James V. Hansen

Learn More
We have examined standards required for successful e-commerce (EC) architectures and evaluated the strengths and limitations of current systems that have been developed to support EC. We find that there is an unfilled need for systems that can reliably locate buyers and sellers in electronic marketplaces and also facilitate automated transactions. The(More)
Ever since the initial planning for the 1997 Utah legislative session, neural-network forecasting techniques have provided valuable insights for analysts forecasting tax revenues. These revenue estimates are critically important since agency budgets, support for education, and improvements to infrastructure all depend on their accuracy. Underforecasting(More)
Electronic data interchange (EDI) is the movement of information electronically between a buyer and seller for purposes of facilitating a business transaction. EDI represents a powerful application of computer-communications technology. Its value includes such benefits as reduced paperwork, elimination of data entry overheads, improved accuracy, timely(More)
Use of the Internet for electronic business has the potential to revolutionize the way many businesses are conducted. Yet, several businesses have fallen victim to problems in information systems that facilitate e-Business. These problems are characterized by uncertainties due to system complexity, rapid development, interconnectivity, and a lack of(More)
While successful applications have been reported using standard GP crossover, limitations of this approach have been identified by several investigators. Among the most compelling alternatives to standard GP crossover are those that use some form of homologous crossover, where code segments that are exchanged are structurally or syntactically aligned in(More)
Because malicious intrusions into critical information infrastructures are essential to the success of cyberterrorists, effective intrusion detection is also essential for defending such infrastructures. Cyberterrorism thrives on the development of new technologies; and, in response, intrusion detection methods must be robust and adaptive, as well as(More)
The complexities of computer auditing have created a need for decision support for the EDP auditor. Traditional statistical techniques have proven valuable; however, there are important qualitative components which must be incorporated in the analysis. More importantly, there is a need for decision aids which not only produce analysis and probability(More)