Research

Faculty and staff in the Information Systems Department are active researchers within their fields. Below is a list of some of their most recent publications.

2010

Phan, D. D., Schmidt, M., & Chen, Q. J. (2010). Organizational Ecology Success Factors in the Business: A Case Study at Fingerhut Inc. Information Systems Management, 27(1), 82-91.

R.A. Sultanov, S.K. Adhikari, and D. Guster, Physical Review A 81, 022705 (2010).

2009

Herath, S., Chen, Q. J., Guster, D. C., & Schmidt, M. (2009). An Interdisciplinary Curriculum Model for a Graduate Program in Information Assurance (pp. 117-124). Freiburg, Germany: Proceedings of Informatics Education Europe IV.

Guster, D. C., Schmidt, M., Hall, C., & Sultanov, R. (2009). Analyzing bandwidth usage in a distributed processing environment. In Selected Topics in Communication Networks and Distributed Systems, edited by Dr. Sudip Misra, Dr. Subhas C. Misra and Dr. Issac Woungang. Singapore: World Scientific.

Lee, O. F., Guster, D. C., Schmidt, M., & McCann, B. (2009). A First Approach in the Assessment of the Complexity of Disaster Recovery Models for SMEs. San Francisco, CA: Proceedings of the 2009 Americas Conference on Information Systems (AMCIS).

Guster, D. C., Hemminger, C., Meunier, J., & Schroeder, C. (2009). Using KERBEROS to Harden the Active Directory System (LDAP) in a Domain Used to Support Grid/Clustering Activity: Proceedings of the Midwest Instructional Computing Symposium, April 16-17, Rapid City, SD.

Silva, R. S., Tadano, K., & Herath, S. (2009). Unsupervised Approach to Acquire Robot Joint Attention (pp. 601-606): 4th International Conference on Autonomous Robots and Agents.

Phan, D. D. (2009). Managing Agile E-Business Development: How Intel and Microsoft did it? (pp. 390-403). New York: Proceeding of the XIX ACME International Conference of Pacific Rim Management.

Arnett, K. P., Schmidt, M., Johnston, A. C., Kim, J., & Hwang, H. (2009). Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions. In Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical and Human Issues. Hershey, PA: IGI Global.

Phan, D. D., & Schmidt, M. (2009). Business Intelligence for Decision Making in Online and Catalog Retailing Firms (research abstract). New Orleans, LA: Proceedings of the National Decision Sciences Institute (DSI) Conference.

Schmidt, M., Guster, D. C., Lee, O. F., & McCann, B. (2009). Disaster Recovery Planning, Analyzing the Dilemma: In-house vs. Outsourced with Special Consideration to the WAN Resources Required. New Orleans, LA: Proceedings of the National Decision Sciences Institute (DSI) Conference.

Guster, D. C., Schmidt, M., & Hemminger, C. (2009). Host Virtualization as the Key to Enhanced Sustainability and Reliability for Companies that have Data Center Infrastructure with an International Footprint. Rapid City, SD: Proceedings of the Annual International Business Conference.

Schmidt, M., Weber, J. E., Van Erp, N., & Mumm, M. M. (2009). Assessing Student Interest in Hybrid Course Delivery at the MBA Level. San Francisco, CA: Proceedings of the 2009 Americas Conference on Information Systems (AMCIS).

Phan, D. D., & Schmidt, M. (2009). Business Intelligence Successes at a Catalog and Online Retailer (vol. 3, pp. 219-223): Fifth International Conference on Natural Computation, China.

Schmidt, M., & Mumm, M. M. (2009). A Hands-on Approach to Service Learning Projects in Systems Analysis and Design. Las Vegas, NV: Proceedings of the 2009 ISOneWorld Conference.

Schmidt, M., Dampier, D. A., & Guster, D. C. (2009). A Multi-University Resource Allocation Approach to Provide Computer Forensics Education for Law Enforcement Agents. Las Vegas, NV: Proceedings of the 2009 Security Conference.

Jacobson-Schulte, P., Schmidt, M., & Yoshimoto, G. (2009). The Use and Security of Data in the Higher Education Environment. Las Vegas, NV: Proceedings of the American Society of Business and Behavioral Sciences.

Schmidt, M., Weber, J. E., Guster, D. C., & Safonov, P. I. (2009). Training Users to Develop Stronger Passwords. Orlando, FL: Proceedings of the International Academy of Business and Public Administration Disciplines (IABPAD) Conference.

Schmidt, M., Das, D., Kumar, V., & Bekkering, E. (2008). A Proposed Study and Analysis of User Perceptions of Biometric Acceptance. Baltimore, MD: Proceedings of the National Decision Sciences Institute (DSI) Conference.

R.A. Sultanov, and D. Guster, Proceedings of the 31st Annual International Conference of the IEEE EMBS (Engineering in Medicine and Biology Society), Minneapolis, September 2-6, 2009, p.p. 4704-4710

.R.A. Sultanov, A.V. Khugaev, and D. Guster, Chemical Physics Letters 475, 175-182 (2009) (Elsevier, Amsterdam, Holland).

Kurtz, J. M., & Chen, Q. J. (2009). Safeguarding Intellectual Property in China. Asian Case Research Journal, 13(1).

Schmidt, M., Chen, Q. J., Phan, D. D., & Arnett, K. P. (2009). Security Perceptions of E-Commerce Users. Journal of Internet Commerce, 8(1-2), 44-57.

Ernst, M. (2009). Teaching Inference for Randomized Experiments. Journal of Statistics Education, 17(1).

Guster, D. C., Schmidt, M., & Bergiel, E. (2009). Distributed Clusters and the Effects of Switch Configuration and Line Speed. Business Research Yearbook, 16(1), 139-144.

Hemminger, C., Safonov, P. I., Guster, D. C., Meunier, J., & Schroeder, C. (2009). The Advantages of Virtualizing a University Computing Instructional Domain. Issues in Information Systems, 10(2), 218-225.

Guster, D. C., Hemminger, C., & Krzenski, S. (2009). Using Virtualization to Reduce Data Center Infrastructure and Promote Green Computing. International Journal of Business Research, 9(6), 133-139.

Lee, O. F., Guster, D. C., & Schmidt, M. (2009). WAN Line Speed and Its Implications for the Support of Globally Remote Replicas in a Disaster Recovery Model. Business Research Yearbook, 16(1), 349-354.

Sultanov, R., Khugaev, A. V., & Guster, D. C. (2009). State-resolved rotational cross sections and thermal rate coefficients for ortho-/para-H2+HD at low temperatures and HD+HD elastic scattering. Chemical Physics Letters, 475, 175-182.

Guster, D. C., Schmidt, M., Hall, C., & Brown, C. (2009). Evaluating performance data and scalability issues in distributed data mining: A first level analysis. International Journal of Business, Marketing, and Decision Sciences, 2(1).

Gamage, T. T., Herath, S., Roy, A. G., & Bandara, V. (2009). Performance Comparison of Recent Random Number Generators. Journal of Global Information Technology, 3(1 and 2), 1-14.

Goonatilake, R., Herath, S. (2009). E-Collaboration Issues in Global Trade, Transactions and Practices. International Journal of Soft Computing Applications (IJSCA).

Paulson, R. A. (2009). Testing the Efficiency of a Betting Market. International JOurnal of Global Business and Economics, 2(2), 72-75.

Schmidt, M., Chen, Q. J., Phan, D. D., & Arnett, K. P. (2009). Security Perceptions of E-Commerce Users. Journal of Internet Commerce, 8(1-2), 44-57. Schmidt, M., Chen, Q. J., Phan, D. D., & Arnett, K. P. (2009). Security Perceptions of E-Commerce Users. Journal of Internet Commerce, 8(1-2), 44-57.

Guster, D. C., Schmidt, M., & Bergiel, E. B. (2009). Distributed Clusters and the Effects of Switch Configuration and Line Speed. Business Research Yearbook, 16(1), 139-144.

Lee, O. F., Guster, D. C., & Schmidt, M. (2009). WAN Line Speed and its Implications for the Support of Globally Remote Replicas in a Disaster Recovery Model. Business Research Yearbook, 16(1), 349-354.

Bekkering, E., Johnston, A. C., Warkentin, M., & Schmidt, M. (2009). An Empirical Assessment of Technology Adoption as a Choice Between Alternatives. Information Resources Management Journal, 22(4), 23-44.

Song, J. H., Rhee, Y., & Adams, C. R. (2009). Measuring the Marketing Impacts of Initial Public Offering. Business Renaissance Quarterly, 3(4), 87-99.

Lawal, B. H., & Sundheim, R. A. (2009). Marginal Homogeneity and Distance Subsymmetry Models in Square Contingency Tables With Ordered Categories. Journal of Statistical Research, 43(1), 53-68.

Weber, J. E., Yoshimoto, G., Smith, J. A., & Bohnen, H. W. (2009). Factors Associated with Students' Expressed Likelihood to Cheat. International Journal of Business Disciplines, 20(1).

2008

Dei, N., Hochmair, H., & Chen, Q. J. (2008). Controlling Access to Data and Resources in a Web-based Campus GIS. San Diego, CA: Proceedings of Eighth Annual ESRI Education User Conference.

Guster, D. C., Robinson, D., & Sundheim, R. A. (2008). Evaluating Computer Network Packet Distributions. In Encyclopedia of Information Science and Technology. Hersey, PA: Idea Group.

Sohn, C., & Tadisina, S. K. (2008). Development of e-service quality measure for internet-based financial institutions. Total Quality Management & Business Excellence, 19(9), 903-918.

Guster, D. C., & Herath, S. (2008). Analysis of Vulnerabilities in a Global Authentication System in a University Based Distributed Processing Laboratory. Omaha, Nebraska: Proceedings of the 3rd International Conference on Information Warfare and Security.

Merrill, W., Schmidt, M., & Bekkering, E. (2008). Steganography. In Cyber Warfare and Cyber Terrorism (pp. 50-56). Hershey, PA: Information Science Reference.

Guster, D. C., Schmidt, M., Hall, C., & Brown, C. (2008). A Preliminary Analysis of Web Accessible Distributed Data Mining: Performance and Scalability. Orlando, Fl.: Proceedings of the International Academy of Business and Public Administration Disciplines (IABPAD) Conference

Troutt, M. D., Brandyberry, A. A., Sohn, C., & Tadisina, S. K. (2008). Linear programming system identification: The general nonnegative parameters case. European Journal of Operational Research, 185, 63-75.

R.A. Sultanov, D. Guster, B. Engelbrekt, and R. Blankenbecler, Proceedings of the 2008 International Conference on Bioinformatics and Computational Biology (BIOCOMP’ 08), Volume II, 437 - 443, Eds. H.M. Arabnia, M.Q. Yang, J.Y. Yang, CSREA Press.. WORLDCOMP’08.

R.A. Sultanov, D. Guster, B. Engelbrekt, and R. Blankenbecler, Proceedings of the 2008 IEEE International Conference on Computational Science and Engineering, CSE 2008, p.p. 479-485, IEEE Computer Society.

Chen, Q. J., Schmidt, M., Phan, D. D. (2008). E-commerce Security Threats, Awareness, Trust, and Practices. International Journal of Information Systems and Change Management, 3(1), 16-32.

Schmidt, M., Johnston, A., Arnett, K., Chen, Q. J., & Li, S. (2008). A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness. Journal of Global Information Management, 16(2), 91-103.

Guster, D. C., McCann, B., Krzenski, K., & Lee, O. F. (2008). A cost effective, safe, and simple method to provide a disaster recovery plan to small and medium sized businesses. Review of Business Research, 8(4), 63-71.

Weber, J. E., Guster, D. C., & Safonov, P. I. (2008). Password security and weak passwords: A developmental perspective. Journal of Information Technology Management, 19(3).

Paulson, R. A. (2008). The Market Reaction to College Football Timing Rules Changes. Business Quest, electronic, 7.

Weber, J. E., Guster, D. C., Safonov, P. I., & Schmidt, M. (2008). Weak password security: An empirical study. Information Security Journal: A Global Perspective, 17(1), 45-54.

Herath, S. (2008). An Interdisciplinary Accounting Forensics Course to Improve Computer Science Enrollments. Journal for Computing Sciences in Colleges, 74-81.

Herath, S. (2008). Cryptographic Algorithms to Spatial Circuit Transformation in An Active Learning Module to Enhance the Information Assurance and Security Curriculum. Journal for Computing Sciences in Colleges 2008, 23-29.

Guster, D. C., Safonov, P. I., Brown, C., & Jansen, B. (2008). An Analysis of Distributed Database Indexing Method in Regard to performance of extract/transform/load (ETL) processes. Issues in Information Systems, 9(1).

Guster, D. C., Safonov, P. I., Brown, C., & Jansen, B. (2008). An analysis of distributed database indexing method in regard to performance of extract/transform/load (ETL) processes. Issues in Information Systems, IX(2), 544-550.

Chen, Q. J., Schmidt, M., Phan, D. D., & Arnett, K. P. (2008). E-Commerce Security Threats: Awareness, Trust, and Practice. International Journal of Information Systems and Change Management, 3(1), 16-32.

Warkentin, M., Bekkering, E., & Schmidt, M. (2008). Steganography: Forensic, Security, and Legal Issues. Journal of Digital Forensics, Security and Law, 3(2), 17-34.

Templeton, G. F., Schmidt, M., & Taylor, G. S. (2008). Managing the Diffusion of Organizational Learning Behavior. Information Systems Frontiers, 10.

Weber, J. E., Guster, D. C., Safonov, P. I., & Schmidt, M. (2008). Weak Password Security: An Empirical Study. Information Systems Security, 17(1).

Lee, D. I., Sohn, C., & Lee, H. (2008). The role of satisfaction and trust in mobile CRM activities. International Journal of Electronic Customer Relationship Management, 2(2), 101-119.

Song, J. H., Rhee, Y., Adams, C. R., & Azevedo, R. E. (2008). Relating Equity investment to Human Resource Development for Business benefits. Business Renaissance Quarterly, 3(3), 59-83.

Sun, P.-c., Tsai, J.-M. R., Finger, G., & Yeh, D. (2008). What drives a successful e-learning? An empirical investigation of the critical factors influencing learner satisfactions. Computers and Education, 50(4), 1183-1202.

Yeh, D., & Tsai, J.-M. R. (2008). Linear Regression Models for Assessing the Ranking of Web Sites Based on Average Number of Visits. Journal of Information Science and Engineering, 24(2).

 Weber, J. E., Yoshimoto, G., Smith, J. A., & Bohnen, H. W. (2008). Development and Validation of Two Versions of the Student Prior Attitude Scale (SPA). Mountain Plains Journal of Business and Economics, 9(2), 52-60.

2007

Chen, Q. J., Schmidt, M., Phan, D. D., & Arnett, K. (2007). E-commerce Security Threats, Awareness, Trust, and Security Practices: An Assessment of Perceptions. Phoenix, Arizona: Proceedings of 2007 Decision Sciences Institute Annual Conference.

Schmidt, M., Chen, Q. J., Phan, D. D., & Arnett, K. (2007). Comparing Security Perceptions of E-Commerce Users: Proceedings of 2007 AMCIS.

Phan, D. D., Schmidt, M. (2007). Comparing Security Perceptions of E-Commerce Users. Colorado, USA: The Americas Conference on Information Systems (AMCIS).

Chen, Q. J., Phan, D. D., Wang, B., & Vogel, D. (2007). Selecting Light-Weight Development Method: A Case Study: Proceedings of 2007 IEEE ICSSSM Conference.

Paulson, R. A. (2007). Exploiting Pro Football Teasers. In Optimal Play: Mathematical Studies of Games and Gambling (vol. article in book, pp. 431-435). Reno, NV: Institute for the Study of Gambling and Commercial Gaming.

Phan, D. D., & Chen, Q. J. (2007). Selecting Light-Weight Development method: A Case  Study. Chengdu, P. R. CHINA: The Fourth IEEE Conference on Service Systems and Service Management (ICSSSM2007).

Warkentin, M., Schmidt, M., & Bekkering, E. (2007). Steganography and Stegananalysis. In Intellectual Property Protection for Multimedia Information Technology (pp. 374-380). Hershey, PA: IGI Global.

Hanson, J. M., & Schmidt, M. (2007). Secure Automated Clearing House Transactions. In Encyclopedia of Information Ethics and Security. Hershey, PA: Information Science Reference.

Becker, R. G., Schmidt, M., & Johnston, A. C. (2007). Mitigation of Identity Theft in the Information Age. In Encyclopedia of Information Ethics and Security. Hershey, PA: Information Science Reference.

Schmidt, M., Chen, Q. J., Phan, D. D., & Arnett, K. P. (2007). Comparing Security Perceptions of E-Commerce Users. Keystone, CO: Proceedings of the 2007 Americas Conference on Information Systems (AMCIS).

Chen, J. Q., Schmidt, M., Phan, D. D., & Arnett, K. P. (2007). E-commerce Security Threats, Awareness, Trust, and Security Practices: An Assessment of Perceptions. Phoenix, AZ.: Proceedings of the National Decision Sciences Institute (DSI) Conference.

Schmidt, M., & Arnett., K. P. (2007). Synthesis and Analysis of Moore and Benbasat’s PCI and Witte’s Susceptibility and Severity of Threat Scales. Keystone, CO: Proceedings of the 2007 Americas Conference on Information Systems (AMCIS).

Schmidt, M., Johnston, A. C., & Arnett, K. P. (2007). US and Korean Perspective on Malware: A Closer Look. Orlando, FL: Proceedings of the International Academy of Business Disciplines (IABD).

McDermott, S., Schmidt, M., & Yoshimoto, G. (2007). NSA Electronic Surveillance Database. Las Vegas, NV: American Society of Business and Behavioral Sciences.

R.A. Sultanov, D. Guster, Chem. Phys. Lett. 436, 19-24 (2007).

R.A. Sultanov, M. Nordby, and D. Guster, Proceedings of the 2007 International Conference on Scientific Computing (CSC’07), June 25-28, 2007, Las Vegas, NV. Editors: H.R. Arabnia, Jack Y. Yang, and Mary Qu Yang, WORLDCOMP”07, CSREA Press, pp. 158-164 (2007).

Maskey, S., Jansen, B., Guster, D. C., & Hall, C. (2007). A basic firewall configuration strategy for the protection of development-related computer networks and subnetworks. The (ISC)2 Journal: Information Systems Security, 16(5).

Sultanov, R., & Guster, D. C. (2007). Close Coupling Calculations of Rotational Energy Transfer in p-H2 + HD. Chemical Physics Letters, 436, 19-24.

Herath, S. (2007). Designing Computer Forensics Courses using  Case Studies to Enhance Computer Security Curricula. The Journal of Computing Sciences in Colleges, 23(1), 264-272.

Brown, C., Guster, D. C., & Krzenski, S. (2007). Can Distributed Databases Provide an Effective Means of Speeding Up Web Access Times?. Journal of Information Technology Management, 18(1), 1-15.

Herath, S. (2007). Intrusion Detection using the Chi-square Goodness-of-fit Test for Information Assurance, Network, Forensics and Software security. The Journal of Computing Sciences in Colleges, 23(1), 255-263.

Guster, D. C., Safonov, P. I., Sultanov, R., & Nordby, M. (2007). The Effects Of Cluster Size On Packet Inter-Arrival Patterns And Intensity In A Distributed System. Issues in Information Systems, 8(2).

Herath, S. (2007). The Volatility of the Stock Market and News. International Research Journal of Finance and Economics(11), 53-65.

Arnett, K. P., Schmidt, M., Johnston, A. C., Kim, J., & Hwang, H. (2007). Rootkits and What We Know: Assessing US and Korean Knowledge and Perceptions. International Journal of Information Security and Privacy, 1(4), 75-86.

Johnston, A. C., Schmidt, M., Arnett, K. P., & Thomas, J. (2007). Getting to the Root of the Problem. Journal of Internet Commerce, 6(1), 1-12.

Schmidt, M., Johnston, A. C., & Arnett, K. P. (2007). US and Korean Perspectives on Malware: A Closer Look. Business Research Yearbook, 14, 506-512.

Song, J. H., Adams, C. R., & Rhee, Y. (2007). Developing an Effective Deep Support Network for Individual Investors. Journal of Financial Services Marketing, 12(3), 208-218.

2006

Chen, Q. J., Schmidt, M., & Weber, J. E. (2006). An Analysis of Data Warehousing to Promote National Security. San Antonio, TX: Proceedings of the National Decision Sciences Institute (DSI) Annual Conference.

Subedi, L., Baliga, B., Bekkala, A., & Chen, Q. J. (2006). Quality Improvement in Casting Industry. Huntville: 27th ASEM National Conference Proceedings.

Chen, Q. J., & Rahman, T. (2006). A Decision Support System for Road Safety Analyses (pp. 328-330): Proceedings of the Pan Pacific Business XXIII International Conference.

Herath, S., Wanasinghe, D. R., Madurapperuma, A. P., & Giragama, C. N.W. (2006). Boundary Color Tones between Color Modifiers in Two Languages. Taipei, Taiwan: 2006 IEEE International Conference on Systems, Man, and Cybernetics.

Chen, Q. J., & Qi, F. (2006). B2B E-Commerce and Transformation of Inter-firm Governance (pp. 38-41): Proceedings of the 2006 Information Resource Management Association International Conference.

Herath, S., Madurapperuma, A. P., Marasinghe, C. A., & Giragama, C. N.W. (2006). Cross--Language Similarity between Perceptual and Semantic Structures of Color Tones. Taipei, Taiwan: 2006 IEEE International Conference on Systems, Man, and Cybernetics.

Schmidt, M., & Halverson, M. S. (2006). DSS for Global Competitive Advantage. Bangkok, Thailand: Academy of International Business Southeast Asia Regional Conference.

Herath, S. (2006). Case Studies for Learning Software Security Engineering. Aizu Wakamatsu, Japan: 9th International Conference on Humans and Computers Proceedings.

Warkentin, M., Schmidt, M., & Bekkering, E. (2006). Steganography and Stegananalysis. In Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues (pp. 287-294). Hershey PA: Idea Group Publishers.

Schmidt, M., Guster, D. C., & Sundheim, R. A. (2006). An Empirical Analysis of Network Packet Traffic Protocols. San Antonio, TX: Proceedings of the National Decision Sciences Institute Conference.

Warkentin, M., Shropshire, J., Johnston, A. C., & Schmidt, M. (2006). Personality and IT Security: An Application of the five-factor model. Acapulco, Mexico: Proceedings of the 2006 Americas Conference on Information Systems.

Schmidt, M., Johnston, A. C., & Arnett, K. P. (2006). An Empirical Investigation of Rootkit Awareness. San Diego, CA: International Academy of Business Disciplines (IABD).

Schmidt, M., Nordby, M. D., & Guster, D. C. (2006). Managing the Enterprise Network: Performance of Routing Versus Switching on a State of the Art Switch.. San Diego, CA: Proceedings of the International Academy of Business Disciplines (IABD).

R.A. Sultanov, D. Guster, Chemical Physics Letters 428, 227-230 (2006).

R.A. Sultanov, D. Guster, Chemical Physics 326, 641-646 (2006).

R.A. Sultanov, N. Balakrishnan, Journal of Chemical Physics 124 (12), art. no. 124321 (2006).

D. Guster, P. Safonov, R. Sundheim, and R.A. Sultanov, Journal of Informatics Education Research 8, Number 3, p. 81-106 (2006).

P. Safonov, D. Guster, R.A. Sultanov, D. Podkorytov, Issues in Information Systems, Volume VII, No. 2, pp. 33-37 (2006).

D. Guster, R.A. Sultanov, M. Nordby, R. Sundheim, “Using Distributed Processing to Enhance Performance Characteristics of Hosts Used to SupportWWWApplications”, International Journal of Business Research (IJBR), Volume VI, Number 2, pp. 67-71 (2006).

Chen, Q. J., & Guan, G. (2006). A New Method to Build Neural Networks for Firm Bankruptcy Prediction. Oil, Gas & Energy Quarterly, 54(3), 615-626.

Guster, D. C., Safonov, P. I., Sundheim, R. A., & Sultanov, R. (2006). Determining the Effectiveness of Using Linux Operating System Demonstrations to Illustrate Message Digest Concepts and Vulnerabilities. Journal of Informatics Education Research, 8(3), 81-105.

Schmidt, M., Nordby, M., & Guster, D. C. (2006). Managing the Enterprise Network: Performance of Routing Versus Switching on a State of the Art Switch. Business Research Yearbook, 13, 147-152.

Sultanov, R., & Guster, D. C. (2006). Rotational Energy Transfer in H2 + H2. Chemical Physics Letters, 428, 227-230.

Sultanov, R., & Guster, D. C. (2006). State Resolved Rotational Excitation Cross Section Rates in H2 + H2 Collisions. Chemical Physics, 326, 641-646.

Guster, D. C., Sultanov, R., Nordby, M., & Sundheim, R. A. (2006). Using Distributed Processing to Enhance Performance Characteristics of Hosts Used to Support WWW Applications. International Journal of Business Research, 6(2), 67-71.

Safonov, P. I., Guster, D. C., Sultanov, R., & Podkorytov, D. (2006). Processor type and its relationship to performance in the application of distributed processing to determine vulnerabilities in password files. Issues in Information Systems, 7(2), 33-37.

Paulson, R. A., & Weber, J. E. (2006). Cyberextortion: An Overview of Distributed Denial of Service Attacks Against Online Gaming Companies. Issues in Information Systems, VII(2), pp:  52-56.

Schmidt, M., Johnston, A. C., & Arnett, K. P. (2006). An Empirical Investigation of Rootkit Awareness. Business Research Yearbook, 13, 153-158.

Schmidt, M., Guster, D. C., & Nordby, M. (2006). Managing the Enterprise Network: Performance of Routing Versus Switching on a State of the Art Switch. Business Research Yearbook, 13, 147-152.

Sohn, C., Kim, K., Roemer, C., & Yassine, A. (2006). Configuration and Coordination of Activities Within a Supply Chain: Exploring the Synergy Between Modularity and Information Technology. International Journal of Automotive Technology and Management, 6(1).

Guster, D. C., Safonov, P. I., Sundheim, R. A., & Sultanov, R. (2006). Determining the Effectiveness of Using Linux Operating System Demonstrations to Illustrate Message Digest Concepts and Vulnerabilities. Journal of Informatics Education Research, 8(3), 81-105.

Wu, J., Chen, C., & Tsai, J.-M. R. (2006). Using System Dynamics Approach to Construct a Performance Measurement Model for Pharmacy Supply Chain Management. Journal of International Technology and Information Management, 15(1), 67-78.

Wu, J., Chen, C. C., Tsai, J.-M. R., & Wu, Y. (2006). An Integrative Model to Predict the Continuance use of Electronic Learning Systems: Hints for Teaching. International Journal on E-Learning, 5(2), 287-302.

 

Untitled Document