Sciweavers

635 search results - page 105 / 127
» Social Aspects of Information Security
Sort
View
ECIS
2004
13 years 8 months ago
An ethnographic study of IS investment appraisal
Both academics and practitioners have invested considerably in the information systems evaluation arena, yet rewards remain elusive. The aim of this paper is to provide rich insig...
Debra Howcroft, Robert McDonald
EJIS
2006
132views more  EJIS 2006»
13 years 7 months ago
Enacting new temporal boundaries: the role of mobile phones
This paper examines how the use of mobile phones influences the temporal boundaries that people enact in order to regulate and coordinate their work and non-work activities. We in...
Elpida Prasopoulou, Athanasia Pouloudi, Niki Pante...
IIE
2008
188views more  IIE 2008»
13 years 6 months ago
Exploring Individual and Collaborative Dimensions of Knowledge Building in an Online Learning Community of Practice
Abstract. An exploratory study of students' engagement in online learning and knowledge building is presented in this paper. Learning in an online community, composed of stude...
Lina Markauskaite, Louise M. Sutherland
JAIHC
2010
147views more  JAIHC 2010»
13 years 5 months ago
Agents and ambient intelligence: case studies
The significance that ambient intelligence (AmI) has acquired in recent years requires the development of innovative solutions. In this sense, the development of AmI-based systems...
Dante I. Tapia, Ajith Abraham, Juan M. Corchado, R...
JUCS
2010
154views more  JUCS 2010»
13 years 5 months ago
An Ambient Assisted Living Platform Integrating RFID Data-on-Tag Care Annotations and Twitter
: Although RFID is mainly used to identify objects whose data can then be accessed over the network, passive HF RFID tags do have significant data storage capacity (up to 4K), whic...
Diego López-de-Ipiña, Ignacio D&iacu...