Sciweavers

235 search results - page 16 / 47
» hicss 2005
Sort
View
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
14 years 3 months ago
Establishing and Structuring Criteria for Measuring Knowledge Management Efforts
Establishing criteria for knowledge management is an imperative aspect of management as it helps determine results. Our research indicated that widely-accepted criteria and perfor...
Vittal S. Anantatmula, Shivraj Kanungo
HICSS
2005
IEEE
140views Biometrics» more  HICSS 2005»
14 years 3 months ago
On Contamination in Information Ecosystems
1 On the Internet, digitally active small and medium sized enterprises (SME) face numerous security risks. When SMEs join networks, business ideas and malicious activities may inte...
Bengt Carlsson, Andreas Jacobsson
HICSS
2005
IEEE
188views Biometrics» more  HICSS 2005»
14 years 3 months ago
Consumer Search Behavior in Online Shopping Environments
This paper explores search behavior of online shoppers. Information economics literature suggests that search cost in electronic markets has essentially been reduced to zero as co...
Nanda Kumar, Karl Reiner Lang, Qian Peng
HICSS
2005
IEEE
149views Biometrics» more  HICSS 2005»
14 years 3 months ago
Organizational Culture and the Performance of Critical Infrastructure: Modeling and Simulation in Socio-Technological Systems
Civil infrastructures are vital elements of a nation’s physical well-being and quality of life because modern economies rely on the services these systems provide to move goods,...
Richard G. Little
HICSS
2005
IEEE
127views Biometrics» more  HICSS 2005»
14 years 3 months ago
Elephant: Network Intrusion Detection Systems that Don't Forget
Modern Network Intrusion Detection Systems (NIDSs) maintain state that helps them accurately detect attacks. Because most NIDSs are signature-based, it is critical to update their...
Michael G. Merideth, Priya Narasimhan