954 research outputs found

    Open Source Software Development Projects: Determinants of Project Popularity

    Get PDF
    This paper is an initial exploration of the determinants of open source project success as measured by project popularity. We simultaneously model the impact of project-specific characteristics on project popularity, and the impact of intended users and choice of operating system on the choice of end-user license. These models are jointly estimated using Full Information Maximum Likelihood Method. The results show that the software-user license, age of the project, project status, certain types of potential users, and compatibility with certain operating systems have a statistically significant impact on project popularity. An interesting finding is that GPL, the most widely used software license has an adverse impact on the popularity of an open source project.Open source project, OSS, FLOSS

    Gapless points of dimerized quantum spin chains: analytical and numerical studies

    Get PDF
    We study the locations of the gapless points which occur for quantum spin chains of finite length (with a twisted boundary condition) at particular values of the nearest neighbor dimerization, as a function of the spin S and the number of sites. For strong dimerization and large values of S, a tunneling calculation reproduces the same results as those obtained from more involved field theoretic methods using the non-linear sigma-model approach. A different analytical calculation of the matrix element between the two Neel states gives a set of gapless points; for strong dimerization, these differ significantly from the tunneling values. Finally, the exact diagonalization method for a finite number of sites yields a set of gapless points which are in good agreement with the Neel state calculations for all values of the dimerization, but the agreement with the tunneling values is not very good even for large S. This raises questions about possible corrections to the tunneling results.Comment: Revtex4, 10 pages including 5 figure

    Challenges to Cybersecurity: Current State of Affairs

    Get PDF
    Despite increasing investment in cybersecurity initiatives, incidents such as data breach, malware infections, and cyberattacks on cyberphysical systems show an upward trend. I identify the technical, economic, legal, and behavioral challenges that continue to obstruct any meaningful effort to achieve reasonable cybersecurity. I also summarize the recent initiatives that various stakeholders have taken to address these challenges and highlight the limitations of those initiatives

    Waiting for Usable Open Source Software? Don\u27t Hold Your Breath!

    Get PDF
    There is a general consensus about the lack of usability in most open source software (OSS). Academics and practitioners have offered several suggestions to improve the usability of such software. However, a realistic assessment of OSS projects, specifically the motivations of OSS developers and their attitude toward software usability, lack of user feedback, and absence of usability experts in OSS projects, leads to the conclusion that strategies to improve OSS usability are unlikely to succeed anytime soon. The only exceptions will be OSS which enjoy sufficient financial support from individuals and organizations, and software that were developed by commercial software producers and later released under an open source license

    A Qualitative Analysis Of The Role of Users, Vendors, and Governments in the Standards Development Process

    Get PDF
    Existing literature on IT standards focuses on the role of technical factors such as network effects and competitive behavior on the creation of standards. However, the role of users and vendors in initiating the standards definition and ratification process is less well understood. Given the advantages associated with standards, all users and vendors of IT products would be expected to be glad to participate in the standards definition and ratification process. However, if that were the case, many fewer proprietary technologies would compete. This paper explains qualitatively why users, vendors, and government bodies choose (or don\u27t choose) to participate in the standards definition and ratification process. A better understanding of their motivations for participating or not in the process should help to attract more participants to the process. The paper concludes by analyzing strategies to recover the cost of standards definition and ratification process, and their impact on the standards adoption rate

    Magnetic properties of a helical spin chain with alternating isotropic and anisotropic spins: magnetization plateaus and finite entropy

    Get PDF
    We study a model which could explain some of the unusual magnetic properties observed for the one-dimensional helical spin system Co(hfac)_2 NITPhOMe. One of the properties observed is that the magnetization shows plateaus near zero and near one-third of the saturation value if a magnetic field is applied along the helical axis, but not if the field is applied in the plane perpendicular to that axis. The system consists of a spin-1/2 chain in which cobalt ions (which are highly anisotropic with an easy axis e_i) and organic radicals (which are isotropic) alternate with each other. The easy axis of the cobalts e_i lie at an angle theta_i with respect to the helical axis, while the projection of e_{i+1} - e_i on the plane perpendicular to the helical axis is given by 2 pi /3. For temperatures and magnetic fields which are much smaller than the coupling between the nearest-neighbor cobalts and radicals, one can integrate out the radicals to obtain an Ising model for the cobalts; this enables one to compute the thermodynamic properties of the system using the transfer matrix approach. We consider a model in which the tilt angles theta_i are allowed to vary with i with period three; we find that for certain patterns of theta_i, the system shows the magnetization plateaus mentioned above. At the ends of the plateaus, the entropy is finite even at very low temperatures, while the magnetic susceptibility and specific heat also show some interesting features.Comment: Revtex, 7 pages including 7 figure

    Artificial Intelligence and Machine Learning in Cybersecurity: Applications, Challenges, and Opportunities for MIS Academics

    Get PDF
    The availability of massive amounts of data, fast computers, and superior machine learning (ML) algorithms has spurred interest in artificial intelligence (AI). It is no surprise, then, that we observe an increase in the application of AI in cybersecurity. Our survey of AI applications in cybersecurity shows most of the present applications are in the areas of malware identification and classification, intrusion detection, and cybercrime prevention. We should, however, be aware that AI-enabled cybersecurity is not without its drawbacks. Challenges to AI solutions include a shortage of good quality data to train machine learning models, the potential for exploits via adversarial AI/ML, and limited human expertise in AI. However, the rewards in terms of increased accuracy of cyberattack predictions, faster response to cyberattacks, and improved cybersecurity make it worthwhile to overcome these challenges. We present a summary of the current research on the application of AI and ML to improve cybersecurity, challenges that need to be overcome, and research opportunities for academics in management information systems

    Cyber-physical Systems (CPS) Security: State of the Art and Research Opportunities for Information Systems Academics

    Get PDF
    Attacks on cyber-physical systems (CPS) continue to grow in frequency. However, cybersecurity academics and practitioners have so far focused primarily on computer systems and networks rather than CPS. Given the alarming frequency with which cybercriminals attack CPS and the unique cyber-physical relationship in CPS, we propose that CPS security needs go beyond what purely computer and network security requires. Thus, we require more focused research on cybersecurity based on the cyber-physical relationship between various CPS components. In this paper, we stock of the current state of CPS security and identify research opportunities for information systems (IS) academics

    Understanding Open Source Software: A Research Classification Framework

    Get PDF
    The success of open source applications such as Apache, Linux, and Sendmail spurred interest in this form of software, its development process, and its implication for the software industry. This interest is evident in the existing research being done to address various issues relevant to open source software and open source methodology. This paper proposes a research classification framework that: informs about the current state of open source software research, provides a formal structure to classify this research, and identifies future research opportunities
    corecore