ability to appropriate returns from technological innovation. Here I examine the business models used by IT ve...
Clinical Practice Guidelines (CPG) are used by healthcare practitioners to standardize clinical practice and to provide evidence mediated health-care. Currently, there have been c...
This paper presents research on developing a new type of software tool for training and assisting the personnel in emergency response planning. The tool, called Disciple-VPT, will...
Gheorghe Tecuci, Mihai Boicu, Thomas Hajduk, Dorin...
This research-in-progress paper describes the development of a research model exploring the antecedents and consequents of CIO role effectiveness. Specifically, we argue that CIO ...
Analog and hybrid computation methods are areas of continued interest, particularly in specific applications where traditional digital computation techniques cannot achieve the de...
Genetic anticipation for a particular disease can involve an earlier age at onset (or, diagnosis), greater severity, and/or a higher number of affected individuals in successive g...
Gleb R. Haynatzki, Randall E. Brand, Vera R. Hayna...
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Today’s search engines retrieve tens of thousands of web pages in response to fairly simple query articulations. These pages are retrieved on the basis of the query terms occurr...
Richong Zhang, Michael A. Shepherd, Jack Duffy, Ca...