California State University

Displaying 1-34 of 34 results

  • White Papers // Apr 2013

    Overloaded Satellite Receiver Using SIC with Hybrid Beamforming and ML Detection

    In this paper, a new receiver structure that is intended to detect the signals from multiple adjacent satellites in the presence of other interfering satellites is proposed. The authors tackle the worst case interference conditions, i.e., it is assumed that uncoded signals that fully overlap in frequency arrive at a...

    Provided By California State University

  • White Papers // Feb 2013

    Understanding the Behavior of Internet Worm Through PArallel Worm Simulator (PAWS)

    Internet and the computer networks have become crucial to efficient operation of institutions and the society. But, this makes it possible for a lone hacker to significantly impact these institutions and society through worm attacks. Such worm attacks are becoming common news leading to a feeling of insecurity. The intention...

    Provided By California State University

  • White Papers // Jul 2012

    Implementation of a Web Application for Evaluation of Web Application Security Scanners

    With more and more people becoming Internet users there have been great increase in using Web in all areas of life, including communication, education and shopping. And as a result of these changes the security concerns have also grown. The web application vulnerability scanners help reduce these security concerns in...

    Provided By California State University

  • White Papers // Jul 2012

    The Zachman Framework, the Owner's Perspective & Security

    Nature of business has changed in the past half century. Most businesses have grown from region-specific to global. Goals of business, business processes, supplier chains and business economics have changed from simpler to complex. The Zachman Framework is one of the oldest Enterprise Architecture Frameworks. It is a unique approach...

    Provided By California State University

  • White Papers // Dec 2011

    The Effect of Website Design Dimensions on Initial Trust: A Synthesis of the Empirical Literature

    This paper aims to provide an integrative review of the experiment-based literature on the antecedents of initial trust in a Business-To-Consumer (B2C) e-commerce setting. To that end, the authors present a framework that classifies trust-inducing website features according to three broad dimensions, namely visual design, social cue design and content...

    Provided By California State University

  • White Papers // May 2011

    A Cloud Oriented Framework for Scientific Data Processing

    In recent years, there has been an exponential growth in the amount of data that needs to be processed. The authors' work concerns the use of cloud computing for data processing. To study the problem, they designed a framework for experimenting with various cloud-computing arrangements. The main goal is a...

    Provided By California State University

  • White Papers // May 2011

    Enterprise Security Planning using the Zachman Framework - Builder's Perspective

    In recent years Enterprise Architecture (EA) has acquired recognition as playing a pivotal role in change processes. Purported benefits of having enterprise architecture include improved decision making, improved adaptability to changing demands or market conditions, elimination of inefficient and redundant processes, optimization of the use of organizational assets and effectively...

    Provided By California State University

  • White Papers // May 2011

    Enterprise Security Planning using Zachman Framework: Designer's Perspective

    An effective Enterprise Architecture framework can help an organization or an enterprise deal with the ever-changing business and technology needs and Zachman Framework is one such Enterprise Architecture framework. With Organizations having to operate businesses in a rapid changing climate, security is the biggest concern and an urgent issue for...

    Provided By California State University

  • White Papers // May 2011

    Enterprise Security Planning with TOGAF-9

    Enterprise security architecture is a unifying framework and reusable services that implement policy, standard and risk management decision. The purpose of the security architecture is to bring focus to the key areas of concern for the enterprise, highlighting decision criteria and context for each domain. TOGAF-9 architecture framework provides guidance...

    Provided By California State University

  • White Papers // May 2011

    Enterprise Security Planning with Department of Defense Architecture Framework (DODAF)

    The Department of Defense Architecture Framework (DoDAF) is an enterprise architecture framework designed to model large and complex enterprises and systems, where their integration and interoperability pose challenges. The U.S Government Department of Defense employs DoDAF to develop and document its large and complex enterprise architecture. DoDAF itself has become...

    Provided By California State University

  • White Papers // Mar 2011

    The Software Performance of Authenticated-Encryption Mod

    The authors study the software performance of authenticated-encryption modes CCM, GCM, and OCB. Across a variety of platforms, they find OCB to be substantially faster than either alternative. For example, on an Intel i5 ("Clarkdale") processor, good implementations of CCM, GCM, and OCB encrypt at around 4.2 cpb, 3.7 cpb,...

    Provided By California State University

  • White Papers // Oct 2010

    Regression Discontinuity Marginal Threshold Treatment Effects

    In regression discontinuity models, where the probability of treatment jumps discretely when a running variable crosses a threshold, an average treatment effect can be nonparametrically identified. The authors show that the derivative of this treatment effect with respect to the threshold is also nonparametrically identified and easily estimated, in both...

    Provided By California State University

  • White Papers // Sep 2010

    Media Training Guide

    The media generally works under extremely tight deadlines, usually turning around stories in a matter of hours or even minutes. It is not uncommon for reporters to contact you and arrange an interview the same day a story is due. Do not panic if such a media request occurs. Always...

    Provided By California State University

  • White Papers // Jun 2010

    Analysis of Microprocessor Based Protective Relay's (MBPR) Differential Equation Algorithms

    This paper analyses and explains from the systems point of view, Microprocessor Based Protective Relay (MBPR) systems with emphasis on differential equation algorithms. Presently, the application of protective relaying in power systems, using MBPR systems, based on the differential equation algorithm is valued more than the protection relaying based on...

    Provided By California State University

  • White Papers // May 2010

    Is The Full-Range Model Of Leadership Really A Full-Range Model

    A field study was conducted to compare the three meta-categories assessed in the Managerial Practices Survey (MPS) to the "Full-range" taxonomy assessed in the Multifactor Leadership Questionnaire (MLQ). Dyadic and group-level analyses found that subordinate job attitudes and boss rated managerial effectiveness were predicted better by the MPS meta-categories than...

    Provided By California State University

  • White Papers // May 2010

    Security Issues for Mobile Government

    Mobile and Wireless systems offer new services for public administration that cannot be served by customary wired systems. The wireless mobile system is a solution for some problems that exist in traditional wired systems but they also initiate new security issues. Although the security concerns of wireless mobile systems cannot...

    Provided By California State University

  • White Papers // Feb 2010

    Comparative And Strategic Role Of ERP In "Six Sigma" Quality

    In quest for customers' loyalty and higher profit, industries try to bring customers' requirements to the forefront of their planning and strategies initiatives, and to make effective and informed decisions. The "Six Sigma" methodology, which is a new way to manage the businesses differently, has been the subject of many...

    Provided By California State University

  • White Papers // Dec 2009

    Comparative Study Of Ipv4 vs. Ipv6 Network Performance In Windows 7

    IPv4 is the foundation of the internet and has served the world remarkably well, especially considering it is well over 20 years old. Unfortunately IPv4 has reached the end of its useful life. The number of electronic devices connected to the internet is increasing without an end in sight and...

    Provided By California State University

  • White Papers // Dec 2009

    A Decision Support Tool for Locating an Impact of an Inland Port in Inland Empire

    By diverting port-related truck trips to rail, the development and operation of an inland port in southern California: increase transportation efficiency by switching from truck to train, create a smoother flow on the highways, create a cleaner environment, Increase the capacity of the ports, reduce demands on port land, and...

    Provided By California State University

  • White Papers // Dec 2009

    Developing A Multi-Agent Automated Negotiation Service Based On Service-Oriented Architecture

    Automated negotiation has become the core of the intelligent e-commerce. Traditional research in automated negotiation is focused on theory about negotiation protocol and strategy. However, the application of automated negotiation system has lagged far behind. This paper discusses reasons for such a situation and points out that making the automated...

    Provided By California State University

  • White Papers // Oct 2009

    Credibility Factors and Content Management for Commercial Web Sites

    It is the primordial rule that commercial websites thrive on efficient content management services. Web credibility has become the keyword for success because persuading visitors to a person's site should be for more than just good looks. Building a website and maintaining it doesn't allow one to rest their laurels....

    Provided By California State University

  • White Papers // Aug 2009

    Visualizing Stock-Mutual Fund Relationships Through Social Network Analysis

    In this paper the authors analyze the network structure of stocks (as actors in a 2-mode/affiliation social network) and their relationship to mutual funds. The analysis reveals a network structure that has both the "Hub" and "Small world" characteristics of many common social and physical networks thus suggesting that stock...

    Provided By California State University

  • White Papers // Jun 2009

    Using Data Fusion for Biometric Verification

    A wide spectrum of systems require reliable personal recognition schemes to either confirm or determine the identity of an individual person. This paper considers multimodal biometric system and their applicability to access control, authentication and security applications. Strategies for feature extraction and sensor fusion are considered and contrasted. Issues related...

    Provided By California State University

  • White Papers // May 2009

    Business Intelligence Technologies : Recent Developments and Future Trends

    An overview is provided in this paper of the most important and recent developments plus the major future trends in academic research and software market for Business Intelligence (BI) technologies. Firstly, hot research topics and areas are examined in the BI domain that were revealed by papers and articles published...

    Provided By California State University

  • White Papers // May 2009

    Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs)

    Mobile Ad hoc NETworks (MANETs) have several advantages compared to traditional wireless networks. These include ease of deployment, speed of deployment and decreased dependency on a fixed infrastructure. There have been many studies done in this area to improve the quality and efficiency of the routing protocols in MANETs. However,...

    Provided By California State University

  • White Papers // May 2009

    The Security Problems of Vehicular Ad Hoc Networks (VANETs) and Proposed Solutions in Securing their Operations

    Inter-Vehicular Communications (IVC) also known as Vehicular Ad hoc NETworks (VANETs) have become very popular in recent years. The successful deployment of Vehicular Ad hoc NETworks (VANETs) has to overcome the serious security threats which impair the operation of different vehicular applications. This paper presents the vulnerabilities of vehicular ad...

    Provided By California State University

  • White Papers // May 2009

    Today & Tomorrow: IEEE 802.11 WLAN Security

    After all those enhancements in Internet technology, the Internet has become part of people's lives, so they want to have it ready to use not only on their PCs but also in their mobile devices. WLANs have become very popular thanks to the development of IEEE 802.11 standard family. As...

    Provided By California State University

  • White Papers // May 2009

    Security in Wireless Sensor Networks - A Study

    Wireless Sensor Networks (WSNs) are used in many commercial, military, industrial, research and medical applications. Because of the limited resources of the sensor nodes in the wireless environment, these networks impose special security requirements besides to the security needs in traditional networks. This paper presents the security problems in WSNs...

    Provided By California State University

  • White Papers // Mar 2009

    Semantic Business Process for Improved Exception Handling

    The execution of a business process often includes multiple entities. These entities are not under the control of the process, and because of the intricacies of the real-world, their behavior cannot always be predicted. This is why, although a business process may have a single ideal execution path, in practice,...

    Provided By California State University

  • White Papers // Jan 2009

    Active Institutional Investors And Corporate Investment Performance

    This paper examines the impacts of different types of institutional investors on the performance of corporate investments. The authors find that institutional ownership overall has a significant and positive impact on the quality of corporate investment and hence improves firms' stock market and operating performances. Different types of institutional investors...

    Provided By California State University

  • White Papers // Aug 2008

    Avatar Business Value Analysis: A Method for the Evaluation of Business Value Creation in Virtual Commerce

    The recent years have seen the emergence of a number of virtual worlds with various designs and purposes. Some have become very popular and have developed growing in-world economies. Real-world businesses are increasingly experimenting with doing virtual business there as well. In this paper, the authors present Avatar Business Value...

    Provided By California State University

  • White Papers // Jan 2007

    Grid-Based Secure Web Service Framework for Bioinformatics

    Although the web-based bioinformatics is very popular after dozens of years' growth, biologists found out that it is inconvenient because they need to access many web sites manually in order to perform a single task. Web-service based bioinformatics was proposed to provide well-defined interfaces accessible to programs. However, security for...

    Provided By California State University

  • White Papers // Feb 2006

    Exploring the Relationship Between Structural Market Conditions and Business Conduct in Mobile Data Service Markets

    A business model represents the decision space for strategic options of a firm. These options are determined by the market situation in which the firm operates. Among these options the firm makes its strategic decisions which are evaluated by the firm's performance in the market measured by business values. Thus,...

    Provided By California State University

  • White Papers // Aug 2004

    An Empirical Investigation of Federal Wetlands Regulation and Flood Delineation: Implications for Residential Property Owners

    Since the early 1970s, the federal government has undertaken extensive efforts to stem the loss of wetlands by regulating the use of land. This paper investigates the extent to which residential property owners are affected by federal wetlands regulation, by presenting an empirical investigation of such economic consequences. Results suggest...

    Provided By California State University

  • White Papers // Apr 2013

    Overloaded Satellite Receiver Using SIC with Hybrid Beamforming and ML Detection

    In this paper, a new receiver structure that is intended to detect the signals from multiple adjacent satellites in the presence of other interfering satellites is proposed. The authors tackle the worst case interference conditions, i.e., it is assumed that uncoded signals that fully overlap in frequency arrive at a...

    Provided By California State University

  • White Papers // Jul 2012

    Implementation of a Web Application for Evaluation of Web Application Security Scanners

    With more and more people becoming Internet users there have been great increase in using Web in all areas of life, including communication, education and shopping. And as a result of these changes the security concerns have also grown. The web application vulnerability scanners help reduce these security concerns in...

    Provided By California State University

  • White Papers // Jul 2012

    The Zachman Framework, the Owner's Perspective & Security

    Nature of business has changed in the past half century. Most businesses have grown from region-specific to global. Goals of business, business processes, supplier chains and business economics have changed from simpler to complex. The Zachman Framework is one of the oldest Enterprise Architecture Frameworks. It is a unique approach...

    Provided By California State University

  • White Papers // May 2011

    Enterprise Security Planning using the Zachman Framework - Builder's Perspective

    In recent years Enterprise Architecture (EA) has acquired recognition as playing a pivotal role in change processes. Purported benefits of having enterprise architecture include improved decision making, improved adaptability to changing demands or market conditions, elimination of inefficient and redundant processes, optimization of the use of organizational assets and effectively...

    Provided By California State University

  • White Papers // May 2011

    Enterprise Security Planning using Zachman Framework: Designer's Perspective

    An effective Enterprise Architecture framework can help an organization or an enterprise deal with the ever-changing business and technology needs and Zachman Framework is one such Enterprise Architecture framework. With Organizations having to operate businesses in a rapid changing climate, security is the biggest concern and an urgent issue for...

    Provided By California State University

  • White Papers // May 2011

    Enterprise Security Planning with TOGAF-9

    Enterprise security architecture is a unifying framework and reusable services that implement policy, standard and risk management decision. The purpose of the security architecture is to bring focus to the key areas of concern for the enterprise, highlighting decision criteria and context for each domain. TOGAF-9 architecture framework provides guidance...

    Provided By California State University

  • White Papers // May 2011

    Enterprise Security Planning with Department of Defense Architecture Framework (DODAF)

    The Department of Defense Architecture Framework (DoDAF) is an enterprise architecture framework designed to model large and complex enterprises and systems, where their integration and interoperability pose challenges. The U.S Government Department of Defense employs DoDAF to develop and document its large and complex enterprise architecture. DoDAF itself has become...

    Provided By California State University

  • White Papers // May 2010

    Security Issues for Mobile Government

    Mobile and Wireless systems offer new services for public administration that cannot be served by customary wired systems. The wireless mobile system is a solution for some problems that exist in traditional wired systems but they also initiate new security issues. Although the security concerns of wireless mobile systems cannot...

    Provided By California State University

  • White Papers // May 2009

    The Security Problems of Vehicular Ad Hoc Networks (VANETs) and Proposed Solutions in Securing their Operations

    Inter-Vehicular Communications (IVC) also known as Vehicular Ad hoc NETworks (VANETs) have become very popular in recent years. The successful deployment of Vehicular Ad hoc NETworks (VANETs) has to overcome the serious security threats which impair the operation of different vehicular applications. This paper presents the vulnerabilities of vehicular ad...

    Provided By California State University

  • White Papers // May 2009

    Today & Tomorrow: IEEE 802.11 WLAN Security

    After all those enhancements in Internet technology, the Internet has become part of people's lives, so they want to have it ready to use not only on their PCs but also in their mobile devices. WLANs have become very popular thanks to the development of IEEE 802.11 standard family. As...

    Provided By California State University

  • White Papers // May 2009

    Security in Wireless Sensor Networks - A Study

    Wireless Sensor Networks (WSNs) are used in many commercial, military, industrial, research and medical applications. Because of the limited resources of the sensor nodes in the wireless environment, these networks impose special security requirements besides to the security needs in traditional networks. This paper presents the security problems in WSNs...

    Provided By California State University

  • White Papers // May 2011

    A Cloud Oriented Framework for Scientific Data Processing

    In recent years, there has been an exponential growth in the amount of data that needs to be processed. The authors' work concerns the use of cloud computing for data processing. To study the problem, they designed a framework for experimenting with various cloud-computing arrangements. The main goal is a...

    Provided By California State University

  • White Papers // Aug 2004

    An Empirical Investigation of Federal Wetlands Regulation and Flood Delineation: Implications for Residential Property Owners

    Since the early 1970s, the federal government has undertaken extensive efforts to stem the loss of wetlands by regulating the use of land. This paper investigates the extent to which residential property owners are affected by federal wetlands regulation, by presenting an empirical investigation of such economic consequences. Results suggest...

    Provided By California State University

  • White Papers // Oct 2009

    Credibility Factors and Content Management for Commercial Web Sites

    It is the primordial rule that commercial websites thrive on efficient content management services. Web credibility has become the keyword for success because persuading visitors to a person's site should be for more than just good looks. Building a website and maintaining it doesn't allow one to rest their laurels....

    Provided By California State University

  • White Papers // May 2009

    Business Intelligence Technologies : Recent Developments and Future Trends

    An overview is provided in this paper of the most important and recent developments plus the major future trends in academic research and software market for Business Intelligence (BI) technologies. Firstly, hot research topics and areas are examined in the BI domain that were revealed by papers and articles published...

    Provided By California State University

  • White Papers // Dec 2009

    A Decision Support Tool for Locating an Impact of an Inland Port in Inland Empire

    By diverting port-related truck trips to rail, the development and operation of an inland port in southern California: increase transportation efficiency by switching from truck to train, create a smoother flow on the highways, create a cleaner environment, Increase the capacity of the ports, reduce demands on port land, and...

    Provided By California State University

  • White Papers // Sep 2010

    Media Training Guide

    The media generally works under extremely tight deadlines, usually turning around stories in a matter of hours or even minutes. It is not uncommon for reporters to contact you and arrange an interview the same day a story is due. Do not panic if such a media request occurs. Always...

    Provided By California State University

  • White Papers // Dec 2009

    Comparative Study Of Ipv4 vs. Ipv6 Network Performance In Windows 7

    IPv4 is the foundation of the internet and has served the world remarkably well, especially considering it is well over 20 years old. Unfortunately IPv4 has reached the end of its useful life. The number of electronic devices connected to the internet is increasing without an end in sight and...

    Provided By California State University

  • White Papers // Feb 2010

    Comparative And Strategic Role Of ERP In "Six Sigma" Quality

    In quest for customers' loyalty and higher profit, industries try to bring customers' requirements to the forefront of their planning and strategies initiatives, and to make effective and informed decisions. The "Six Sigma" methodology, which is a new way to manage the businesses differently, has been the subject of many...

    Provided By California State University

  • White Papers // Dec 2009

    Developing A Multi-Agent Automated Negotiation Service Based On Service-Oriented Architecture

    Automated negotiation has become the core of the intelligent e-commerce. Traditional research in automated negotiation is focused on theory about negotiation protocol and strategy. However, the application of automated negotiation system has lagged far behind. This paper discusses reasons for such a situation and points out that making the automated...

    Provided By California State University

  • White Papers // May 2010

    Is The Full-Range Model Of Leadership Really A Full-Range Model

    A field study was conducted to compare the three meta-categories assessed in the Managerial Practices Survey (MPS) to the "Full-range" taxonomy assessed in the Multifactor Leadership Questionnaire (MLQ). Dyadic and group-level analyses found that subordinate job attitudes and boss rated managerial effectiveness were predicted better by the MPS meta-categories than...

    Provided By California State University

  • White Papers // Aug 2009

    Visualizing Stock-Mutual Fund Relationships Through Social Network Analysis

    In this paper the authors analyze the network structure of stocks (as actors in a 2-mode/affiliation social network) and their relationship to mutual funds. The analysis reveals a network structure that has both the "Hub" and "Small world" characteristics of many common social and physical networks thus suggesting that stock...

    Provided By California State University

  • White Papers // Jun 2009

    Using Data Fusion for Biometric Verification

    A wide spectrum of systems require reliable personal recognition schemes to either confirm or determine the identity of an individual person. This paper considers multimodal biometric system and their applicability to access control, authentication and security applications. Strategies for feature extraction and sensor fusion are considered and contrasted. Issues related...

    Provided By California State University

  • White Papers // Oct 2010

    Regression Discontinuity Marginal Threshold Treatment Effects

    In regression discontinuity models, where the probability of treatment jumps discretely when a running variable crosses a threshold, an average treatment effect can be nonparametrically identified. The authors show that the derivative of this treatment effect with respect to the threshold is also nonparametrically identified and easily estimated, in both...

    Provided By California State University

  • White Papers // Jan 2009

    Active Institutional Investors And Corporate Investment Performance

    This paper examines the impacts of different types of institutional investors on the performance of corporate investments. The authors find that institutional ownership overall has a significant and positive impact on the quality of corporate investment and hence improves firms' stock market and operating performances. Different types of institutional investors...

    Provided By California State University

  • White Papers // May 2009

    Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs)

    Mobile Ad hoc NETworks (MANETs) have several advantages compared to traditional wireless networks. These include ease of deployment, speed of deployment and decreased dependency on a fixed infrastructure. There have been many studies done in this area to improve the quality and efficiency of the routing protocols in MANETs. However,...

    Provided By California State University

  • White Papers // Mar 2011

    The Software Performance of Authenticated-Encryption Mod

    The authors study the software performance of authenticated-encryption modes CCM, GCM, and OCB. Across a variety of platforms, they find OCB to be substantially faster than either alternative. For example, on an Intel i5 ("Clarkdale") processor, good implementations of CCM, GCM, and OCB encrypt at around 4.2 cpb, 3.7 cpb,...

    Provided By California State University

  • White Papers // Jun 2010

    Analysis of Microprocessor Based Protective Relay's (MBPR) Differential Equation Algorithms

    This paper analyses and explains from the systems point of view, Microprocessor Based Protective Relay (MBPR) systems with emphasis on differential equation algorithms. Presently, the application of protective relaying in power systems, using MBPR systems, based on the differential equation algorithm is valued more than the protection relaying based on...

    Provided By California State University

  • White Papers // Jan 2007

    Grid-Based Secure Web Service Framework for Bioinformatics

    Although the web-based bioinformatics is very popular after dozens of years' growth, biologists found out that it is inconvenient because they need to access many web sites manually in order to perform a single task. Web-service based bioinformatics was proposed to provide well-defined interfaces accessible to programs. However, security for...

    Provided By California State University

  • White Papers // Feb 2013

    Understanding the Behavior of Internet Worm Through PArallel Worm Simulator (PAWS)

    Internet and the computer networks have become crucial to efficient operation of institutions and the society. But, this makes it possible for a lone hacker to significantly impact these institutions and society through worm attacks. Such worm attacks are becoming common news leading to a feeling of insecurity. The intention...

    Provided By California State University

  • White Papers // Feb 2006

    Exploring the Relationship Between Structural Market Conditions and Business Conduct in Mobile Data Service Markets

    A business model represents the decision space for strategic options of a firm. These options are determined by the market situation in which the firm operates. Among these options the firm makes its strategic decisions which are evaluated by the firm's performance in the market measured by business values. Thus,...

    Provided By California State University

  • White Papers // Mar 2009

    Semantic Business Process for Improved Exception Handling

    The execution of a business process often includes multiple entities. These entities are not under the control of the process, and because of the intricacies of the real-world, their behavior cannot always be predicted. This is why, although a business process may have a single ideal execution path, in practice,...

    Provided By California State University

  • White Papers // Dec 2011

    The Effect of Website Design Dimensions on Initial Trust: A Synthesis of the Empirical Literature

    This paper aims to provide an integrative review of the experiment-based literature on the antecedents of initial trust in a Business-To-Consumer (B2C) e-commerce setting. To that end, the authors present a framework that classifies trust-inducing website features according to three broad dimensions, namely visual design, social cue design and content...

    Provided By California State University

  • White Papers // Aug 2008

    Avatar Business Value Analysis: A Method for the Evaluation of Business Value Creation in Virtual Commerce

    The recent years have seen the emergence of a number of virtual worlds with various designs and purposes. Some have become very popular and have developed growing in-world economies. Real-world businesses are increasingly experimenting with doing virtual business there as well. In this paper, the authors present Avatar Business Value...

    Provided By California State University