Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Business
Formal Verification Of Urban Traffic System Using The Concept Of Fuzzy Workflow Simulation, Manuj Darbari, Abhay Kumar Srivastava, Sanjay Medhavi
Formal Verification Of Urban Traffic System Using The Concept Of Fuzzy Workflow Simulation, Manuj Darbari, Abhay Kumar Srivastava, Sanjay Medhavi
Journal of International Technology and Information Management
Modeling complex urban traffic system requires extensive use of workflow methodologies which can simulate almost real time traffic situations. Number of studies were done in the field of Urban Traffic Simulation like PLOTS, NETSIM and PALAMICS but none of them could provide a real formal solution. Our paper proposes a methodology using Fuzzy Petri nets for modeling real time traffic system. Fuzzy Petrinets are also visualised and tested by using Flow- Charter and HPSIM software packages. These packages help in providing successive iterations of process model for further refinement.
The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht
The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht
Journal of International Technology and Information Management
Today’s numerous Quantitative Analysis (QA) tools have been successfully utilized to solve business problems in diverse applications. However, the application of QA tools in solving information security problems has been sparse. Devising the means and ways to use QA tools in resolving industry-wide security problems has the potential to yield enormous global economic benefit. The purpose of this paper is to explore the use of QA tools as a means of improving the processes involved in the Information Security Systems Development Lifecycle (SecSDL). Information security professionals use the SecSDL as a guide for formulating a comprehensive information security program. The …
An Examination Of Internet Effectiveness For Non-Work Activities, Pruthikrai Mahatanankoon, Tim Klaus, H. Joseph Wen
An Examination Of Internet Effectiveness For Non-Work Activities, Pruthikrai Mahatanankoon, Tim Klaus, H. Joseph Wen
Journal of International Technology and Information Management
The Internet is frequently used for non-work activities. When used for these purposes, the effectiveness of the Internet in accomplishing these leisure activities becomes an important consideration. Research literature has remained relatively silent in regards to the examination of accomplishing non-work tasks through the Internet. This study uses Davis’ Technology Acceptance Model (TAM) as a basis to predict different types of common user web activities—entertainment, communicating, and information searching. Using Structured Equation Modeling, this paper examines the effectiveness of the Internet in accomplishing non-work activities. In this study, the overall analysis of the survey data suggests that perceived ease of …