Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation Janice C. SipiorBurke T. Ward OriginalPaper 25 May 2007 Pages: 3 - 18
Formalising theories of trust for authentication protocols Ji MaMehmet A. Orgun OriginalPaper 04 October 2007 Pages: 19 - 32
A scalable multi-level feature extraction technique to detect malicious executables Mohammad M. MasudLatifur KhanBhavani Thuraisingham OriginalPaper 23 October 2007 Pages: 33 - 45
Building effective online game websites with knowledge-based trust Clyde W. HolsappleJiming Wu OriginalPaper 05 January 2008 Pages: 47 - 60
Market reaction to patent infringement litigations in the information technology industry T. S. RaghuWonseok WooH. Raghav Rao OriginalPaper 01 August 2007 Pages: 61 - 75
Spectrum acquisition strategies adopted by wireless carriers in the USA Hemant K. Sabat OriginalPaper 20 December 2007 Pages: 77 - 102
Techno-economic analysis and empirical study of network broadband investment: The case of backbone upgrading Borka Jerman-Blažič OriginalPaper 29 December 2007 Pages: 103 - 110
A decision support system for locating VHF/UHF radio jammer systems on the terrain Cevriye GencerEmel Kizilkaya AydoganCoskun Celik OriginalPaper 06 September 2007 Pages: 111 - 124