Sciweavers

490 search results - page 70 / 98
» A framework for information system usage in collaborative ca...
Sort
View
HICSS
1999
IEEE
183views Biometrics» more  HICSS 1999»
13 years 12 months ago
Extending the Technology Acceptance Model to Account for Social Influence: Theoretical Bases and Empirical Validation
The Technology Acceptance Model (TAM) represents an important theoretical contribution toward understanding IS usage and IS acceptance behaviors [6, 19]. However, as noted by seve...
Yogesh Malhotra, Dennis F. Galletta
CIKM
2008
Springer
13 years 9 months ago
Tag-geotag correlation in social networks
This paper presents an analysis of the correlation of annotated information unit (textual) tags and geographical identification metadata geotags. Despite the increased usage of ge...
Sang Su Lee, Dongwoo Won, Dennis McLeod
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
14 years 1 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
IADIS
2004
13 years 9 months ago
SPERO - A Personalized Integrated E-Learning System
One of the most important topics in modern Internet-based multimedia e-learning systems oriented towards teachers, students and learners in general, is the treatment of informatio...
Paraskevi K. Tzouveli, Phivos Mylonas, Stefanos D....
MOBISYS
2003
ACM
14 years 7 months ago
System Services for Ad-Hoc Routing: Architecture, Implementation and Experiences
This work explores several system issues regarding the design and implementation of routing protocols for ad-hoc wireless networks. We examine the routing architecture in current ...
Vikas Kawadia, Yongguang Zhang, Binita Gupta