Sciweavers

102 search results - page 9 / 21
» A study of information systems outsourcing risks
Sort
View
ICDM
2010
IEEE
157views Data Mining» more  ICDM 2010»
13 years 5 months ago
Privacy Violations Using Microtargeted Ads: A Case Study
In this paper we propose a new class of attacks that exploit advertising systems offering microtargeting capabilities in order to breach user privacy. We study the advertising syst...
Aleksandra Korolova
FSKD
2006
Springer
298views Fuzzy Logic» more  FSKD 2006»
13 years 11 months ago
Risk Assessment of E-Commerce Projects Using Evidential Reasoning
The purpose of this study is to develop a decision making system to evaluate the risks in E-Commerce (EC) projects. Competitive software businesses have the critical task of assess...
Rashid Hafeez Khokhar, David A. Bell, Jiwen Guan, ...
HICSS
2007
IEEE
183views Biometrics» more  HICSS 2007»
14 years 1 months ago
Rescuing Small and Medium-Sized Enterprises from Inefficient Information Systems - A Multi-disciplinary Method for ERP System Re
Enterprise resource planning (ERP) systems integrate companies’ multiple information systems and help adapt best practices for business processes. ERP systems are in most cases ...
Inka Vilpola, Ilkka Kouri, Kaisa Vään&au...
IOR
2008
128views more  IOR 2008»
13 years 7 months ago
Promised Lead-Time Contracts Under Asymmetric Information
We study the important problem of how a supplier should optimally share the consequences of demand uncertainty (i.e., the cost of inventory excesses and shortages) with a retailer...
Holly Lutze, Özalp Özer
HICSS
2005
IEEE
83views Biometrics» more  HICSS 2005»
14 years 27 days ago
Predicting the Usage of P2P Sharing Software: The Role of Trust and Perceived Risk
Peer-to-Peer, or P2P sharing has gone through fast growth in recent years and drawn the interests of Information Systems (IS) researchers. However, there is a lack of empirical st...
Heng Xu, Hao Wang, Hock-Hai Teo