This study explored the influence of language familiarity on persuasion behavior in e-negotiation. This was motivated by booming global e-business and the resulting popularity of ...
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...
This paper presents a new LP (Linear Programming) model to solve a tactical wood procurement and harvesting problem. This optimization problem occurs in several wood supply chains...
Given the limitation of hearing and understanding speech for many individuals, we plan to supplement the sound of speech and speechreading with an additional informative visual in...
Investments in innovative technologies face uncertainties and are often made in stages. We develop a multi-period game-theoretical model where the potential of a new technology is...
Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of...
Kara L. Nance, Brian Hay, Ronald Dodge, James Wrub...
Many employers now provide electronic personal health records (PHR) to employees as part of a free or low cost health benefit program. This paper reports findings from a survey di...
Juanita Dawson, Benjamin L. Schooley, Bengisu Tulu