Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Engineering

Bibliometric Analysis Of The Literature In The Field Of Information Technology Relatedness, Ilham M, Anis Eliyana, Praptini Yulianti Dec 2020

Bibliometric Analysis Of The Literature In The Field Of Information Technology Relatedness, Ilham M, Anis Eliyana, Praptini Yulianti

Library Philosophy and Practice (e-journal)

This bibliometric describe Information Technology Relateness is defined as the use of information technology infrastructure and information technology management processes betweeWas this submission previously published in a journal? Bepress will automatically create an OpenURL for published articles. Learn more about OpenURLsn business units together. There is not much research on Information Technology Relateness by providing a big picture that is visualized from year to year. This study aims to map research in the field of Information Technology Relateness with data from all international research publications. This study performs a bibliometric method and analyzes research data using the Services Analyze …


Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke Dec 2012

Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke

Professor Katina Michael

During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …


Slides: Engaging Stakeholders, Duane Zavadil Oct 2010

Slides: Engaging Stakeholders, Duane Zavadil

Opportunities and Obstacles to Reducing the Environmental Footprint of Natural Gas Development in Uintah Basin (October 14)

Presenter: Duane Zavadil, Bill Barrett Corporation

5 slides


Formal Verification Of Urban Traffic System Using The Concept Of Fuzzy Workflow Simulation, Manuj Darbari, Abhay Kumar Srivastava, Sanjay Medhavi Jan 2009

Formal Verification Of Urban Traffic System Using The Concept Of Fuzzy Workflow Simulation, Manuj Darbari, Abhay Kumar Srivastava, Sanjay Medhavi

Journal of International Technology and Information Management

Modeling complex urban traffic system requires extensive use of workflow methodologies which can simulate almost real time traffic situations. Number of studies were done in the field of Urban Traffic Simulation like PLOTS, NETSIM and PALAMICS but none of them could provide a real formal solution. Our paper proposes a methodology using Fuzzy Petri nets for modeling real time traffic system. Fuzzy Petrinets are also visualised and tested by using Flow- Charter and HPSIM software packages. These packages help in providing successive iterations of process model for further refinement.


An Examination Of Internet Effectiveness For Non-Work Activities, Pruthikrai Mahatanankoon, Tim Klaus, H. Joseph Wen Jan 2007

An Examination Of Internet Effectiveness For Non-Work Activities, Pruthikrai Mahatanankoon, Tim Klaus, H. Joseph Wen

Journal of International Technology and Information Management

The Internet is frequently used for non-work activities. When used for these purposes, the effectiveness of the Internet in accomplishing these leisure activities becomes an important consideration. Research literature has remained relatively silent in regards to the examination of accomplishing non-work tasks through the Internet. This study uses Davis’ Technology Acceptance Model (TAM) as a basis to predict different types of common user web activities—entertainment, communicating, and information searching. Using Structured Equation Modeling, this paper examines the effectiveness of the Internet in accomplishing non-work activities. In this study, the overall analysis of the survey data suggests that perceived ease of …


The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht Jan 2007

The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht

Journal of International Technology and Information Management

Today’s numerous Quantitative Analysis (QA) tools have been successfully utilized to solve business problems in diverse applications. However, the application of QA tools in solving information security problems has been sparse. Devising the means and ways to use QA tools in resolving industry-wide security problems has the potential to yield enormous global economic benefit. The purpose of this paper is to explore the use of QA tools as a means of improving the processes involved in the Information Security Systems Development Lifecycle (SecSDL). Information security professionals use the SecSDL as a guide for formulating a comprehensive information security program. The …