Volume 10, Issue 1 

General Issue

 

Table of Contents

Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation ( 3-18 )
Janice C. Sipior and Burke T. Ward
Villanova University, USA

Formalising theories of trust for authentication protocols ( 19-32 )
Ji Ma and Mehmet A. Orgun
Macquarie University, Sydney, Australia


A scalable multi-level feature extraction technique to detect malicious executables ( 33-45 )
Mohammad M. Masud , Latifur Khan and Bhavani Thuraisingham
The University of Texas at Dallas, USA


Building effective online game websites with knowledge-based trust ( 47-60 )
Clyde W. Holsapple and Jiming Wu
University of Kentucky, Lexington, KY, USA


Market reaction to patent infringement litigations in the information technology industry
( 61-75 )
T. S. Raghu*, Wonseok Woo**, S. B. Mohan# and H. Raghav Rao##
*Arizona State University, Tempe, AZ 85287, USA
**Ewha University, Seoul, South Korea
#SBM Associates, Bowling Green, OH, USA
##Suny at Buffalo, NY, USA

Spectrum acquisition strategies adopted by wireless carriers in the USA ( 77-102 )
Hemant K. Sabat
Chairman and Chief Executive Officer, Coscend Communications Solutions, L.L.C., Dallas, Texas, USA

Techno-economic analysis and empirical study of network broadband investment: The case of backbone upgrading ( 103-110 )
Borka Jerman-Blažic
Economics, University of Ljubljana, Slovenia

A decision support system for locating VHF/UHF radio jammer systems on the terrain ( 111-124 )
Cevriye Gencer* , Emel Kizilkaya Aydogan*, and Coskun Celik**
*Engineering and Architecture, Gazi University, Ankara
**Defence Sciences Institute, Turkish Military Academy, Ankara, Turkey