-
作者:Santhanarn, Radhika; Sasidharan, Sharath; Webster, Jane
作者单位:University of Kentucky; Marshall University; Queens University - Canada
摘要:Technology-mediated learning methods are widely used by organizations and educational institutions to deliver information technology training. One form of technology-mediated learning, e-learning, in which the platform is the tutor, is quickly becoming the cost-effective solution of choice for many corporations. Unfortunately, the learning outcomes have been very disappointing. E-learning training makes an implicit assumption that learners can apply a high level of self-directed learning to as...
-
作者:Wang, Jingguo; Chaudhury, Aby; Rao, H. Raghav
作者单位:University of Texas System; University of Texas Arlington; Bryant University; State University of New York (SUNY) System; University at Buffalo, SUNY
摘要:Information security investment has been getting increasing attention in recent years. Various methods have been proposed to determine the effective level of security investment. However, traditional expected value methods (such as annual loss expectancy) cannot fully characterize the information security risk confronted by organizations, considering some extremal yet perhaps relatively rare cases in which a security failure may be critical and cause high losses. In this research note we intro...
-
作者:Devaraj, Sarv; Easley, Robert E.; Crant, J. Michael
作者单位:University of Notre Dame
摘要:The five-factor model (FFM) of personality has been used to great effect in management and psychology research to predict attitudes, cognitions, and behaviors, but has largely been ignored in the IS field. We demonstrate the potential utility of incorporating this model into IS research by using the FFM personality factors in the context of technology acceptance. We propose a dispositional perspective to understanding user attitudes and beliefs, and examine the effect of user personality-captu...
-
作者:Dawande, Milind; Johar, Monica; Kumar, Subodha; Mookerjee, Vijay S.
作者单位:University of Texas System; University of Texas Dallas; University of North Carolina; University of North Carolina Charlotte; University of Washington; University of Washington Seattle; University of Texas System; University of Texas Dallas
摘要:This study compares the performances of pair development (an approach in which a pair of developers jointly work on the same piece of code), solo development, and mixed development under two separate objectives: effort minimization and time minimization. To this end, we develop analytical models to optimize module-developer assignments in each of these approaches. These models are shown to be strongly NP-hard and solved using a genetic algorithm. The solo and pair development approaches are co...
-
作者:Storey, Veda C.; Burton-Jones, Andrew; Sugurnaran, Vijayan; Purao, Sandeep
作者单位:University System of Georgia; Georgia State University; University of British Columbia; Oakland University; Pennsylvania Commonwealth System of Higher Education (PCSHE); Pennsylvania State University; Pennsylvania State University - University Park
摘要:A major impediment to accurate information retrieval from the World Wide Web is the inability of search engines to incorporate semantics in the search process. This research presents a methodology, CONQUER (CONtext-aware QUERy processing), that enhances the semantic content of Web queries using two complementary knowledge sources: lexicons and ontologies. The methodology constructs a semantic net using the original query as a seed, and refines the net with terms from the two knowledge sources....
-
作者:August, Terrence; Tunca, Tunay I.
作者单位:University of California System; University of California San Diego; Stanford University
摘要:We study the question of whether a software vendor should allow users of unlicensed (pirated) copies of a software product to apply security patches. We present a joint model of network software security and software piracy and contrast two policies that a software vendor can enforce: (i) restriction of security patches only to legitimate users or (ii) provision of access to security patches to all users whether their copies are licensed or not. We find that when the software security risk is ...