Now showing items 12-18 of 18

    • Informational and/or Transactional Websites: Strategic Choices in a Distribution Channel 

      Karray, Salma; Sigue, Simon Pierre (Elsevier, 2017)
      While most businesses have faced the decision of whether to operate an informational and/or a transactional website, the literature on website selection in marketing channels remains very sparse. This paper proposes an ...
    • Matching expectations and reality in AI systems - cybersecurity use case 

      Defo Aymar, Tala (2023-04-01)
      Artificial intelligence (AI) is a growing field in computer science which develops intelligent systems capable of performing things that a human mind can do. The manufacturers of security systems integrate AI capabilities ...
    • Modeling reward expiry for loyalty programs in a competitive market 

      Bazargan, Amirhossein; Karray, Salma; Zolfaghari, Saeed (2017-08-10)
      This paper investigates reward expiry for loyalty programs. It provides insights into the profitability of setting reward expiry for competing firms and identifies conditions under which such a policy would be beneficial. ...
    • Privacy Implications of GSM Network Services 

      Kosa, Tracy Ann; el-Khatib, Khalil; Marsh, Steve (2013-07-15)
      Current research on GSM does not deal with privacy requirements, or confuses privacy (legislated) with security (standards based). This paper seeks to examine how the applicable privacy legislation in Canada (PIPEDA) would ...
    • Security Analysis of Onos Software-Defined Network Platform 

      Adenuga-Taiwo, Oluwadamilola; Shah Heydari, Shahram (2016-10-12)
      Software Defined Networking (SDN) enables organizations strengthen their network architectures, reduce running costs and enable sophisticated network functions. The adoption of software defined networks by top industry ...
    • Should Companies Jointly Promote their Complementary Products when they Compete in other Product Categories? 

      Karray, Salma; Sigue, Simon-Pierre (ScienceDirect, 2016-12)
      Joint promotions, whereby companies pool marketing resources to promote their brands, are increasingly used to reduce marketing costs and develop common business opportunities, but formal knowledge about how they should ...
    • Systems and models for secure fallback authentication 

      Addas, Alaadin (2018-12-01)
      Fallback authentication (FA) techniques such as security questions, Email resets, and SMS resets have significant security flaws that easily undermine the primary method of authentication. Security questions have been shown ...