What impact do process and data standards have on business process performance? This paper shows that process and data standards have a positive combined impact on business proces...
Bjoern Muenstermann, Andreas Eckhardt, Tim Weitzel
Many groups are interested in the insider threat problem, but the model generally used by all of these groups is implicitly binary—one is either within a perimeter or not. There...
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whal...
Almost all attempts to monetize internet applications targeted at individuals to date have focused on natural extensions of traditional media or traditional retailing. Most are ei...
Recent research has begun to place greater emphasis on the strategic use of IT in seeking to build firm’s capability, thus innovating firm’s business value. In this context, m...
We define a 0Day vulnerability to be any vulnerability, in deployed software, that has been discovered by at least one person but has not yet been publicly announced or patched. T...
Miles A. McQueen, Trevor A. McQueen, Wayne F. Boye...
In the context of ERP implementation, leadership is consistently found to be the most important factor leading to implementation success. However, most of the studies focus on lea...
The Panko–Halverson Taxonomy of Spreadsheet Risks has been widely used since its creation in the 1990s. This paper revises that taxonomy. It introduces new ways to count cell er...
This paper examines how different facets of favorable user behavior drive the success of an online community by using a unique data set with surveys from 1,389 participants from t...
Automated negotiation has attracted growing interest within fields such as e-business, multi-agent systems, and web services. Nevertheless, a majority of automated negotiation res...
The craft of software understanding and verification can benefit from technologies that enable evolution toward a true engineering discipline. In current practice, software develo...