Gerald V. Post

According to our database1, Gerald V. Post authored at least 25 papers between 1986 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Business Intelligence: Attribute and Feature Demand.
Int. J. Bus. Intell. Res., 2012

2010
Using re-voting to reduce the threat of coercion in elections.
Electron. Gov. an Int. J., 2010

2009
An Economic Model for Pricing Digital Products.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2007
Evaluating information security tradeoffs: Restricting access can interfere with user tasks.
Comput. Secur., 2007

Voting Early and Often Can Be a Good Thing.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Information Security Tradeoffs: The User Perspective.
Inf. Secur. J. A Glob. Perspect., 2006

2003
Computer security and operating system updates.
Inf. Softw. Technol., 2003

2002
The Dilemma of Security Patches.
Inf. Secur. J. A Glob. Perspect., 2002

2001
Database management systems: design considerations and attribute facilities.
J. Syst. Softw., 2001

Comparison of Database Management Systems.
J. Comput. Inf. Syst., 2001

User requirements for OO CASE tools.
Inf. Softw. Technol., 2001

Computer Technology Changes and Purchasing Strategies.
Adv. Comput., 2001

2000
Security Implications of Virus Management.
Inf. Secur. J. A Glob. Perspect., 2000

OO-CASE tools: an evaluation of Rose.
Inf. Softw. Technol., 2000

Management tradeoffs in anti-virus strategies.
Inf. Manag., 2000

1999
A Structural Equation Evaluation of CASE Tools Attributes.
J. Manag. Inf. Syst., 1999

How Often Should a Firm Buy New PCs?
Commun. ACM, 1999

1998
A comparative evaluation of CASE tools.
J. Syst. Softw., 1998

The use and effectiveness of anti-virus software.
Comput. Secur., 1998

1996
Stochastic preference modeling within a switching regression framework.
Comput. Oper. Res., 1996

1995
A Modeling Approach to Evaluating Strategic Uses of Information Technology.
J. Manag. Inf. Syst., 1995

1994
Timing the introduction of information technology.
Inf. Syst. J., 1994

1991
Accessibility vs. security: A look at the demand for computer security.
Comput. Secur., 1991

1987
Improving operating system security.
Comput. Secur., 1987

1986
A Stochastic Dominance Approach to Risk Analysis of Computer Systems.
MIS Q., 1986


  Loading...