Stuart Madnick
#8,149
Most Influential Person Now
American academic
Stuart Madnick's AcademicInfluence.com Rankings
Stuart Madnickbusiness Degrees
Business
#126
World Rank
#142
Historical Rank
#71
USA Rank
Management
#51
World Rank
#55
Historical Rank
#29
USA Rank
Download Badge
Business
Stuart Madnick's Degrees
- Bachelors Mathematics City College of New York
Similar Degrees You Can Earn
Why Is Stuart Madnick Influential?
(Suggest an Edit or Addition)According to Wikipedia, Stuart E. Madnick is an American computer scientist, and professor of information technology at the MIT Sloan School of Management and the Massachusetts Institute of Technology school of engineering. He is the director of Cybersecurity at MIT Sloan , formerly called the MIT Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity .
Stuart Madnick's Published Works
Published Works
- Software Project Dynamics: An Integrated Approach (1991) (800)
- Overview and Framework for Data and Information Quality Research (2009) (428)
- Context interchange: new features and formalisms for the intelligent integration of information (1999) (402)
- Data quality requirements analysis and modeling (2011) (247)
- Representing and reasoning about semantic conflicts in heterogeneous information systems (1997) (219)
- Context interchange: overcoming the challenges of large-scale interoperable database systems in a dynamic environment (2015) (202)
- A Polygen Model for Heterogeneous Database Systems: The Source Tagging Perspective (1990) (199)
- The inter-database instance identification problem in integrating autonomous systems (1989) (196)
- Lessons learned from modeling the dynamics of software development (1989) (194)
- A Metadata Approach to Resolving Semantic Conflicts (2011) (191)
- A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet (2018) (132)
- Application and analysis of the virtual machine approach to information system security and isolation (1973) (110)
- Improving data quality through effective use of data semantics (2006) (104)
- The Context Interchange mediator prototype (1997) (93)
- Why Not One Big Database? Principles for Data Ownership (1995) (90)
- Special Section: Assuring Information Quality (2004) (88)
- Discovering and reconciling value conflicts for numerical data integration (2001) (85)
- Context Knowledge Representation and Reasoning in the Context Interchange System (2015) (84)
- Information integration using contextual knowledge and ontology merging (2003) (78)
- GLOBAL e-READINESS - for WHAT? (2003) (78)
- Special Feature: Impact of Schedule Estimation on Software Project Behavior (1986) (77)
- Seizing the Opportunity: Exploiting Web Aggregation (2001) (75)
- A Cubic Framework for the Chief Data Officer: Succeeding in a World of Big Data (2014) (75)
- Context interchange: sharing the meaning of data (1991) (75)
- Technological Forecasting – A Review (2008) (69)
- Measuring Data Believability: A Provenance Approach (2007) (65)
- Health Care and Cybersecurity: Bibliometric Analysis of the Literature (2018) (64)
- The Camaleon Web Wrapper Engine (2000) (60)
- Institutional and ad hoc DSS and their effective use (1977) (58)
- Decision-Making and Biases in Cybersecurity Capability Development: Evidence from a Simulation Game Experiment (2017) (57)
- The Camélón Web Wrapper Engine (2000) (57)
- Meta-Data Jones and the Tower of Babel: The Challenge of Large-Scale Semantic Heterogeneity (1999) (56)
- Global e-readiness—for what? Readiness for e-banking (2005) (56)
- Data Integration Using Web Services (2002) (54)
- The Design and Implementation of a Corporate Householding Knowledge Processor to Improve Data Quality (2003) (53)
- The Strategic use of information technology (1987) (53)
- An information product approach for total information awareness (2002) (49)
- The Context Interchange Network Prototype (1995) (49)
- Institutions for Cyber Security: International Responses and Global Imperatives (2014) (47)
- A pattern-based approach to protocol mediation for web services composition (2010) (47)
- From VLDB to VMLDB (Very MANY Large Data Bases): Dealing with Large-Scale Semantic Heterogenity (1995) (45)
- Knowledge Integration to Overcome Ontological Heterogeneity: Challenges from Financial Information Systems (2002) (44)
- Discovering and Reconciling Semantic Conflicts: A Data Mining Perspective (1997) (43)
- Financial Information Integration in the Presence of Equational Ontological Conflicts (2002) (42)
- Source Attribution for Querying Against Semi-structured Documents (1998) (41)
- Evolution towards Strategic Applications of Databases through Composite Information Systems (1988) (40)
- Corporate Household Data: Research Directions (2001) (39)
- Asymmetric information distances for automated taxonomy construction (2009) (39)
- Data and Information Quality Research: Its Evolution and Future (2014) (38)
- A Procedure for Mediation of Queries to Sources in Disparate Contexts (1997) (38)
- The dynamics of software project scheduling (1983) (38)
- Facilitating connectivity in composite information systems (1989) (37)
- Systematically Understanding the Cyber Attack Business (2018) (37)
- Using System Dynamics to Model and Better Understand State Stability (2007) (36)
- Measuring Innovation Using Bibliometric Techniques: The Case of Solar Photovoltaic Industry (2009) (36)
- Total Data Quality Management (TDQM) Research Program (2001) (36)
- Schema integration using metadata (1989) (36)
- Agile Project Dynamics: A System Dynamics Investigation of Agile Software Development Methods (2014) (35)
- Editorial for the Inaugural Issue of the ACM Journal of Data and Information Quality (JDIQ) (2009) (35)
- Are we moving toward an information superhighway or a Tower of Babel? The challenge of large-scale semantic heterogeneity (1996) (34)
- Identifying and Anticipating Cyberattacks That Could Cause Physical Damage to Industrial Control Systems (2019) (34)
- The Misguided Silver Bullet: What XML will and will NOT do to help Information Integration (2001) (33)
- Software development using agile and scrum in distributed teams (2017) (33)
- Information Aggregation - A Value-added E-Service (2001) (32)
- Centralizing Data Management with Considerations of Uncertainty and Information-Based Flexibility (2013) (31)
- Management policies and procedures needed for effective computer security. (1978) (31)
- A modular approach to file system design (1969) (30)
- On the portability of quantitative software estimation models (2015) (30)
- A framework for technology forecasting and visualization (2009) (30)
- Improving the Quality of Corporate Household Data: Current Practices and Research Directions (2001) (30)
- Database Machine Architecture in the Context of Information Technology Evolution (1977) (29)
- The Composite Information System Laboratory (CISL) Project at MIT (1990) (29)
- The elusive silver lining: how we fail to learn from failure in software development (2011) (29)
- The Internet of Things Promises New Benefits and Risks: A Systematic Analysis of Adoption Dynamics of IoT Products (2019) (28)
- Homophily and the Speed of Social Mobilization: The Effect of Acquired and Ascribed Traits (2014) (28)
- An Active Conceptual Model for Fixed Income Securities Analysis for Multiple Financial Institutions (1998) (28)
- Context Interchange as a Scalable Solution to Interoperating Amongst Heterogeneous Dynamic Services (2004) (27)
- CISL : composing answers from disparate information systems (1989) (27)
- Bibliometric Analysis of Distributed Generation (2009) (27)
- Information integration with attribution support for corporate profiles (1999) (26)
- Understanding & Modeling State Stability: Exploiting System Dynamics (2006) (25)
- Conceptualizing Semantic Interoperability: A Perspective From the Knowledge Level (1996) (25)
- Reconciling Semantic Heterogeneity in Web Services Composition (2009) (24)
- Integrating information from global systems: Dealing with the "on- and off-ramps"; of the information superhighway (1995) (24)
- A Lightweight Ontology Approach to Scalable Interoperability (2006) (24)
- Context Mediation in the Semantic Web: Handling OWL Ontology and Data Disparity Through Context Interchange (2004) (23)
- DIRECT: a system for mining data value conversion rules from disparate data sources (2002) (23)
- A Microcomputer-Based Image Database Management System (2015) (22)
- INFOPLEX: hierarchical decomposition of a large information management system using a microprocessor complex (1975) (22)
- Systematically Understanding the Cyber Attack Business: A Survey (2018) (22)
- A Source Tagging Theory for Heterogeneous Database Systems (1990) (22)
- Dynamic analysis of combat vehicle accidents (2009) (21)
- An Approach to Composing Web Services with Context Heterogeneity (2009) (21)
- Propeties of storage hierarchy systems with multiple page sizes and redundant data (1979) (21)
- A Cyclic-Hierarchical Method for Database Data-Quality Evaluation and Improvement (2014) (21)
- Integration technology: The reinvention of the linkage between information systems and computer science (1995) (20)
- Software productivity: Potential, actual, and perceived (1989) (20)
- String processing techniques (1967) (20)
- A framework of composite information systems for strategic advantage (2015) (20)
- Effective data integration in the presence of temporal semantic conflicts (2004) (19)
- Editors’ Comments: ACM Journal of Data and Information Quality (JDIQ) is alive and well! (2010) (19)
- Trends in Computers and Computing: The Information Utility (1977) (19)
- Multi-Dimensional Ontology Views Via Contexts in the Ecoin Semantic Interoperability Framework (2005) (19)
- Semantic Integration Approach to Efficient Business Data Supply Chain: Integration Approach to Interoperable XBRL (2007) (18)
- A Conceptual Model for Integrated Autonomous Processimg: am International Bank's Experience with Large Databases (2018) (18)
- Global Comparison Aggregation Services (2002) (18)
- General Strategy for Querying Web Sources in a Data Federation Environment (2009) (17)
- Hierarchical Approach to Computer System Integrity (1975) (17)
- A Context-Based Approach to Reconciling Data Interpretation Conflicts in Web Services Composition (2013) (17)
- Reasoning About Temporal Context Using Ontology and Abductive Constraint Logic Programming (2004) (17)
- Exemplifying Business Opportunities for Improving Data Quality from Corporate Household Research (2004) (17)
- Incorporating Generalized Quantifiers Into Description Logic For Representing Data Source Contents (1997) (16)
- An Economic Analysis of Policies for the Protection and Reuse of Noncopyrightable Database Contents (2008) (16)
- Context mediation on Wall Street (1998) (16)
- Comparison of generality based algorithm variants for automatic taxonomy generation (2009) (16)
- Framework for the Analysis of the Adaptability, Extensibility, and Scalability of Semantic Information Integration and the Context Mediation Approach (2009) (15)
- Semantic distances for technology landscape visualization (2012) (15)
- Knowledge representation architecture for context interchange mediation: fixed income securities investment examples (2001) (15)
- Motivating Strategic Alliance for Composite Information Systems: The Case of a Major Regional Hospital (1989) (15)
- Putting IT all together before it falls apart (1993) (15)
- Integrating disparate databases for composite answers (2015) (14)
- Hierarchical database decomposition: a technique for database concurrency control (1983) (14)
- A Framework for Corporate Householding (2002) (14)
- Logical connectivity : applications, requirements, and an architecture (1988) (14)
- Process Aggregation Using Web Services (2002) (14)
- Contextual alignment of ontologies in the eCOIN semantic interoperability framework (2006) (14)
- THE INTERPLAY OF WEB AGGREGATION AND REGULATIONS (2002) (13)
- Cross-Organizational Data Quality and Semantic Integrity: Learning and Reasoning about Data Semantics with Context Interchange Mediation (2001) (13)
- The Interplay of Web Aggregation and Regulation (2002) (13)
- Effective information integration and reutilization: solutions to technological deficiency and legal uncertainty (2005) (13)
- STORAGE HIERARCHY SYSTEMS (1973) (13)
- Information Aggregation Using the Caméléon# Web Wrapper (2005) (13)
- Good answers from bad data : a data management strategy (1995) (13)
- Surviving and Thriving in the New World of Web Aggregators (2000) (13)
- Multi-processor software lockout (1968) (12)
- Semantic Information Integration in the Large: Adaptability, Extensibility, and Scalability of the Context Mediation Approach (2005) (12)
- Understanding the Dynamics of Service-Oriented Architecture Implementation (2015) (12)
- INFOPLEX: Research in a High-Performance Database Computer (2011) (12)
- Measuring Stakeholders' Perceptions of Cybersecurity for Renewable Energy Systems (2016) (12)
- Privacy and Security of Data Communications and Data Bases (1978) (12)
- An architectural comparison of contemporary apporaches and products for integrating heterogeneous information systems (1989) (11)
- Finding new uses for information (2009) (11)
- Developing a Global Data Breach Database and the Challenges Encountered (2021) (11)
- Poster: Diversity or Concentration? Hackers’ Strategy for Working Across Multiple Bug Bounty Programs (2016) (11)
- The Internet of Things (IoT) Promises New Benefits — And Risks: A Systematic Analysis of Adoption Dynamics of IoT Products (2017) (11)
- Preventing Accidents and Building a Culture of Safety: Insights from a Simulation Model (2008) (11)
- Enabling Global Price Comparison through Semantic Integration of Web Data (2007) (11)
- Effects of Funding Fluctuations on Software Development: A System Dynamics Analysis (2016) (11)
- Experiences and Challenges with using CERT Data to Analyze International Cyber Security (2009) (11)
- A Survey of Methods for Data Inclusion in System Dynamics Models (2014) (10)
- Virtual machine advantages in security, integrity, and decision support systems [Authors' response] (1976) (10)
- Blockchain Isn’t as Unbreakable as You Think (2019) (10)
- SCRIPT, An On-Line Manuscript Processing System (1968) (9)
- Composite information systems : resolving semantic heterogeneities (1991) (9)
- Scalable Interoperability Through the Use of COIN Lightweight Ontology (2005) (9)
- A Model of Software Project Management Dynamics (2011) (9)
- Context Interchange Mediation for Semantic Interoperability and Dynamic Integration of Autonomous Information Sources in the Fixed Income Securities Industry (2002) (9)
- A Case Study of the Capital One Data Breach (2020) (9)
- Ideas for the future of the IS field (2010) (9)
- Semantic interoperability in the fixed income securities industry: a knowledge representation architecture for dynamic integration of Web-based information (2003) (8)
- Improving Data Quality for Web Services Composition (2009) (8)
- A Unified Approach for Taxonomy-based Technology Forecasting (2014) (8)
- Contextual Alignment of Ontologies for Semantic Interoperability (2004) (8)
- DESIGN STRATEGIES FOR FILE SYSTEMS (1970) (8)
- Semantic interoperability through context interchange : representing and reasoning about data conflicts in heterogeneous and autonomous systems (2003) (8)
- Institutional Foundations for Cyber Security: Current Responses and New Challenges (2014) (8)
- Future Artificial Intelligence Requirements For Intelligent Database Systems - Panel Report (1988) (8)
- Identification and reconciliation of semantic conflicts using metadata (1989) (8)
- Knowledge-Based Integrated Information Systems Development Methodologies Plan. Volume 2. (1987) (7)
- Oh, so That Is What You Meant! The Interplay of Data Quality and Data Semantics (2003) (7)
- Global E-Readiness - for What? Readiness for E-Banking (Jitd) (2004) (7)
- Financial Information Mediation: A Case Study of Standards Integration for Electronic Bill Presentment and Payment Using the COIN Mediation Technology (2004) (7)
- Technology Forecasting Using Data Mining and Semantics: First Annual Report (2009) (7)
- Information integration for counter terrorism activities: requirements for context mediation (2004) (7)
- Semantic interoperability in the securities industry: context interchange mediation of semantic differences in enumerated data types (2002) (7)
- SPARQL Query Mediation over RDF Data Sources with Disparate Contexts (2012) (7)
- Context interchange in a client-server architecture (1994) (7)
- An application of a generalized management information system to energy policy and decision making: the user's view (1975) (7)
- Varieties of public–private co-governance on cybersecurity within the digital trade: implications from Huawei’s 5G (2021) (7)
- Understanding & Modeling State Stability: Exploiting System Dynamics (PCAS Final Report) (2005) (7)
- Effect of Media Usage Selection on Social Mobilization Speed: Facebook vs E-Mail (2015) (6)
- What is Cybersecurity? Explorations in Automated Knowledge Generation (2012) (6)
- A Polygen Data Model for data source tagging in Composite Information Systems (1989) (6)
- Cyber Safety : A Systems Theory Approach to Managing Cyber Security Risks – Applied to TJX Cyber Attack (2016) (6)
- Data Analytics for Renewable Energy Integration (2014) (6)
- Representation and Reasoning About Changing Semantics in Heterogeneous Data Sources (2004) (6)
- Structured Contexts with Lightweight Ontology (2006) (6)
- Using Systems Analysis to Improve Traffic Safety (2010) (6)
- Virtual information in data-base systems (2018) (6)
- Beyond Keywords: Tracking the Evolution of Conversational Clusters in Social Media. (2019) (6)
- Integrating territories: information systems integration & territorial rationality (2011) (6)
- One size does not fit all: legal protection for non-copyrightable data (2009) (6)
- Data Analytics for Renewable Energy Integration: Informing the Generation and Distribution of Renewable Energy (2017) (5)
- A System Theoretic Approach to Cybersecurity Risk Analysis and Mitigation for Autonomous Passenger Vehicles (2018) (5)
- Process Aggregation using Web Services (WSeBT) (2002) (5)
- Ontologies, contexts, and mediation : representing and reasoning about semantics conflicts in heterogeneous and autonomous systems (2003) (5)
- Perspectives on the effective use, planning, and impact of information technology (1987) (5)
- Beyond Keywords: Tracking the Evolution of Conversational Clusters in Social Media (2019) (5)
- Data Quality: A Critical Research Issue for the 1990s and Beyond (1994) (5)
- Casting the Dark Web in a New Light: A Value-Chain Lens Reveals a Growing Cyber Attack Ecosystem and New Strategies for Combating It. (2019) (5)
- A Case Study of Electronic Bill Presentment and Payment (Ebpp) Integration Using the Coin Mediation Technology (2005) (5)
- SecureUse: Balancing Security and Usability Within System Design (2016) (5)
- Forecasting and Visualization of Renewable Energy Technologies Using Keyword Taxonomies (2014) (5)
- A Taxonomy for Classifying Commercial Approaches to Information Integration in Heterogeneous Environments (1990) (4)
- The Challenge--to be Part of the Solution Instead of Being the Problem (2015) (4)
- Cybersafety: A System-Theoretic Approach to Identify Cyber-Vulnerabilities & Mitigation Requirements in Industrial Control Systems (2022) (4)
- Explorations in Cyber International Relations (ECIR) - Data Dashboard Report #1: CERT Data Sources and Prototype Dashboard System (2009) (4)
- Corporate Household Knowledge Processing: Challenges, Concepts, and Solution Approaches (2001) (4)
- Framework for Understanding Cybersecurity Impacts on International Trade (2019) (4)
- E-Aggregation: The Present and Future of Online Financial Services in Asia-Pacific (2002) (4)
- Reconciliation of temporal semantic heterogeneity in evolving information systems (2009) (4)
- House of Security: Locale, Roles and Resources for Ensuring Information Security (2006) (4)
- The Voice of the Customer: Innovative and Useful Research Directions (Panel) (1993) (4)
- A Systematic Framework to Understand Transnational Governance for Cybersecurity Risks from Digital Trade (2021) (4)
- Software projects: Pedagogical aids for software education and research (1977) (4)
- Data Analytics for Renewable Energy Integration (2015) (4)
- Information technology platform for the 1990's (1989) (4)
- Asynchronous Backup and Initialization of a Database Server for Replicated Database Systems (2003) (4)
- Evaluating and Aggregating Data Believability across Quality Sub-Dimensions and Data Lineage (2007) (4)
- E-commerce bargain-hunting with an unBun model (1999) (4)
- Comparative Analysis of Cybersecurity Metrics to Develop New Hypotheses (2012) (4)
- Effect of Funding Fluctuations on Government Funded Software Development (2012) (3)
- Cyber Securing Cross-border Financial Services: Calling for a Financial Cybersecurity Action Task Force (2020) (3)
- LEGAL CHALLENGES AND STRATEGIES FOR COMPARISON SHOPPING AND DATA REUSE (2010) (3)
- Simulation Studies of the DSH-11 Data Storage Hierarchy System. (1979) (3)
- Ownership Principles for Distributed Database Design (1993) (3)
- Identifying and Mitigating Cyber Attacks that could cause Physical Damage to Industrial Control Systems (2017) (3)
- Cybersafety Approach to Cybersecurity Analysis and Mitigation for Mobility-as-a-Service and Internet of Vehicles (2021) (3)
- Interactions Between Cybersecurity and International Trade: A Systematic Framework (2018) (3)
- Exemplifying Business Opportunities From Corporate Household Research (2003) (3)
- Using Semantic Web Tools for Context Interchange (2007) (3)
- Towards better understanding Cybersecurity: Or are "Cyberspace" and "Cyber Space" the same? (2014) (3)
- Protecting the Force: Reducing Combat Vehicle Accidents via Improved Organizational Processes (2007) (3)
- The House of Security: Stakeholder Perceptions of Security Assessment and Importance (2007) (3)
- Policy for the Protection and Reuse of Non-Copyrightable Database Contents (2005) (3)
- Discovering and Reconciling Value Conflicts for Data Integration (2001) (3)
- Sloan School of Management Working Paper 4294-02 CISL WP # 02-13 October 2002 A Framework for Corporate Householding (2002) (3)
- ' How Much Information ? ' Case Studies on Scientific Research at MIT (2011) (3)
- Editors’ Comments Where the JDIQ Articles Come From: Incubating Research in an Emerging Field (2009) (3)
- Measuring and Predicting Speed of Social Mobilization (2013) (3)
- Latent Semantic Analysis Applied to Tech Mining (2009) (3)
- A systematic approach to the design of complex systems : application to DBMS design and evaluation (2003) (3)
- Analyzing the Interplay Between Regulatory Compliance and Cybersecurity (2020) (3)
- Editorial: In Search of Novel Ideas and Solutions with a Broader Context of Data Quality in Mind (2011) (3)
- Studying the Tension Between Digital Innovation and Cybersecurity (2017) (3)
- An approach to information system isolation and security in a shared facility (1973) (2)
- An Exercise in Software Architectural Design: From Requirements to Design Problem Structure. (1977) (2)
- Cybersafety Analysis of a Central Utilities Plant (CUP) Gas Turbine using STPA-SEC (2018) (2)
- Parallel on-the-fly reading of an entire database copy (2001) (2)
- The IMS Data Storage Hierarchy - DSH-11. (1979) (2)
- Understanding the Organizational Traps in Implementing Net-Centric Systems (2012) (2)
- Research Initiative to Understand & Model State Stability: Exploiting System Dynamics (2005) (2)
- A systematic methodology for designing the architecture of complex software systems. (1979) (2)
- Revised Selected Papers of the Third ECML PKDD Workshop on Data Analytics for Renewable Energy Integration - Volume 9518 (2015) (2)
- Data quality in internet time, space, and communities (panel) (2000) (2)
- Approach and Preliminary Results for Early Growth Technology Analysis (2009) (2)
- A FRAMEWORK FOR CORPORATE HOUSEHOLDING (Research-in-Progress) (2002) (2)
- Predictors of Social Mobilization Speed (2013) (2)
- Analysis Techniques for Use with the Extended SDM Model. (1979) (2)
- Editorial Notes Classification and Assessment of Large Amounts of Data: Examples in the Healthcare Industry and Collaborative Digital Libraries (2011) (2)
- Evolution towards strategic applications of very large data bases through composite information systems (1987) (2)
- How Do You Prepare for the Unexpected Cyber Attack? (2020) (2)
- Computer Security (1979) (2)
- Digital Business (2015) (2)
- RECENT RESEARCH RESULTS ON THE INFOPLEX INTELLIGENT MEMORY SYSTEM (IMS) PROJECT (1981) (2)
- A Study of the Multicache-Consistency Problem in Multi-Processor Computer Systems (1981) (2)
- Context Mediation Demonstration of Counter-Terrorism Intelligence Integration (2005) (2)
- Analyzing the Interplay Between Regulatory Compliance and Cybersecurity (Revised) (2020) (2)
- Does High Cybersecurity Capability Lead to Openness in Digital Trade? The Mediation Effect of E-Government Maturity (2021) (2)
- Reutilization and Legal Protection of Non-Copyrightable Database Contents (2006) (2)
- Connectivity Among Information Systems (2015) (2)
- Laboratory for Information Globalization and Harmonization Technologies: A New Research Initiative (2001) (2)
- Institutional and Ad-Hoc Decision Support Systems and Their Effective Use (2011) (1)
- Cybersafety Analysis of Industrial Control Systems: Chiller Systems (Revised) (2020) (1)
- Call for Papers Special Issue on Healthcare Information Quality: the Challenges and Opportunities in Healthcare Systems and Services (2009) (1)
- A Systematic Study of the Control Failures in the Equifax Cybersecurity Incident (2020) (1)
- A Graph-Decomposition Method Based on the Density-Contour Clustering Model (1983) (1)
- Improving UccNet-compliant B2B Supply-chain Applications Using a Context Interchange Framework (2004) (1)
- A Polygen Model for Developing Heterogeneous Database Systems With Source Tagging Capabilities (1990) (1)
- Hierarchical timestamping algorithm (2015) (1)
- Data Analytics for Renewable Energy Integration: Third ECML PKDD Workshop, DARE 2015, Porto, Portugal, September 11, 2015 (2016) (1)
- Querying Web-Sources within a Data Federation (2006) (1)
- SPARQL Query Mediation for Data Integration (2012) (1)
- Modeling the Dynamics of Software Project Management (2011) (1)
- Linkage Between Pre-and Post-Conflict: Exploiting Information Integration & System Dynamics (2005) (1)
- 1 A Lightweight Ontology Approach to Scalable Interoperability (2006) (1)
- Shifting Timestamps for Concurrency Control in an Information Hierarchy (1988) (1)
- Performance Evaluation of the INFOPLEX Database Computer Using Operational Analysis. (1981) (1)
- Health Care and Cybersecurity: Bibliometric Analysis of the Literature (Preprint) (2018) (1)
- Object-Oriented Approach to Integrating Database Semantics. Volume 4. (1987) (1)
- Comparison of Approaches for Gathering Data from the Web for Technology Trend Analysis (2008) (1)
- A System Dynamics Exploration of Agency Theory Interpretations of ERP Acquisition Methods in DOD (2015) (1)
- Cybersafety: A System-theoretic Approach to Identify Cyber-vulnerabilities & Mitigations in Industrial Control Systems (2019) (1)
- Using System Dynamics to Analyze the Effect of Funding Fluctuation on Software Development (2013) (1)
- Performance Analysis of Multi-Microprocessor Systems (1987) (1)
- Implementing the COntext INterchange (COIN) Approach through Use of Semantic Web Tools (2008) (1)
- Understanding Complexity: Dynamic Analysis of Combat Vehicle Accidents (2007) (1)
- An Extended Model for a Systematic Approach to the Design of Complex Systems. (1978) (1)
- Cyber Securing Cross-border Financial Services: Calling for a Financial Cybersecurity Action Task Force (Revised) (2020) (1)
- LIGHTS: Laboratory for Information Globalization and Harmonization Technologies and Studies (2003) (1)
- Bursting a few balloons regarding the famous DARPA red balloon challenge (2022) (1)
- Incorporating Generalized Quantifiers into Description Logic to Improve Source Selection (2001) (1)
- Research Plan to Analyze the Role of Compliance in Influencing Cybersecurity in Organizations (2019) (1)
- Data security and data processing (2003) (1)
- Reconciling Protocol Mismatches of Web Services by Using Mediators (2009) (1)
- To Standardize Enterprise Data or Not? An Economic Analysis of Flexibility versus Control (2012) (1)
- Composite Information Systems: A New Concept in Information Systems (2018) (1)
- Editorial Letter for the Special Issue on Data Quality in Databases and Information Systems (2009) (1)
- Identifying and Anticipating Cyber Attacks that could cause Physical Damage to Industrial Control Systems (2019) (1)
- Towards Ontological Context Mediation for Semantic Web Database Integration : Translating COIN Ontologies Into OWL (2004) (1)
- A Framework for Investigating GDPR Compliance Through the Lens of Security (2021) (1)
- Technical Opinions Regarding Knowledge-Based Integrated Information Systems Engineering. Volume 8. (1987) (1)
- Modeling multiprocessor computer systems with unbalanced flows (1986) (1)
- Blockchain Is Unbreakable? Think Again (2019) (1)
- Convergence and divergence of regulatory compliance and cybersecurity (2021) (1)
- MIT Sloan School of Management (2003) (1)
- Cyber-safety Analysis of an Industrial Control System for Chillers using STPA-Sec (2019) (1)
- System Dynamics Modeling for Pro-Active Intelligence (PAINT) (2009) (1)
- Recent technical advances in the computer industry and their future inmpact (1973) (1)
- Tackling Cybersecurity Regulatory Challenges: A Proposed Research Framework (2020) (1)
- Applying the Lessons from the Equifax Cybersecurity Incident to Build a Better Defense (2021) (1)
- Queueing Network Systems with Unbalanced Flows and Their Applications to Performance Evaluation of Highly Parallel Distributed Information Systems. Revision. (1984) (1)
- A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned (2022) (1)
- Working from Home can be Fun … or Scary! Don’t Become Little Red Riding Hood (2020) (0)
- Reconciling Equational Heterogeneity Within a Data Federation (2009) (0)
- Exploring Terms and Taxonomies Relating to the Cyber International Relations Research Field: or are "Cyberspace" and "Cyber Space" the same? (2012) (0)
- Like ‘The Force,’ 5G Has a Dark Side (Actually Several) (2020) (0)
- The COntext INterchange (COIN) Project: Data Extraction and Interpretation from Semi-Structured Web Sources (1998) (0)
- Evaluation of Application of Ontology and Semantic Technology for Improving Data Transparency and Regulatory Compliance in the Global Financial Industry (2015) (0)
- ITWO Total Assets : “ 313776 ” of what ? (2011) (0)
- Knowledge Representation Archtecture for Context Interchange Mediation : Fixed Income Securities Investment Examples Paper 109 (2001) (0)
- TO ENERGY POLICY AND DECISION MAKING: THE USER'S VIEW (1975) (0)
- Time Slice Manipulation in Information Hierarchy (2011) (0)
- Aggregators : The New Businesses Travelling the " Fast Lane " on the Information Highway (1999) (0)
- The Economics of Software Quality Assurance: A System Dynamics Based Simulation Approach (2014) (0)
- The Evolution of Cyber Security Norm Development in The Digital Age (2021) (0)
- Message from the Incoming Chairman (1978) (0)
- Asynchronous Reading of Consistent Copy of a Large Database (2010) (0)
- DIRECT : disovering [sic] and reconciling conflicts for data integration (1998) (0)
- Towards an Understanding of theCrowdsourcing Activities (2015) (0)
- Americas Conference on Information Systems ( AMCIS ) December 2001 Corporate Household Data : Research Directions (2017) (0)
- Corporate Householding: Framework, Applications Areas and Knowledge Processor (2003) (0)
- The Came 61 on Web Wrapper Engine (0)
- To appear in Data Base Facilitating Connectivity in Composite information Systems (0)
- Improving National and Homeland Security Through Context Knowledge Representation and Reasoning Technologies (2006) (0)
- An Approach to Constructing Functional Requirement Statements for System Architectural Design. (1978) (0)
- Use of Virtual Machines in the Development of Decision Support Systems. (1979) (0)
- BIG Data Must Overcome BIG Data Quality Challenges (2012) (0)
- Decision Making and Biases in Cybersecurity Capability Development : Evidence from a Simulation Game Experiment August 2017 (2017) (0)
- Protecting Chiller Systems from Cyberattack Using a Systems Thinking Approach (2022) (0)
- Integrating Distributed Homogeneous and Heterogeneous Databases: Prototypes. Volume 3. (1987) (0)
- MIS Quarterly Executive MIS Quarterly Seizing the Opportunity: Exploiting Web Aggregation Seizing the Opportunity: Exploiting Web Aggregation (2020) (0)
- Laboratory for Information Globalization and Harmonization (2002) (0)
- Massachusetts Institute of Technology Engineering Systems Division Working Paper Series ESD-WP-2009-16 A FRAMEWORK FOR TECHNOLOGY FORECASTING AND VISUALIZATION (2009) (0)
- Working Paper Alfred P. Sloan School of Management a Metadata Approach to Resolving Semantic Conflicts a Metadata Approach to Resolving Semantic Conflicts a Metadata Approach to Resolving Semantic Conflicts (2008) (0)
- Working Paper Alfred P. Sloan School of Management a Metadata Approach to Resolving Semantic Conflicts a Metadata Approach to Resolving Semantic Conflicts a Metadata Approach to Resolving Semantic Conflicts (2008) (0)
- 6^stwtnt@bullet Nov 12 1987 ^ Modeling the Dynamics of Software Project Management Cisrwpno. 163 Modeling the Dynamics of Software Project Management Cisrwpno. 163 Tts-vii*^ ^^rim '\ L\w Rtce^gl Modeling the Dynftmics of Software Project Management (0)
- PRIVACY AND ITS TECHNICAL IMPLICATIONS ON SECURITY (1979) (0)
- Improving Data Quality Through Effective Use of Data Semantics (Dke) (2005) (0)
- An Economic Analysis of Policies for the Protection and Reuse of Non-Copyrightable Database (2008) (0)
- Impact ofSchedule Estimation onSoftware (1986) (0)
- Paradigm Shift 2001: What Will We Teach Business Majors as the Technology Becomes Invisible? (1992) (0)
- Working Paper Alfred P. Sloan School of Management Data Quality Requirements Analysis and Modeling Data Quality Requirements Analysis and Modeling (2008) (0)
- Joint Research on Understanding the Challenges to Net-Centric Systems and Mitigating Approaches Progress Report November 1 , 2010 through December 31 , 2011 (2010) (0)
- Integrating images, applications, and communications networks. Volume 5. Final report, September 1986-January 1988 (1987) (0)
- Cybersafety Analysis of Industrial Control Systems: Chiller Systems (2020) (0)
- Selected papers of the workshop on Information technologies and systems (1995) (0)
- Seizing the Opportunity : Exploiting Web Aggregation Paper 144 (2002) (0)
- Session details: DBMS implementation experience (1980) (0)
- VLDB Endowment Board of Trustees (2007) (0)
- Bibliometric Analysis of Distributed Generation Paper 255 (2009) (0)
- Working Paper Alfred P. Sloan School of Management Connectivity among Information Systems Connectivity M10ng Information Systems Connectivity among Information Systems (2008) (0)
- TDflO DOM TEA QTb (2008) (0)
- Experiences and Challenges with using CERT Data to Analyzes (2009) (0)
- Cyberspace Operations Functional Capability Reference Architecture from Document Text (2020) (0)
- Where Does the Data Come From: Managing Data Integration With Source Tagging Capabilities (2015) (0)
- Enabling Technologies for Organizational Learning (2010) (0)
- Key Concerns of Executives Making Is Decisions Key Concerns of Executives Making Is Decisions (0)
- UNDERSTAND & MODEL STATE STABILITY: EXPLOITING SYSTEM DYNAMICS (2005) (0)
- The Intelligent Memory System Architecture - Research Directions. (1979) (0)
- The Dynamics of Service Oriented Architecture ( SOA ) Implementation (2011) (0)
- Title : Effect of Media Usage Selection on Social Mobilization Speed : Facebook vs Email (2014) (0)
- Strategic, Organizational and Standardization Aspects of Integrated Information Systems. Volume 6. (1987) (0)
- The Interplay of Web Aggregation and Regulations (LawTech) (2002) (0)
- Call for Papers Special Issue on Entity Resolution (2010) (0)
- Social Networking Business Continuum: Customer Information Drivers Meet Technology Enablers (2015) (0)
- Association for Information Systems AIS Electronic Library ( AISeL ) All Sprouts Content Sprouts 9-16-2011 Understanding Organizational Traps in Implementing Service-Oriented Architecture (2017) (0)
- I { Hd28 Ho Sit Virtual Machines a Concept That Has Comparative Advafjtages in Security, Integrity, and in Decision Support Systems Virtual Machines a Concept That Has Comparative Advafltages in Security, Integrity, and in Decision Support Systems By (0)
- Data Provenance and Believability in the Semantic Web (2010) (0)
- Improving National and Homeland Security Through a Proposed Laboratory for Information Globalization and Harmonization Technologies (Light) (2004) (0)
- Operating system security a tutorial of current research (1978) (0)
- Data Analytics for Renewable Energy Integration. Technologies, Systems and Society (2018) (0)
- An Examination of Software Tool Features Needed to Help Secure Energy Delivery Industrial Control Systems (2019) (0)
- Infoplex Data Base Computer Architecture: Concepts and Directions (2011) (0)
- The evolution of global cybersecurity norms in the digital age: A longitudinal study of the cybersecurity norm development process (2023) (0)
- Blockchain Hype: Irrational Exuberance Redux (2019) (0)
- A Microcomputer-based Image Database Management Systenri a Microcomputer-based Image Database Management System / a Microcomputer-based Image Database Management System (0)
- An Integrative Approach to Modeling the Software Management Process: A Basis for Identifying Problems and Evaluating Tools and Techniques (2015) (0)
- Addressing the Challenges of Aggregational and Temporal Ontological Heterogeneity (2005) (0)
- The Next Global Financial Crisis Could Be Caused by Efforts to Prevent the Cyberattack (2020) (0)
- OPERATING SYSTEM SECURITY (1979) (0)
- The Ethics of AI: What Does AI Do When Humans Cannot Agree What Is ‘Right’? (2019) (0)
- Knowledge-Based Integrated Information Systems Engineering: Highlights and Bibliography. Volume 1. (1987) (0)
- Completing the requirements set as a means towards better design frameworks: A follow-up exercise in software architectural design. (1977) (0)
- Towards a management framework for data semantic conflicts : a financial applications perspective (2003) (0)
- Integrating Information Systems in a Major Decentralized International Organization. Volume 7. (1987) (0)
- Management of Computing Lessons L . earned (1999) (0)
- Regulatory Facilitators and Impediments Impacting Cybersecurity Maturity (2022) (0)
- Facilities Orientation Report, Volume II. Trip Reports, (1975) (0)
- Global Comparison Aggregation Services ( Web 2002 ) (2004) (0)
- Implementing message oriented transaction processing for distributed database management systems (2011) (0)
- Analysis of Cross-Border Data Trade Restrictions Using Mixture-Based Clustering (2019) (0)
- Cybersecurity for Global Medical Device Supply Chain: The U.S. Fda's Role (2019) (0)
- Ms-il Working Paper Time Slice Iianipulation in Information Hierarchy Time Slice Manipulation in Information Hierarchy (2008) (0)
- 1 Structured Contexts with Lightweight Ontology (2006) (0)
- Information Aggregation Using the Cameleon# Web Wrapper (2005) (0)
- Efforts to Prevent Cyber Attacks Could be the Cause of the Next Global Financial Crisis (2020) (0)
- Design of a General Hierarchical Storage System (2011) (0)
- Facilities Orientation Report, Volume I. A Survey of Naval Tactical Computer Applications and Executives, (1975) (0)
- A TYPOLOGY FOR CORPORATE HOUSEHOLDING PROBLEMS (2002) (0)
- A GLOBAL QUERY PROCESSING IN COMPOSITE INFORMATION SYSTEMS (1989) (0)
- Semantic distances for technology landscape visualization (2011) (0)
- EB A GGREGATION 1 Executive Summary (2002) (0)
- Context Interchange: Using Knowledge About Data to Integrate Disparate Sources. (1999) (0)
- Cybersafety Analysis of Industrial Control System for Gas Turbines (2019) (0)
- System Dynamics: Applied to Modeling the Dynamics of Software Project Management and State Stability (2007) (0)
- Decision Making in Cybersecurity Capability Development: Evidence from a Simulation Game Experimen (2018) (0)
- Linkage Between Pre-and Post-Conflict : Exploiting Information Integration & System Dynamics Paper 215 (2004) (0)
- Global Compar ison Aggregation Services (2002) (0)
- 4946-09 Bibliometric Analysis of Distributed Generation (2011) (0)
- Financial Information Mediation: A Case Study of Standards Integration for Electronic Bill Presentment and Payment (Ebpp) Using the Coin Mediation Technology (2004) (0)
- Virtual Machines: A Concept That Has Comparative Advantages in Security, Integrity, and in Decision Support Systems (2015) (0)
- Evolution to Very MANY Large Data Bases : dealing with large-scale semantic heterogeneity (2003) (0)
- Query Mediation for Data Integration (2011) (0)
- Querying Web-Sources within a Data Federation Web-based Information Systems and Applications (2006) (0)
- Research plan for semantics-enabled technology forecasting: A case study on alternative energies (2007) (0)
- Explorations in Cyberspace and International Relations Challenges , Investigations , Analysis , Results (2015) (0)
- Panel: Information and knowledge sharing - Successes and failures (2003) (0)
- Exploring Terms and Taxonomies Relating to the "Cyber Space" Research Field (2010) (0)
- SEIZING THE OPPORTUNITY : EXPLOITING WEB AGGREGATION 1 Executive Summary (2002) (0)
- System Dynamics Modeling for Proactive Intelligence (2010) (0)
- A SYSTEMATIC APPROACH TO TIE DESIGN OF COMPLEX SYSTEMS : APPLICATION TO DBMS DESIGN AND EVALUATION (1977) (0)
- A Survey of Navy Tactical Computer Applications and Executives: Report of a Study By (2015) (0)
- A Mediation Architecture for Global Comparison Services (2009) (0)
- Do You Have Password Headaches? You Are Not Alone, and It Is Unnecessary! (2020) (0)
- Data and Information Quality Research (2013) (0)
This paper list is powered by the following services:
Other Resources About Stuart Madnick
What Schools Are Affiliated With Stuart Madnick?
Stuart Madnick is affiliated with the following schools: