Advances in Information Security and Assurance true By:Jong Hyuk Park,Hsiao-Hwa Chen,Mohammed Atiquzzaman Published on 2009-06-09 by Springer Science & Business Media This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 41 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on cryptographic algorithms, authentication and identity management, authorization and access control, biometrics and computer forensics, cryptographic protocols, data integrity and privacy, key management and recovery, mobile and RFID network security, firewall, IDs, anti-virus, and other security products, internet and web services security, cyber-attack and cyber-terrorism, other security research, together with the articles from the workshops MoWiN 2009, NASSUE 2009, IAWSN 2009, WNGS 2009 ...
Evidence on Learning and Network Externalities in the Diffusion of Home Computers false By:Austan Goolsbee,Peter J. Klenow Published on 1999 by In this paper we examine the importance of local spillovers such as network externalities and learning from others in the diffusion of home computers using data on 110,000 U.S. households in 1997. Controlling for many individual characteristics, we find that people are more likely to buy their first home computer in areas where a high fraction of households already own computers or when a large share of their friends and family own computers. Further results suggest that these patterns are unlikely to be explained by city-specific unobserved traits. Looked at in more detail, the spillovers appear to come from experienced and intensive computer users. They are not associated with the use of any particular type of software but do seem to be highly tied to the use of e-mail and the Internet, consistent with computers being part of a local informa...