Volume 10, Issue 1 |
General Issue
Table of Contents
Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation (
3-18
)
Janice C. Sipior and Burke T. Ward
Villanova University, USA
Formalising theories of trust for authentication protocols (
19-32
)
Ji Ma and Mehmet A. Orgun
Macquarie University, Sydney, Australia
A scalable multi-level feature extraction technique to detect malicious executables (
33-45
)
Mohammad M. Masud , Latifur Khan and Bhavani Thuraisingham
The University of Texas at Dallas, USA
Market reaction to patent infringement litigations in the information technology industry (
61-75
)
T. S. Raghu*, Wonseok Woo**, S. B. Mohan# and H. Raghav Rao##
*Arizona State University, Tempe, AZ 85287, USA
**Ewha University, Seoul, South Korea
#SBM Associates, Bowling Green, OH, USA
##Suny at Buffalo, NY, USA
Spectrum acquisition strategies adopted by wireless carriers in the USA (
77-102
)
Hemant K. Sabat
Chairman and Chief Executive Officer, Coscend Communications Solutions, L.L.C., Dallas, Texas, USA
Techno-economic analysis and empirical study of network broadband investment: The case of backbone upgrading (
103-110
)
Borka Jerman-Blažic
Economics, University of Ljubljana, Slovenia
A decision support system for locating VHF/UHF radio jammer systems on the terrain (
111-124
)
Cevriye Gencer* , Emel Kizilkaya Aydogan*, and Coskun Celik**
*Engineering and Architecture, Gazi University, Ankara
**Defence Sciences Institute, Turkish Military Academy, Ankara, Turkey