Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gerald V. Post is active.

Publication


Featured researches published by Gerald V. Post.


Information & Management | 2000

Management tradeoffs in anti-virus strategies

Gerald V. Post; Albert Kagan

This study evaluates current management and security practices with respect to computer virus infestations in business computer systems. Given the rise in macro viruses within recent years many business firms have adopted either a restrictive or proactive management approach to the problem. It is unclear whether there is a significant difference between the approaches in terms of user satisfaction and future virus outbreaks. The lack of consistent computer backup procedures tends to exacerbate a virus outbreak. The cost structure used to address virus management tends to escalate depending on the severity of a virus episode.


Journal of Management Information Systems | 1995

A Modeling Approach to Evaluating Strategic Uses of Information Technology

Gerald V. Post; Albert Kagan; Kin-Nam Lau

Abstract:Traditional static benefit-cost methods were useful when evaluating transaction processing systems. Strategic benefits are more difficult to evaluate, since they involve dynamic interactions between customers, suppliers, and rivals. In an attempt to gain a competitive advantage, there is a strong incentive to be the first implementor of new technology. However, information technology (IT) costs decline over time, so there is an incentive to delay implementation. A model is developed that enables managers to evaluate this trade-off and choose the best implementation time. The model emphasizes competition between large firms in a regional (or national) market, interacting with firms in a local market. The model is illustrated with an application to the banking industry. It compares the implementation times of larger regional banks vis-a-vis smaller local banks, and shows how the banks might use technology to respond to various changes in the banking industry.


Information & Software Technology | 2000

OO-CASE tools: an evaluation of Rose

Gerald V. Post; Albert Kagan

Abstract Object-oriented software development utilizes new design methodologies. These methodologies can be supported by computer-aided software engineering tools, such as Rational Rose. A survey of software developers identifies the demand for various features, and reveals strengths and need for improvements in Rational Rose. Overall, respondents indicated that Rational Rose provides strong support for OO design, but could additional support for teamwork, prototyping, and improvements in ease of use.


Journal of Management Information Systems | 1999

A structural equation evaluation of CASE tools attributes

Gerald V. Post; Albert Kagan; Robert T. Keim

A latent variable approach to the evaluation of CASE tools is used to assess user needs and applications. Responses are consistent with the taxonomy of upper and lower CASE tools. Results indicate the importance of analysis and prototyping features. Some existing tools are rated significantly higher than others in terms of these features. The study also reveals a link between organizational size and the demand for upper and lower CASE tool features. Smaller organizations use CASE tools in the design stage and rely on teamwork and collaboration facilities. Larger firms focus on lower CASE facilities such as prototyping to build completed systems.


Information & Software Technology | 2003

Computer security and operating system updates

Gerald V. Post; Albert Kagan

Abstract Application and operating system errors are a continuing source of problems in computer security. As businesses increase the number of servers through distributed computing and server farms, it becomes more difficult to keep the systems up to date. A survey of security professionals reveals that most find it difficult to keep up to date with security patches. Consequently, developing more automated management tools is an important step in improving enterprise security.


Journal of Systems and Software | 2001

Database management systems: design considerations and attribute facilities

Gerald V. Post; Albert Kagan

Abstract Database management systems (DBMSs) form the foundation of most information systems. This study asked database developers and administrators to identify the features that are most important to them. The study finds that the features desired by respondents relate to query performance – particularly on complex queries. Respondents are also concerned about data integrity controls – particularly support for triggers, deadlock resolution, and control over data transaction logs. The study also provides insight into how respondents use the DBMS. Transaction processing and application development were primary factors. Distributed databases, administration, and general features were less important.


Communications of The ACM | 1999

How often should a firm buy new PCs

Gerald V. Post

A nyone who has purchased a PC in the last 10 years knows the two basic results: the day after you buy a computer the price will drop, and as soon as you choose a computer a faster model will be released. While these factors may seem painful at the time, we are consoled by noting we will be able to buy faster, cheaper machines next year. But the real crux of the problem is how often should a you buy a new computer and what level of machine should you purchase? Technological change and investment requirements driven by Moore’s Law create the patterns we observe. Several writers [2, 3, 4, 6] have examined and attempted to measure these trends. As managers recognize, we all face the consequence of these trends when we purchase a computer [1]. Should we wait? Should we buy a faster PC? Should we buy the cheapest computer available? The problem with answering these questions is that it is exceedingly difficult to estimate the need or demand for computers. Even on a broader scale, researchers have found it challenging to identify the business impact of computers and IT spending. The productivity debate illustrates these problems [5]. A fundamental result of the performance and price changes is that organizations have to buy new PCs every few years. A conse-


Electronic Government, An International Journal | 2010

Using re-voting to reduce the threat of coercion in elections

Gerald V. Post

Voter coercion, such as vote buying, has been minimised for decades with the private voting booth. Cellphone videos, absentee ballots, voter receipts and internet voting re-introduce the possibility of coercion because they are methods to prove a vote. This article presents a mathematical model of the voting process to show that giving voters the option to re-vote removes this proof because an observed vote is not necessarily final. Re-voting can also be used to spot threats such as viruses and Trojan horses that subvert voting machines. Re-voting mechanisms require cryptography techniques to separate user identifiers from votes cast, enabling the system to track votes by time without providing the specific identity of the user or the details of the vote cast. Mix-nets and homomorphic encryption provide the necessary tools.


Journal of Information Privacy and Security | 2014

Social Network Privacy: Trusting Friends

Gerald V. Post; Suzanne B. Walchli

Early social networks were generally open with minimal privacy controls. Some anecdotal evidence suggests that people might want more control over privacy on social networks. As an example of one response to this desire, the network Google+ was introduced as a major change by offering circles or groups to make it easier for users to share specific items with selected individuals. Building on earlier research that focuses primarily on trust in the web provider, this research model uses a social network as a function of privacy concerns and trust in contacts and tests the model using several groups of people. The model examines a personal need or desire for privacy, trust in friends, and attitudes towards social networks, and evaluates the impact of these variables on the usage of social networks. The results show that the demand for privacy and trust in friends does have direct impacts on the attitudes towards social networks. In addition, this network attitude in turn affects the rate of an individual’s usage of the networks. The results are applicable to any organization that includes social interactions on its site.


Journal of Computer Information Systems | 2016

Comparison of Database Management Systems

Gerald V. Post; Albert Kagan

This stuy surveyed database developers and administrators to evaluate existing DBMS products and identify the features that are most important to them. Oracle and IBM DB2 were rated higher than other competing products from a feature standpoint. Paradox was rated above other PC database tools. The most important features desired by users across all levels were the quality of the database engine and overall query performance - particularly on complex queries. Database products that did not exhibit a strong distributed database capability tended to be downgraded. Respondents also appear to want more sophisticated report and form tools.

Collaboration


Dive into the Gerald V. Post's collaboration.

Top Co-Authors

Avatar

Albert Kagan

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Robert T. Keim

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Kin-Nam Lau

The Chinese University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Thomas G. Whisenand

Shippensburg University of Pennsylvania

View shared research outputs
Researchain Logo
Decentralizing Knowledge