Search Results
JEL Code: C88

77,179 Total downloads

Viewing: 1 - 50 of 361 papers

1.

Information Asymmetry and Thwarting Spam

Number of pages: 11 Posted: 20 Jan 2004
Working Paper Series
University of Michigan - Department of Electrical Engineering and Computer Science, Boston University – Questrom School of Business and University of Michigan at Ann Arbor - School of Information
Downloads 6,423
2.

The Effect of Stock Spam on Financial Markets

Number of pages: 24 Posted: 21 Apr 2006
Working Paper Series
University of Innsbruck and University of Mannheim - Laboratory for Dependable Distributed Systems, University of Mannheim
Downloads 4,074
3.

Worlds for Study: Invitation - Virtual Worlds for Studying Real-World Business (and Law, and Politics, and Sociology, and....)

Number of pages: 23 Posted: 25 May 2007 Last Revised: 09 Dec 2012
Working Paper Series
Cornell University - Samuel Curtis Johnson Graduate School of Management
Downloads 2,291
4.

Blockchain Demystified

Queen Mary School of Law Legal Studies Research Paper No. 268/2017
Number of pages: 53 Posted: 21 Dec 2017 Last Revised: 05 Nov 2018
Accepted Paper Series
University of Cambridge - Computer Laboratory, Queen Mary University of London - School of Law, Queen Mary University of London, School of Law - Centre for Commercial Law Studies and University of Cambridge -- Dept. Computer Science & Technology (Computer Laboratory)
Downloads 2,207
5.

Bargaining in the Shadow of Big Data

Florida Law Review, Vol. 66, No. 5, 2014
Number of pages: 66 Posted: 14 Sep 2013 Last Revised: 03 Apr 2014
Accepted Paper Series
South Texas College of Law and South Texas College of Law Alumni
Downloads 1,511
6.

Forecasting Stock Market with Neural Networks

Number of pages: 14 Posted: 19 Jan 2009 Last Revised: 28 Jan 2009
Working Paper Series
Department of Computer Science and Information Management, Soochow University, Taiwan and Department of Computer Science and Information Management, Soochow University, Taiwan
Downloads 1,369
7.

Analyzing Speech to Detect Financial Misreporting

Journal of Accounting Research, Forthcoming
Number of pages: 53 Posted: 06 Jan 2010 Last Revised: 10 Oct 2011
Accepted Paper Series
University of Illinois at Urbana-Champaign, Duke University - Fuqua School of Business and Duke University - Fuqua School of Business
Downloads 1,334
8.

Digital Forensics: Challenges and Future Research Directions

Simon M and Choo K-K R 2014. Digital forensics: Challenges and future research directions. In Il-Su Kim and Jianhong Liu (editors), Contemporary Trends in Asian Criminal Justice: Paving the Way for the Future, pp. 105-146, Seoul: South Korea, Korean Institute of Criminology
Number of pages: 62 Posted: 08 Apr 2014
Accepted Paper Series
University of South Australia and The University of Texas at San Antonio
Downloads 1,329
9.

Google Drive: Forensic Analysis of Cloud Storage Data Remnants

Journal of Network and Computer Applications, Forthcoming
Number of pages: 31 Posted: 15 Oct 2013
Accepted Paper Series
Government of South Australia and The University of Texas at San Antonio
Downloads 1,164
10.

Extensible Business Reporting Language: The Future of E-Commerce-Driven Accounting

International Journal of Business, Vol. 9, No. 1, 2004
Number of pages: 24 Posted: 08 Feb 2004
Accepted Paper Series
Saint Joseph's University and Massachusetts Association for Healthcare Quality
Downloads 1,125
11.

LexNLP: Natural Language Processing and Information Extraction For Legal and Regulatory Texts

Number of pages: 7 Posted: 21 Jun 2018
Working Paper Series
Bommarito Consulting, LLC, Illinois Tech - Chicago Kent College of Law and LexPredict, LLC
Downloads 1,067
12.

The Network Structure of Supreme Court Jurisprudence

University of Houston Law Center No. 2005-W-01
Number of pages: 26 Posted: 14 Jun 2005
Working Paper Series
University of Houston Law Center
Downloads 965
13.

Cybersecurity: What About U.S. Policy?

Journal of Law, Technology and Policy, Vol. 2015, 341 (2015)
Number of pages: 51 Posted: 13 Jan 2015 Last Revised: 18 Dec 2015
Accepted Paper Series
Prairie View A&M University - College of Business
Downloads 938
14.

Comments on Handling Objects in Spreadsheets

Number of pages: 18 Posted: 16 Oct 2008
Working Paper Series
Ludwig Maximilian University of Munich (LMU) - Faculty of Mathematics
Downloads 851
15.

A Bayesian Methodology for Systemic Risk Assessment in Financial Networks

Number of pages: 42 Posted: 21 Mar 2015 Last Revised: 03 May 2016
Working Paper Series
Imperial College London - Department of Mathematics and London School of Economics & Political Science (LSE) - Department of Mathematics
Downloads 840
16.

The Board’s Responsibility for Information Technology Governance

John Marshall Journal of Computer & Information Law, Vol. 29, p. 313, 2011
Number of pages: 32 Posted: 22 Oct 2011 Last Revised: 24 Dec 2017
Accepted Paper Series
Prairie View A&M University - College of Business and U.S.I.
Downloads 757
17.

Python for Unified Research in Econometrics and Statistics

Number of pages: 42 Posted: 04 Jul 2009
Working Paper Series
ENAC and ENAC
Downloads 736
18.

A Collaborative Project Management Approach and a Framework for its Supporting Systems

Journal of International Technology and Information Management (JIITM), Vol. 15, No. 2, 2006
Number of pages: 22 Posted: 25 Oct 2006
Accepted Paper Series
University of Manitoba - Department of Accounting and Finance, Oklahoma State University-MSIS and University of Arizona - Center for the Management of Information (CMI)
Downloads 727
19.

The Hub-and-Spoke Model - A Tutorial

Number of pages: 23 Posted: 20 Dec 2006 Last Revised: 27 Feb 2012
Working Paper Series
IC2 Institute, The University of Texas at Austin and affiliation not provided to SSRN
Downloads 711
20.

Forensic Analysis of Windows Thumbcache Files

Quick D, Tassone C and Choo K-K R 2014. Forensic Analysis of Windows Thumbcache files. In 20th Americas Conference on Information Systems (AMCIS 2014), 7-10 August 2014, Association for Information Systems (Forthcoming)
Number of pages: 13 Posted: 02 May 2014
Accepted Paper Series
Government of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 693
21.

Corporate Failure Prediction (Bankruptcy) in Australia: From Zeta to Neural Networks

Number of pages: 56 Posted: 21 Feb 2009 Last Revised: 24 Mar 2009
Working Paper Series
The Hong Kong University of Science & Technology, University of New South Wales (UNSW), University of New South Wales (UNSW) - Australian Defence Force Academy and University of New South Wales (UNSW)
Downloads 687
22.

The Virtuous Spy: Privacy as an Ethical Limit

U of Penn Law School, Public Law Research Paper No. 07-34, The Monist: An International Quarterly Journal of General Philosophical Inquiry, Vol. 91, No. 1, 2008
Number of pages: 18 Posted: 04 Sep 2007 Last Revised: 26 Sep 2014
Accepted Paper Series
University of Pennsylvania Law School
Downloads 676
23.

Cyber Crime

Oxford Handbook of Organized Crime, L. Paoli, Oxford University Press, 2013, DOI: 10.1093/oxfordhb/9780199730445.013.003
Number of pages: 31 Posted: 17 Oct 2013
Accepted Paper Series
The University of Texas at San Antonio and Australian National University (ANU) - Research School of Social Sciences (RSSS)
Downloads 663
24.

Blockchain As a Service: Providers and Trust

Queen Mary School of Law Legal Studies Research Paper No. 269/2017
Number of pages: 16 Posted: 21 Dec 2017 Last Revised: 05 Nov 2018
Accepted Paper Series
University of Cambridge -- Dept. Computer Science & Technology (Computer Laboratory) and Queen Mary University of London - School of Law
Downloads 639
25.

Earnings Guidance after Regulation Fd

Journal of Investing, Winter 2003
Number of pages: 30 Posted: 26 Aug 2003
Accepted Paper Series
Bar-Ilan University - Department of Computer Science, New York University (NYU) - Department of Accounting and New York University

Multiple version iconThere are 2 versions of this paper

Downloads 593
26.

Dredging Up the Past: Lifelogging, Memory and Surveillance

University of Chicago Law Review, Vol. 75, p. 47, 2008, U of Penn Law School, Public Law Research Paper No. 07-33
Number of pages: 28 Posted: 03 Sep 2007 Last Revised: 03 Sep 2013
Accepted Paper Series
University of Pennsylvania Law School
Downloads 576
27.

The Cyber Threat Landscape: Challenges and Future Research Directions

Computers and Security, 30(8): 719–731, 2011,
Number of pages: 39 Posted: 14 Oct 2013
Working Paper Series
The University of Texas at San Antonio
Downloads 575
28.

OSMnx: New Methods for Acquiring, Constructing, Analyzing, and Visualizing Complex Street Networks

Number of pages: 25 Posted: 13 Nov 2016 Last Revised: 09 Jul 2017
Working Paper Series
University of Southern California - Sol Price School of Public Policy
Downloads 559
29.

Comprehensive Time-Series Regression Models Using Gretl — U.S. GDP and Government Consumption Expenditures & Gross Investment from 1980 to 2013

Number of pages: 82 Posted: 21 Dec 2014 Last Revised: 17 Aug 2019
Working Paper Series
affiliation not provided to SSRN
Downloads 547
30.

Man versus Machine: Using Legal Tech to Optimize the Rule of Law

Number of pages: 11 Posted: 24 Sep 2016 Last Revised: 08 Oct 2016
Working Paper Series
University of Munich - Center for International Law
Downloads 536
31.

Visually-Weighted Regression

Number of pages: 10 Posted: 17 May 2013
Working Paper Series
University of California, Berkeley
Downloads 533
32.

Mathematica as an Environment for Doing Economics and Econometrics

Number of pages: 18 Posted: 24 Dec 1997
Working Paper Series
Boston College
Downloads 532
33.

Duration Modeling in Undergraduate Econometrics Curriculum Via Excel

Number of pages: 23 Posted: 10 Dec 2003
Case and Teaching Paper Series
American University of Sharjah, School of Business Administration, Department of Economics
Downloads 525
34.

Data Reduction and Data Mining Framework for Digital Forensic Evidence: Storage, Intelligence, Review and Archive

Trends & Issues in Crime and Criminal Justice 480: 1-11, 2014
Number of pages: 11 Posted: 19 Sep 2014 Last Revised: 23 Sep 2014
Accepted Paper Series
Government of South Australia and The University of Texas at San Antonio
Downloads 517
35.

An Alternative Approach to Firms' Evaluation: Expert Systems and Fuzzy Logic

International Journal of Information Technology and Decision Making, Vol. 5, No. 1, pp. 195-225, March 2006
Number of pages: 22 Posted: 23 Nov 2007
Accepted Paper Series
Università degli studi di Modena e Reggio Emilia (UNIMORE) - School of Doctorate E4E (Engineering for Economics-Economics for Engineering), Università degli studi di Modena e Reggio Emilia (UNIMORE) and Università degli Studi della Calabria
Downloads 506
36.

Brand Position & Customer Loyalty for Public Sector Oil Marketing Companies

International Journal of Management Prudence, Vol. II, No. 2, pp. 25-35, October 2011
Number of pages: 13 Posted: 26 Nov 2011
Accepted Paper Series
Jaipuria Institute of Management, Indore, Manipal University Jaipur and University of Petroleum and Energy Studies (UPES)
Downloads 505
37.

The Nearest Correlation Matrix Problem: Solution by Differential Evolution Method of Global Optimization

Number of pages: 8 Posted: 15 Apr 2007 Last Revised: 07 Mar 2013
Working Paper Series
North-Eastern Hill University (NEHU)
Downloads 484
38.

Corporate Information Technology Governance Under Fire

Journal of Strategic and International Studies, Vol. VIII, No. 3 (2013)
Number of pages: 10 Posted: 31 Oct 2013
Accepted Paper Series
Prairie View A&M University - College of Business, Texas Tech University and Texas Tech University
Downloads 483
39.

A Microsoft Excel Version of Parrondo’s Paradox

Number of pages: 18 Posted: 11 Jul 2009 Last Revised: 26 Jul 2009
Working Paper Series
DePauw University
Downloads 481
40.

Virtual Enterprise Information System Requirements

International Conference "Competitiveness and Stability in the Knowledge-Based Economy", Craiova, October 20-21, 2006
Number of pages: 8 Posted: 20 Sep 2006
Working Paper Series
Romanian-American University, Romanian-American University and Romanian-American University
Downloads 481
41.

On Generating Correlated Random Variables with a Given Valid or Invalid Correlation Matrix

Number of pages: 21 Posted: 03 Aug 2004
Working Paper Series
North-Eastern Hill University (NEHU)
Downloads 479
42.

Computation of Multiple Correspondence Analysis, with Code in R

UPF Working Paper No. 887
Number of pages: 23 Posted: 15 Nov 2005
Working Paper Series
University of Goettingen (Gottingen) and Universitat Pompeu Fabra - Faculty of Economic and Business Sciences
Downloads 474
43.

Optimal Solution of the Nearest Correlation Matrix Problem by Minimization of the Maximum Norm

Number of pages: 16 Posted: 09 Aug 2004 Last Revised: 14 Oct 2010
Working Paper Series
North-Eastern Hill University (NEHU)
Downloads 464
44.

A Virtual Data Warehouse for Manufacturing Industry

Number of pages: 16 Posted: 30 Jan 2010
Working Paper Series
Institute of Chartered Financial Analysts of India (ICFAI) - The Icfai University (IFHE), Hyderabad and ICFAI Business School (IBS), Hyderabad
Downloads 453
45.

Privacy in the Digital Age: Fact or Fiction?

Number of pages: 79 Posted: 31 Jan 2010
Working Paper Series
Texas Woman's University - College of Business
Downloads 444
46.

Bitcoin, Blockchain, and Distributed Ledgers: Between Hype and Reality

Number of pages: 22 Posted: 31 Aug 2016 Last Revised: 19 Apr 2018
Working Paper Series
Digital Gold Institute
Downloads 430
47.

Cloud Computing and Digital Forensics

Martini B, Quick D and Choo K-K R 2013. Cloud Computing and Digital Forensics. In Kim, I-S, editor, Information Society and Cybercrime: Challenges for Criminology and Criminal Justice, Research Report Series 13-B-01: 111–125, Korean Institute of Criminology,
Number of pages: 21 Posted: 11 Dec 2013
Accepted Paper Series
University of South Australia, Government of South Australia and The University of Texas at San Antonio
Downloads 415
48.

Text Mining for Central Banks

Number of pages: 25 Posted: 02 Jul 2015
Working Paper Series
Bank of England, University of Oxford - Department of Economics, Bank of England and London School of Economics & Political Science (LSE) - Department of Government
Downloads 412
49.

Algorithmic Trading Model for Manifold Learning in FX

Number of pages: 11 Posted: 26 Nov 2014
Working Paper Series
Modus Operandi, Inc.
Downloads 404
50.

IOS Anti-Forensics: How Can We Securely Conceal, Delete and Insert Data?

47th Hawaii International Conference on System Sciences (HICSS 2014)
Number of pages: 10 Posted: 14 Oct 2013
Working Paper Series
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 404