This exploratory study reports on term-long use of a discussion-based GSS by 137 undergraduate business students in a case-based core MIS course. We develop a model of student par...
Michael Parent, Derrick J. Neufeld, R. Brent Gallu...
New technology in knowledge discovery and data mining (KDD) make it possible to extract valuable information from operational data. Private businesses already use the technology f...
Hye-Chung (Monica) Kum, Dean Duncan, Kimberly Flai...
Static analysis has gained much attention over the past few years in applications such as bug finding and program verification. As software becomes more complex and componentize...
Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Web...
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
There is an ongoing debate about how to improve the quality of empirical research efforts in information systems. One of the persistent issues within the debate concerns the relat...