1,530 research outputs found

    The Magnitude of Switching Costs for Corporate Antivirus Software Switching Decision

    Get PDF
    Today’s businesses environment is forcing companies to become increasingly more efficient in applying Internet technology to conduct transactions. AS the possibility of infection by computer virus is much greater now than ever before, businesses search for appropriate corporate antivirus software to safeguard their computer systems. This paper considers corporate antivirus software switching as one of the major security selection problem and proposes possible avenues for software switching decision and management. In conceptual model, we draw upon switching costs where transaction costs, learning costs, and artificial costs were examined as main costs for software switching decision. Our findings shown only two out of three types of switching costs have influence over corporate antivirus software switching decisions. Despite the existence of switching costs, businesses continue to repeat software switching because the perceived risks of security threats are much greater than the switching cost itself. Furthermore, we examine various approaches to the cost of switching and then propose an index map to evaluate switching decision. Five sets of propositions are advanced to help guide this research

    A Study on Security Attributes of Software-Defined Wide Area Network

    Get PDF
    For organizations to communicate important data across various branches, a reliable Wide Area Network (WAN) is important. With the increase of several factors such as usage of cloud services, WAN bandwidth demand, cost of leased lines, complexity in building/managing WAN and changing business needs led to need of next generation WAN. Software-defined wide area network (SD- WAN) is an emerging trend in today’s networking world as it simplifies management of network and provides seamless integration with the cloud. Compared to Multiprotocol Label Switching (MPLS) majorly used in traditional WAN architecture, SD-WAN incurs less cost, highly secure and offers great performance. This paper will mainly focus to investigate this next-generation WAN’s security attributes as security plays a crucial role in SD-WAN implementation. The goal of the paper is to analyze SD-WAN security by applying principles of CIA triad principle. Comparison of SD-WAN products offered by three different vendors in SD-WAN market with respect to its security is another important area that will be covered in this paper

    Trust-based content filtering: Investigating the association between assurance seals, source expertise, and topics of online product reviews

    Get PDF
    Online product reviews are a significant component affecting transactions in business-to-consumer (B2C) e-commerce. The sheer volume of online reviews makes it virtually impossible for buyers to systematically process all reviews available. Drawing on the elaboration likelihood model (ELM) and web assurance seals (AS) literature, we investigate the association between two trust-building proxies included in reviews: verified buyer flag (VBF) and reviewer’s technical understanding (TU), and topics discussed in online product reviews. Our results indicate that both VBF and TU affect review content. From a practical perspective, we provide a means of content filtering that can be implemented at a recommender system level to reduce information overload prospective buyers are subjected to. From a theoretical perspective our results indicate there is an identifiable shift that has occurred in the e-commerce environment. More specifically, the evolution of the web has brought elements of consumer-to-consumer (C2C) interactions into the space typically reserved for B2C landscape, where sellers also act as intermediaries facilitating information exchange between buyers

    Harnessing Technology in Schools Survey 2007: technical report

    Get PDF
    This technical report provides a detailed review of the methods used and the data gathered for this survey. The report also provides copies of the research instruments used in this survey

    Goal-oriented Email Stream Classifier with A Multi-agent System Approach

    Get PDF
    Now-a-days, email is often one of the most widely used means of communication despite the rise of other communication methods such as instant messaging or communication via social networks. The need to automate the email stream management increases for reasons such as multi-folder categorization, and spam email classification. There are solutions based on email content, capable of contemplating elements such as the text subjective nature, adverse effects of concept drift, among others. This paper presents an email stream classifier with a goal-oriented approach to client and server environment. The i* language was the basis for designing the proposed email stream classifier. The email environment was represented with the early requirements model and the proposed classifier with the late requirements model. The classifier was implemented following a multi-agent system approach supported by JADE agent platform and Implementation_JADE pattern. The behavior of agents was taking from an existing classifier. The multi-agent classifier was evaluated using functional, efficacy and performance tests, which compared the existing classifier with the multi-agent approach. The results obtained were satisfactory in all the tests. The performance of multi-agent approach was better than the existing classifier due to the use of multi-threads.This work was performed as part of the Smart University Project financed by the University of Alicante
    • …
    corecore