Sciweavers

2270 search results - page 174 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
105
Voted
HICSS
2008
IEEE
90views Biometrics» more  HICSS 2008»
15 years 10 months ago
Antecedents to E-File Adoption: The U.S. Perspective
One of congress’ goals for 2007 was for 80% of all tax and informational returns to be filed electronically [9]. However, to date that lofty goal has fallen well short. This res...
Lemuria Carter, Ludwig Christian Schaupp, Allison ...
112
Voted
HICSS
2007
IEEE
113views Biometrics» more  HICSS 2007»
15 years 10 months ago
Does Interpersonal Trust Also Matter? Exploring the Role of Trust in Successful IT Outsourcing
Recently, the focus of IT outsourcing has been shifting from the “what” and “why” issues to “how” companies manage outsourcing process, during which the relationship m...
Qi Cong, Patrick Y. K. Chau
138
Voted
CIKM
2008
Springer
15 years 5 months ago
Towards a model of understanding social search
Search engine researchers typically depict search as the solitary activity of an individual searcher. In contrast, results from our critical-incident survey of 150 users on Amazon...
Brynn M. Evans, Ed H. Chi
130
Voted
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
15 years 9 months ago
A Marketing Model for Mobile Wireless Services
: 1 Invaluable feedback from HIICS referees is gratefully acknowledged. Mobile data services integrate handheld and Internet technologies to create new value propositions (Keen and...
A. Lee Gilbert, Jon D. Kendall
127
Voted
CSE
2009
IEEE
15 years 10 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...