954 research outputs found
Open Source Software Development Projects: Determinants of Project Popularity
This paper is an initial exploration of the determinants of open source project success as measured by project popularity. We simultaneously model the impact of project-specific characteristics on project popularity, and the impact of intended users and choice of operating system on the choice of end-user license. These models are jointly estimated using Full Information Maximum Likelihood Method. The results show that the software-user license, age of the project, project status, certain types of potential users, and compatibility with certain operating systems have a statistically significant impact on project popularity. An interesting finding is that GPL, the most widely used software license has an adverse impact on the popularity of an open source project.Open source project, OSS, FLOSS
Gapless points of dimerized quantum spin chains: analytical and numerical studies
We study the locations of the gapless points which occur for quantum spin
chains of finite length (with a twisted boundary condition) at particular
values of the nearest neighbor dimerization, as a function of the spin S and
the number of sites. For strong dimerization and large values of S, a tunneling
calculation reproduces the same results as those obtained from more involved
field theoretic methods using the non-linear sigma-model approach. A different
analytical calculation of the matrix element between the two Neel states gives
a set of gapless points; for strong dimerization, these differ significantly
from the tunneling values. Finally, the exact diagonalization method for a
finite number of sites yields a set of gapless points which are in good
agreement with the Neel state calculations for all values of the dimerization,
but the agreement with the tunneling values is not very good even for large S.
This raises questions about possible corrections to the tunneling results.Comment: Revtex4, 10 pages including 5 figure
Challenges to Cybersecurity: Current State of Affairs
Despite increasing investment in cybersecurity initiatives, incidents such as data breach, malware infections, and cyberattacks on cyberphysical systems show an upward trend. I identify the technical, economic, legal, and behavioral challenges that continue to obstruct any meaningful effort to achieve reasonable cybersecurity. I also summarize the recent initiatives that various stakeholders have taken to address these challenges and highlight the limitations of those initiatives
Waiting for Usable Open Source Software? Don\u27t Hold Your Breath!
There is a general consensus about the lack of usability in most open source software (OSS). Academics and practitioners have offered several suggestions to improve the usability of such software. However, a realistic assessment of OSS projects, specifically the motivations of OSS developers and their attitude toward software usability, lack of user feedback, and absence of usability experts in OSS projects, leads to the conclusion that strategies to improve OSS usability are unlikely to succeed anytime soon. The only exceptions will be OSS which enjoy sufficient financial support from individuals and organizations, and software that were developed by commercial software producers and later released under an open source license
A Qualitative Analysis Of The Role of Users, Vendors, and Governments in the Standards Development Process
Existing literature on IT standards focuses on the role of technical factors such as network effects and competitive behavior on the creation of standards. However, the role of users and vendors in initiating the standards definition and ratification process is less well understood. Given the advantages associated with standards, all users and vendors of IT products would be expected to be glad to participate in the standards definition and ratification process. However, if that were the case, many fewer proprietary technologies would compete. This paper explains qualitatively why users, vendors, and government bodies choose (or don\u27t choose) to participate in the standards definition and ratification process. A better understanding of their motivations for participating or not in the process should help to attract more participants to the process. The paper concludes by analyzing strategies to recover the cost of standards definition and ratification process, and their impact on the standards adoption rate
Magnetic properties of a helical spin chain with alternating isotropic and anisotropic spins: magnetization plateaus and finite entropy
We study a model which could explain some of the unusual magnetic properties
observed for the one-dimensional helical spin system Co(hfac)_2 NITPhOMe. One
of the properties observed is that the magnetization shows plateaus near zero
and near one-third of the saturation value if a magnetic field is applied along
the helical axis, but not if the field is applied in the plane perpendicular to
that axis. The system consists of a spin-1/2 chain in which cobalt ions (which
are highly anisotropic with an easy axis e_i) and organic radicals (which are
isotropic) alternate with each other. The easy axis of the cobalts e_i lie at
an angle theta_i with respect to the helical axis, while the projection of
e_{i+1} - e_i on the plane perpendicular to the helical axis is given by 2 pi
/3. For temperatures and magnetic fields which are much smaller than the
coupling between the nearest-neighbor cobalts and radicals, one can integrate
out the radicals to obtain an Ising model for the cobalts; this enables one to
compute the thermodynamic properties of the system using the transfer matrix
approach. We consider a model in which the tilt angles theta_i are allowed to
vary with i with period three; we find that for certain patterns of theta_i,
the system shows the magnetization plateaus mentioned above. At the ends of the
plateaus, the entropy is finite even at very low temperatures, while the
magnetic susceptibility and specific heat also show some interesting features.Comment: Revtex, 7 pages including 7 figure
Artificial Intelligence and Machine Learning in Cybersecurity: Applications, Challenges, and Opportunities for MIS Academics
The availability of massive amounts of data, fast computers, and superior machine learning (ML) algorithms has spurred interest in artificial intelligence (AI). It is no surprise, then, that we observe an increase in the application of AI in cybersecurity. Our survey of AI applications in cybersecurity shows most of the present applications are in the areas of malware identification and classification, intrusion detection, and cybercrime prevention. We should, however, be aware that AI-enabled cybersecurity is not without its drawbacks. Challenges to AI solutions include a shortage of good quality data to train machine learning models, the potential for exploits via adversarial AI/ML, and limited human expertise in AI. However, the rewards in terms of increased accuracy of cyberattack predictions, faster response to cyberattacks, and improved cybersecurity make it worthwhile to overcome these challenges. We present a summary of the current research on the application of AI and ML to improve cybersecurity, challenges that need to be overcome, and research opportunities for academics in management information systems
Cyber-physical Systems (CPS) Security: State of the Art and Research Opportunities for Information Systems Academics
Attacks on cyber-physical systems (CPS) continue to grow in frequency. However, cybersecurity academics and practitioners have so far focused primarily on computer systems and networks rather than CPS. Given the alarming frequency with which cybercriminals attack CPS and the unique cyber-physical relationship in CPS, we propose that CPS security needs go beyond what purely computer and network security requires. Thus, we require more focused research on cybersecurity based on the cyber-physical relationship between various CPS components. In this paper, we stock of the current state of CPS security and identify research opportunities for information systems (IS) academics
Understanding Open Source Software: A Research Classification Framework
The success of open source applications such as Apache, Linux, and Sendmail spurred interest in this form of software, its development process, and its implication for the software industry. This interest is evident in the existing research being done to address various issues relevant to open source software and open source methodology. This paper proposes a research classification framework that: informs about the current state of open source software research, provides a formal structure to classify this research, and identifies future research opportunities
- …