This paper describes how the curriculum and course format at the Air Force Institute of Technology (AFIT) has evolved based on our experience with the highly-successful Cyber Defe...
Barry E. Mullins, Timothy H. Lacey, Robert F. Mill...
In order to balance the tensions of the concepts of organizational core competencies and dynamic capability we introduce social knowledge networks as a strategic means from a know...
Harald F. O. von Kortzfleisch, Ines Mergel, Christ...
In any forensic investigation, planning and analysis activities are required in order to determine what digital media will be seized, what types of information will be sought in t...
Alfred C. Bogen, David A. Dampier, Jeffrey C. Carv...
Vertical standards are complex networked technologies whose assimilation is subject to extensive interorganizational dependence and network effects. Classical theories of diffusio...
e-business organizations are under constant threat of their business being disrupted by hackers, viruses and a host of malicious attackers. This would lead to loses to the tune of...
Several data-centric communication paradigms have been proposed in the domain of wireless sensor networks (WSN). Therefore, the principles of operation and maintenance in such net...
—This conceptual paper proposes that Honda’s innovative prowess of producing both radical and disruptive innovations within their aerospace and automotive/pick-up truck develop...
Early grand challenge papers in health informatics identified numerous challenges, many of which either remain as open questions or have been resolved within fairly narrow domains...
The advent of the Internet has made the transmission of personally identifiable information common and often inadvertent to the user. As a consequence, individuals worry that comp...
Il-Horn Hann, Kai Lung Hui, Sang-Yong Tom Lee, Iva...
Since the Hong Kong SAR Government promulgated the first Digital 21 IT Strategy in November 1998, multiple major initiatives had been launched to establish the underlying infrastr...