Pace University

Displaying 1-18 of 18 results

  • White Papers // Mar 2011

    A Longitudinal Study of Social Media Privacy Behavior

    Existing constructs for privacy concerns and behaviors do not adequately model deviations between user attitudes and behaviors. Although a number of studies have examined supposed deviations from rationality by online users, true explanations for these behaviors may lie in factors not previously addressed in privacy concern constructs. In particular, privacy...

    Provided By Pace University

  • White Papers // Oct 2010

    Virtual Open-Source Labs for Web Security Education

    Web security education depends heavily on hands-on labs that guide the students in developing web applications, evaluating the effectiveness of available security mechanisms, and detecting the security flaws of existing web applications. Since a typical web application runs on multiple servers including web servers, application servers and database servers, it...

    Provided By Pace University

  • White Papers // Sep 2010

    Sequencing The Genome Of The Customer Mind By RDE And Intervention Testing

    This paper presents a new approach to 1:1 marketing allowing for the creation of individual communications with heterogeneous customers. It utilizes Rule Developing Experimentation (RDE, a modified conjoint analysis-based approach) to create a database of messages specific to the product and to segment consumers based on the patterns of individual...

    Provided By Pace University

  • White Papers // Sep 2010

    Entrepreneurship In Multinational Subsidiaries: The Effects Of Corporate And Local Environmental Contexts

    Mounting evidence suggests that the entrepreneurial activities of subsidiaries play a key role in determining the success of their parent multinational corporations (MNCs). However, little research has examined the factors that determine subsidiary entrepreneurship. This paper presents a model of entrepreneurship, focusing on the corporate and local environmental contexts of...

    Provided By Pace University

  • White Papers // Jun 2010

    Global Talent Management Initiatives For Global Talent Challenges

    Beginning in the late 1990s, firms around the world were confronted with a major threat to doing business: a demand for talented employees that far surpassed the supply, thus creating a global talent shortage (Chambers, Foulon, Handfield-Jones, Hankin and Michaels, 1998; Michaels, Handfield-Jones and Axelrod, 2001). As a consequence, firms...

    Provided By Pace University

  • White Papers // Jun 2010

    Framework for Global Talent Management: HR Actions for Dealing With Global Talent Challenges

    In today's rapidly moving, extremely uncertain, and highly competitive global environment, firms worldwide are encountering numerous global talent challenges. Global talent challenges arise as firms compete on a worldwide stage under dynamic conditions to ensure that they have the necessary amount of talent, at the appropriate places, at the right...

    Provided By Pace University

  • White Papers // May 2010

    The Scalability of Keystroke Biometrics in Access Control and Identity Management Systems

    Recent legislation requires that institutions of higher learning to take steps to ensure that the student of record enrolled in the course is the one taking the tests on line, accessing the information systems, and receiving academic credit for the course. This paper suggests that keystroke biometric systems can play...

    Provided By Pace University

  • White Papers // Mar 2010

    Executive Dashboard: A Driver for Institutional Change and a Means to Broaden Understanding

    The financial meltdown created an uncertain and competitive environment, making it important for the institution to provide the executives insight into critical key metrics. The decision to create executive dashboards at Pace University set in motion events that caused the collapse of the information silos. This presentation provides insight into...

    Provided By Pace University

  • White Papers // Dec 2009

    Accommodating Cloud Computing in the Curricula of Schools of Computer Science and Information Systems

    Cloud computing, technology services accessible through a browser and residing in the Internet "Cloud" (or in Intranets or Extranets for private clouds), is an unavoidable extension of Service-Oriented Architecture. Cloud computing is potentially the most disruptive technology trend since the arrival of the Internet. The primary cloud services to date...

    Provided By Pace University

  • White Papers // Nov 2009

    Identity Management and Access Control

    This paper provides an introduction and a broad overview to identity management and access control. In a computerized accounting environment, identity management and access control are the means by which segregation of duties is implemented and enforced. Identity management is meant to support the identification of authorized users. It is...

    Provided By Pace University

  • White Papers // Aug 2009

    Asynchronous Collaborative Visualization on a Stick

    This paper reports some initial results from the construction of an extensible visualization-oriented personal information manager that functions as well as an asynchronous collaborative visualization system. To the author's knowledge, this is not only the first software of its kind, but it is an easily assembled and may be extended...

    Provided By Pace University

  • White Papers // May 2009

    Face Biometrics: A Longitudinal Study

    Faces change over time and this has been problematic for face biometric systems. Little research has been conducted in this area and this study reviews two face biometric systems, Neurotechnology's Verilook and Luxand's FaceSDK, and conducts experiments with the affects of aging in mind. Research was conducted on how anthropometrics...

    Provided By Pace University

  • White Papers // May 2009

    Virtual Forensics: Social Network Security Solutions

    The usage of Social Network Sites has increased rapidly in recent years. The area of Social Networking currently has many security issues. Since the success of a Social Network Site depends on the number of users it attracts, there is pressure on providers of Social Network sites to design systems...

    Provided By Pace University

  • White Papers // May 2009

    Keystroke Biometric Authentication System Experimentation

    Pace University's Keystroke Biometric System has the ability to identify with a high degree of accuracy the typing characteristics that are unique to each individual. The system consists of three interrelated components: a java applet which collects raw keystroke data over the internet, a feature extractor, and a pattern classifier....

    Provided By Pace University

  • White Papers // May 2009

    Forensics Tools for Social Network Security Solutions

    The usage of Social Network Sites has increased rapidly in recent years. Since the success of a Social Network Site depends on the number of users it attracts, there is pressure on providers of Social Network sites to design systems that encourage behavior which increases both the number of users...

    Provided By Pace University

  • White Papers // Feb 2009

    Semi-Automated Traceability Maintenance: An Architectural Overview of TraceMaintainer

    TraceMaintainer is a tool that supports an approach for maintaining post-requirements traceability relations after changes have been made to traced model elements. The update of traceability relations is based upon predefined rules, where each rule is intended to recognize a development activity applied to a model element. Little manual effort...

    Provided By Pace University

  • White Papers // Feb 2009

    Does The Source Of Policy Conflict In Diversified Firms Differ As A Function Of Industry Sector?

    The purpose of this study was to assess the views of executives toward policy conflict in diversified firms across different industries. Executives completed a survey in which they were asked to select one of seventeen policy areas as the source of most and second most conflict between their corporate headquarters...

    Provided By Pace University

  • White Papers // Jan 2009

    Egoism, Justice, Rights, And Utilitarianism: Student Views Of Classic Ethical Positions In Business

    Two five-item ethical position scales were created. One assessed ethical views toward the expected consequences of an action (or teleology). The other assessed views toward the need to follow a specific rule (or deontology), with an emphasis on secular rationalism. The ethical consequences scale included the positions of egoism and...

    Provided By Pace University

  • White Papers // Feb 2009

    Semi-Automated Traceability Maintenance: An Architectural Overview of TraceMaintainer

    TraceMaintainer is a tool that supports an approach for maintaining post-requirements traceability relations after changes have been made to traced model elements. The update of traceability relations is based upon predefined rules, where each rule is intended to recognize a development activity applied to a model element. Little manual effort...

    Provided By Pace University

  • White Papers // Jan 2009

    Egoism, Justice, Rights, And Utilitarianism: Student Views Of Classic Ethical Positions In Business

    Two five-item ethical position scales were created. One assessed ethical views toward the expected consequences of an action (or teleology). The other assessed views toward the need to follow a specific rule (or deontology), with an emphasis on secular rationalism. The ethical consequences scale included the positions of egoism and...

    Provided By Pace University

  • White Papers // May 2009

    Face Biometrics: A Longitudinal Study

    Faces change over time and this has been problematic for face biometric systems. Little research has been conducted in this area and this study reviews two face biometric systems, Neurotechnology's Verilook and Luxand's FaceSDK, and conducts experiments with the affects of aging in mind. Research was conducted on how anthropometrics...

    Provided By Pace University

  • White Papers // May 2010

    The Scalability of Keystroke Biometrics in Access Control and Identity Management Systems

    Recent legislation requires that institutions of higher learning to take steps to ensure that the student of record enrolled in the course is the one taking the tests on line, accessing the information systems, and receiving academic credit for the course. This paper suggests that keystroke biometric systems can play...

    Provided By Pace University

  • White Papers // Dec 2009

    Accommodating Cloud Computing in the Curricula of Schools of Computer Science and Information Systems

    Cloud computing, technology services accessible through a browser and residing in the Internet "Cloud" (or in Intranets or Extranets for private clouds), is an unavoidable extension of Service-Oriented Architecture. Cloud computing is potentially the most disruptive technology trend since the arrival of the Internet. The primary cloud services to date...

    Provided By Pace University

  • White Papers // Jun 2010

    Global Talent Management Initiatives For Global Talent Challenges

    Beginning in the late 1990s, firms around the world were confronted with a major threat to doing business: a demand for talented employees that far surpassed the supply, thus creating a global talent shortage (Chambers, Foulon, Handfield-Jones, Hankin and Michaels, 1998; Michaels, Handfield-Jones and Axelrod, 2001). As a consequence, firms...

    Provided By Pace University

  • White Papers // Feb 2009

    Does The Source Of Policy Conflict In Diversified Firms Differ As A Function Of Industry Sector?

    The purpose of this study was to assess the views of executives toward policy conflict in diversified firms across different industries. Executives completed a survey in which they were asked to select one of seventeen policy areas as the source of most and second most conflict between their corporate headquarters...

    Provided By Pace University

  • White Papers // Sep 2010

    Entrepreneurship In Multinational Subsidiaries: The Effects Of Corporate And Local Environmental Contexts

    Mounting evidence suggests that the entrepreneurial activities of subsidiaries play a key role in determining the success of their parent multinational corporations (MNCs). However, little research has examined the factors that determine subsidiary entrepreneurship. This paper presents a model of entrepreneurship, focusing on the corporate and local environmental contexts of...

    Provided By Pace University

  • White Papers // Oct 2010

    Virtual Open-Source Labs for Web Security Education

    Web security education depends heavily on hands-on labs that guide the students in developing web applications, evaluating the effectiveness of available security mechanisms, and detecting the security flaws of existing web applications. Since a typical web application runs on multiple servers including web servers, application servers and database servers, it...

    Provided By Pace University

  • White Papers // Mar 2011

    A Longitudinal Study of Social Media Privacy Behavior

    Existing constructs for privacy concerns and behaviors do not adequately model deviations between user attitudes and behaviors. Although a number of studies have examined supposed deviations from rationality by online users, true explanations for these behaviors may lie in factors not previously addressed in privacy concern constructs. In particular, privacy...

    Provided By Pace University

  • White Papers // Aug 2009

    Asynchronous Collaborative Visualization on a Stick

    This paper reports some initial results from the construction of an extensible visualization-oriented personal information manager that functions as well as an asynchronous collaborative visualization system. To the author's knowledge, this is not only the first software of its kind, but it is an easily assembled and may be extended...

    Provided By Pace University

  • White Papers // May 2009

    Keystroke Biometric Authentication System Experimentation

    Pace University's Keystroke Biometric System has the ability to identify with a high degree of accuracy the typing characteristics that are unique to each individual. The system consists of three interrelated components: a java applet which collects raw keystroke data over the internet, a feature extractor, and a pattern classifier....

    Provided By Pace University

  • White Papers // May 2009

    Virtual Forensics: Social Network Security Solutions

    The usage of Social Network Sites has increased rapidly in recent years. The area of Social Networking currently has many security issues. Since the success of a Social Network Site depends on the number of users it attracts, there is pressure on providers of Social Network sites to design systems...

    Provided By Pace University

  • White Papers // May 2009

    Forensics Tools for Social Network Security Solutions

    The usage of Social Network Sites has increased rapidly in recent years. Since the success of a Social Network Site depends on the number of users it attracts, there is pressure on providers of Social Network sites to design systems that encourage behavior which increases both the number of users...

    Provided By Pace University

  • White Papers // Mar 2010

    Executive Dashboard: A Driver for Institutional Change and a Means to Broaden Understanding

    The financial meltdown created an uncertain and competitive environment, making it important for the institution to provide the executives insight into critical key metrics. The decision to create executive dashboards at Pace University set in motion events that caused the collapse of the information silos. This presentation provides insight into...

    Provided By Pace University

  • White Papers // Nov 2009

    Identity Management and Access Control

    This paper provides an introduction and a broad overview to identity management and access control. In a computerized accounting environment, identity management and access control are the means by which segregation of duties is implemented and enforced. Identity management is meant to support the identification of authorized users. It is...

    Provided By Pace University

  • White Papers // Jun 2010

    Framework for Global Talent Management: HR Actions for Dealing With Global Talent Challenges

    In today's rapidly moving, extremely uncertain, and highly competitive global environment, firms worldwide are encountering numerous global talent challenges. Global talent challenges arise as firms compete on a worldwide stage under dynamic conditions to ensure that they have the necessary amount of talent, at the appropriate places, at the right...

    Provided By Pace University

  • White Papers // Sep 2010

    Sequencing The Genome Of The Customer Mind By RDE And Intervention Testing

    This paper presents a new approach to 1:1 marketing allowing for the creation of individual communications with heterogeneous customers. It utilizes Rule Developing Experimentation (RDE, a modified conjoint analysis-based approach) to create a database of messages specific to the product and to segment consumers based on the patterns of individual...

    Provided By Pace University