Sciweavers

1776 search results - page 65 / 356
» Informational cascades in IT adoption
Sort
View
ECWEB
2004
Springer
177views ECommerce» more  ECWEB 2004»
14 years 3 months ago
Analysis of Mobile Business Processes for the Design of Mobile Information Systems
Abstract. The adoption of mobile technologies into companies frequently follows a technology -driven approach without precise knowledge about the potential benefits that may be rea...
André Köhler, Volker Gruhn
HICSS
2002
IEEE
110views Biometrics» more  HICSS 2002»
14 years 2 months ago
An Empirical Exploration of Mass Interaction System Dynamics: Individual Information Overload and Usenet Discourse
The large-scale adoption of computer mediated communication technologies has resulted in what has been described as “mass interaction”, shared discourse between hundreds, thou...
Quentin Jones, Gilad Ravid, Sheizaf Rafaeli
I3E
2003
72views Business» more  I3E 2003»
13 years 11 months ago
Reducing Normative and Informative Asymmetries in Fiscal Management for Local Administrations
: Fiscal incomes are vital for Governments, both for central and local agencies, therefore on-line fiscal services will play a key role in the e-Government perspective. The creatio...
M. Carducci, Mario A. Bochicchio, Antonella Longo
ICIS
2003
13 years 11 months ago
A Computational Approach to Compare Information Revelation Policies
Revelation policies in an e-marketplace differ in terms of the level of competitive information disseminated to participating sellers. Since sellers who repeatedly compete against...
Amy R. Greenwald, Karthik Kannan, Ramayya Krishnan
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 10 months ago
Compromising Tor Anonymity Exploiting P2P Information Leakage
Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war be...
Pere Manils, Chaabane Abdelberri, Stevens Le-Blond...