Learn More
Assessing the value of information technology (IT) security is challenging because of the difficulty of measuring the cost of security breaches. An event-study analysis, using market valuations, was used to assess the impact of security breaches on the market value of breached firms. The information-transfer effect of security breaches (i.e., their effect(More)
The structure of the homotetrameric DNA binding domain of the single stranded DNA binding protein from Escherichia coli (Eco SSB) bound to two 35-mer single stranded DNAs was determined to a resolution of 2.8 A. This structure describes the vast network of interactions that results in the extensive wrapping of single stranded DNA around the SSB tetramer and(More)
A ssessing the return on investment has always been a sticking point for technology investments. Similar to IT productivity paradox [1], Return on Security Investment (ROSI) has become a controversial topic due to immense growth of e-businesses. Defining the value of security investments is challenging. However, it is clear that " security consumers will(More)
The crystal structure of the tetrameric DNA-binding domain of the single-stranded DNA binding protein from Escherichia coli was determined at a resolution of 2.9 A using multiwavelength anomalous dispersion. Each monomer in the tetramer is topologically similar to an oligomer-binding fold. Two monomers each contribute three beta-strands to a single(More)
F irms are increasingly relying on software to detect fraud in domains such as security, financial services, tax, and auditing. A fundamental problem in using detection software for fraud detection is achieving the optimal balance between the detection and false-positive rates. Many firms use decision theory to address the configuration problem. Decision(More)
The open source model of software development has received substantial attention in the industry and popular media; nevertheless, critics frequently contend that open source software are inferior in quality compared to closed source software because of lack of incentives and project management, while proponents argue the opposite. This paper examines this(More)