Learn More
Assessing the value of information technology (IT) security is challenging because of the difficulty of measuring the cost of security breaches. An event-study analysis, using market valuations, was used to assess the impact of security breaches on the market value of breached firms. The information-transfer effect of security breaches (i.e., their effect(More)
A ssessing the return on investment has always been a sticking point for technology investments. Similar to IT productivity paradox [1], Return on Security Investment (ROSI) has become a controversial topic due to immense growth of e-businesses. Defining the value of security investments is challenging. However, it is clear that " security consumers will(More)
The open source model of software development has received substantial attention in the industry and popular media; nevertheless, critics frequently contend that open source software are inferior in quality compared to closed source software because of lack of incentives and project management, while proponents argue the opposite. This paper examines this(More)
F irms are increasingly relying on software to detect fraud in domains such as security, financial services, tax, and auditing. A fundamental problem in using detection software for fraud detection is achieving the optimal balance between the detection and false-positive rates. Many firms use decision theory to address the configuration problem. Decision(More)
The crystal structure of the tetrameric DNA-binding domain of the single-stranded DNA binding protein from Escherichia coli was determined at a resolution of 2.9 Å using multiwavelength anomalous dispersion. Each monomer in the tetramer is topologically similar to an oligomer-binding fold. Two monomers each contribute three ␤-strands to a single(More)