This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
This research-in-progress paper describes the development of a research model exploring the antecedents and consequents of CIO role effectiveness. Specifically, we argue that CIO ...
This paper provides a list of factors that influence the outcome of standard battles. We have developed this list by performing a meta-analysis of 103 papers. An extensive literat...
Geerten van de Kaa, Henk Jan de Vries, Eric van He...
Improvements can be made for tendering processes to solve B2B interoperability and integration problem by means of Web services technology. In this paper, we detail our tendering ...
Lick Lun Nick Ng, Dickson K. W. Chiu, Patrick C. K...
In this paper, we present an open architecture that enables the coexistence of and the collaboration between different and heterogeneous clinical decision support models. Clinical...