Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Physical Sciences and Mathematics
Extended Collaboration Description Language (X-Codl), Jia Zhang
Extended Collaboration Description Language (X-Codl), Jia Zhang
Jia Zhang
No abstract provided.
Ubiquitous Provision Of Context Aware Web Services, Irene Chen, Stephen Yang, Jia Zhang
Ubiquitous Provision Of Context Aware Web Services, Irene Chen, Stephen Yang, Jia Zhang
Jia Zhang
No abstract provided.
Fault Injection-Based Test Case Generation For Soa-Oriented Software, Jia Zhang, Robin Qiu
Fault Injection-Based Test Case Generation For Soa-Oriented Software, Jia Zhang, Robin Qiu
Jia Zhang
No abstract provided.
The Tablet Pc For Faculty: A Pilot Project, Rob Weitz, Bert Wachsmuth, Danielle Mirliss
The Tablet Pc For Faculty: A Pilot Project, Rob Weitz, Bert Wachsmuth, Danielle Mirliss
Bert Wachsmuth
This paper describes a pilot project with the purpose of evaluating the usefulness of tablet PCs for university professors. The focus is on the value of tablets primarily with respect to teaching and learning (and not for research or administrative work). Sixty-four professors, distributed across the various schools of a university, were provided with tablet PCs and were trained in their use.
Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara
Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara
Qing Hu
With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …