Pace University

Displaying 1-12 of 12 results

  • White Papers // Mar 2011

    A Longitudinal Study of Social Media Privacy Behavior

    Existing constructs for privacy concerns and behaviors do not adequately model deviations between user attitudes and behaviors. Although a number of studies have examined supposed deviations from rationality by online users, true explanations for these behaviors may lie in factors not previously addressed in privacy concern constructs. In particular, privacy...

    Provided By Pace University

  • White Papers // Oct 2010

    Virtual Open-Source Labs for Web Security Education

    Web security education depends heavily on hands-on labs that guide the students in developing web applications, evaluating the effectiveness of available security mechanisms, and detecting the security flaws of existing web applications. Since a typical web application runs on multiple servers including web servers, application servers and database servers, it...

    Provided By Pace University

  • White Papers // Sep 2010

    Sequencing The Genome Of The Customer Mind By RDE And Intervention Testing

    This paper presents a new approach to 1:1 marketing allowing for the creation of individual communications with heterogeneous customers. It utilizes Rule Developing Experimentation (RDE, a modified conjoint analysis-based approach) to create a database of messages specific to the product and to segment consumers based on the patterns of individual...

    Provided By Pace University

  • White Papers // Sep 2010

    Entrepreneurship In Multinational Subsidiaries: The Effects Of Corporate And Local Environmental Contexts

    Mounting evidence suggests that the entrepreneurial activities of subsidiaries play a key role in determining the success of their parent multinational corporations (MNCs). However, little research has examined the factors that determine subsidiary entrepreneurship. This paper presents a model of entrepreneurship, focusing on the corporate and local environmental contexts of...

    Provided By Pace University

  • White Papers // Jun 2010

    Global Talent Management Initiatives For Global Talent Challenges

    Beginning in the late 1990s, firms around the world were confronted with a major threat to doing business: a demand for talented employees that far surpassed the supply, thus creating a global talent shortage (Chambers, Foulon, Handfield-Jones, Hankin and Michaels, 1998; Michaels, Handfield-Jones and Axelrod, 2001). As a consequence, firms...

    Provided By Pace University

  • White Papers // Jun 2010

    Framework for Global Talent Management: HR Actions for Dealing With Global Talent Challenges

    In today's rapidly moving, extremely uncertain, and highly competitive global environment, firms worldwide are encountering numerous global talent challenges. Global talent challenges arise as firms compete on a worldwide stage under dynamic conditions to ensure that they have the necessary amount of talent, at the appropriate places, at the right...

    Provided By Pace University

  • White Papers // May 2010

    The Scalability of Keystroke Biometrics in Access Control and Identity Management Systems

    Recent legislation requires that institutions of higher learning to take steps to ensure that the student of record enrolled in the course is the one taking the tests on line, accessing the information systems, and receiving academic credit for the course. This paper suggests that keystroke biometric systems can play...

    Provided By Pace University

  • White Papers // Mar 2010

    Executive Dashboard: A Driver for Institutional Change and a Means to Broaden Understanding

    The financial meltdown created an uncertain and competitive environment, making it important for the institution to provide the executives insight into critical key metrics. The decision to create executive dashboards at Pace University set in motion events that caused the collapse of the information silos. This presentation provides insight into...

    Provided By Pace University

  • White Papers // Dec 2009

    Accommodating Cloud Computing in the Curricula of Schools of Computer Science and Information Systems

    Cloud computing, technology services accessible through a browser and residing in the Internet "Cloud" (or in Intranets or Extranets for private clouds), is an unavoidable extension of Service-Oriented Architecture. Cloud computing is potentially the most disruptive technology trend since the arrival of the Internet. The primary cloud services to date...

    Provided By Pace University

  • White Papers // Nov 2009

    Identity Management and Access Control

    This paper provides an introduction and a broad overview to identity management and access control. In a computerized accounting environment, identity management and access control are the means by which segregation of duties is implemented and enforced. Identity management is meant to support the identification of authorized users. It is...

    Provided By Pace University

  • White Papers // Aug 2009

    Asynchronous Collaborative Visualization on a Stick

    This paper reports some initial results from the construction of an extensible visualization-oriented personal information manager that functions as well as an asynchronous collaborative visualization system. To the author's knowledge, this is not only the first software of its kind, but it is an easily assembled and may be extended...

    Provided By Pace University

  • White Papers // May 2009

    Forensics Tools for Social Network Security Solutions

    The usage of Social Network Sites has increased rapidly in recent years. Since the success of a Social Network Site depends on the number of users it attracts, there is pressure on providers of Social Network sites to design systems that encourage behavior which increases both the number of users...

    Provided By Pace University

  • White Papers // May 2009

    Forensics Tools for Social Network Security Solutions

    The usage of Social Network Sites has increased rapidly in recent years. Since the success of a Social Network Site depends on the number of users it attracts, there is pressure on providers of Social Network sites to design systems that encourage behavior which increases both the number of users...

    Provided By Pace University

  • White Papers // Jun 2010

    Framework for Global Talent Management: HR Actions for Dealing With Global Talent Challenges

    In today's rapidly moving, extremely uncertain, and highly competitive global environment, firms worldwide are encountering numerous global talent challenges. Global talent challenges arise as firms compete on a worldwide stage under dynamic conditions to ensure that they have the necessary amount of talent, at the appropriate places, at the right...

    Provided By Pace University

  • White Papers // Sep 2010

    Sequencing The Genome Of The Customer Mind By RDE And Intervention Testing

    This paper presents a new approach to 1:1 marketing allowing for the creation of individual communications with heterogeneous customers. It utilizes Rule Developing Experimentation (RDE, a modified conjoint analysis-based approach) to create a database of messages specific to the product and to segment consumers based on the patterns of individual...

    Provided By Pace University

  • White Papers // Mar 2010

    Executive Dashboard: A Driver for Institutional Change and a Means to Broaden Understanding

    The financial meltdown created an uncertain and competitive environment, making it important for the institution to provide the executives insight into critical key metrics. The decision to create executive dashboards at Pace University set in motion events that caused the collapse of the information silos. This presentation provides insight into...

    Provided By Pace University

  • White Papers // Nov 2009

    Identity Management and Access Control

    This paper provides an introduction and a broad overview to identity management and access control. In a computerized accounting environment, identity management and access control are the means by which segregation of duties is implemented and enforced. Identity management is meant to support the identification of authorized users. It is...

    Provided By Pace University

  • White Papers // May 2010

    The Scalability of Keystroke Biometrics in Access Control and Identity Management Systems

    Recent legislation requires that institutions of higher learning to take steps to ensure that the student of record enrolled in the course is the one taking the tests on line, accessing the information systems, and receiving academic credit for the course. This paper suggests that keystroke biometric systems can play...

    Provided By Pace University

  • White Papers // Sep 2010

    Entrepreneurship In Multinational Subsidiaries: The Effects Of Corporate And Local Environmental Contexts

    Mounting evidence suggests that the entrepreneurial activities of subsidiaries play a key role in determining the success of their parent multinational corporations (MNCs). However, little research has examined the factors that determine subsidiary entrepreneurship. This paper presents a model of entrepreneurship, focusing on the corporate and local environmental contexts of...

    Provided By Pace University

  • White Papers // Jun 2010

    Global Talent Management Initiatives For Global Talent Challenges

    Beginning in the late 1990s, firms around the world were confronted with a major threat to doing business: a demand for talented employees that far surpassed the supply, thus creating a global talent shortage (Chambers, Foulon, Handfield-Jones, Hankin and Michaels, 1998; Michaels, Handfield-Jones and Axelrod, 2001). As a consequence, firms...

    Provided By Pace University

  • White Papers // Dec 2009

    Accommodating Cloud Computing in the Curricula of Schools of Computer Science and Information Systems

    Cloud computing, technology services accessible through a browser and residing in the Internet "Cloud" (or in Intranets or Extranets for private clouds), is an unavoidable extension of Service-Oriented Architecture. Cloud computing is potentially the most disruptive technology trend since the arrival of the Internet. The primary cloud services to date...

    Provided By Pace University

  • White Papers // Oct 2010

    Virtual Open-Source Labs for Web Security Education

    Web security education depends heavily on hands-on labs that guide the students in developing web applications, evaluating the effectiveness of available security mechanisms, and detecting the security flaws of existing web applications. Since a typical web application runs on multiple servers including web servers, application servers and database servers, it...

    Provided By Pace University

  • White Papers // Aug 2009

    Asynchronous Collaborative Visualization on a Stick

    This paper reports some initial results from the construction of an extensible visualization-oriented personal information manager that functions as well as an asynchronous collaborative visualization system. To the author's knowledge, this is not only the first software of its kind, but it is an easily assembled and may be extended...

    Provided By Pace University

  • White Papers // Mar 2011

    A Longitudinal Study of Social Media Privacy Behavior

    Existing constructs for privacy concerns and behaviors do not adequately model deviations between user attitudes and behaviors. Although a number of studies have examined supposed deviations from rationality by online users, true explanations for these behaviors may lie in factors not previously addressed in privacy concern constructs. In particular, privacy...

    Provided By Pace University