Showing 1 - 2 of 2
The ubiquity of digital technology and the increasing amount of data stored in organizational IT systems make cybersecurity a critical issue to many businesses. To harden their systems against data breaches, companies have started to use bug bounty programs to involve outsiders in helping to...
Persistent link: https://www.econbiz.de/10014087593
This paper draws from graph theory to develop an approach for modeling empirical research processes. The proposed approach is based on minimal assumptions about empirical research, which makes it intendedly agnostic of any particular method or field of study. I merely assume that empirical...
Persistent link: https://www.econbiz.de/10014087607