Sciweavers

235 search results - page 22 / 47
» hicss 2005
Sort
View
HICSS
2005
IEEE
134views Biometrics» more  HICSS 2005»
14 years 3 months ago
An Approach for Intent Identification by Building on Deception Detection
Past research in deception detection at the University of Arizona has guided the investigation of intent detection. A theoretical foundation and model for the analysis of intent d...
Judee K. Burgoon, Mark Adkins, John Kruse, Matthew...
HICSS
2005
IEEE
92views Biometrics» more  HICSS 2005»
14 years 3 months ago
Factors Affecting the Loyal Use of Knowledge Management Systems
This paper investigates the factors affecting the Loyal Use of a Knowledge Management System (KMS). Unlike most other types of information systems, the value from using a KMS is t...
Paul F. Clay, Alan R. Dennis, Dong-Gil Ko
HICSS
2005
IEEE
82views Biometrics» more  HICSS 2005»
14 years 3 months ago
To the Question "Does IT Matter?" Hollywood Answers "Yes"
Nicholas Carr’s question “Does IT Matter?”(to the maintenance of competitive advantage) has been applied to many industries but the one that depends on IT almost exclusively...
David A. Cook, Wenli Wang
HICSS
2005
IEEE
152views Biometrics» more  HICSS 2005»
14 years 3 months ago
Knowledge Ontology: A Method for Empirical Identification of 'As-Is' Contextual Knowledge
In this paper, we consider existing approaches to ontology definition and validation. Popular techniques include the use of domain experts or reliance on formal logic. We consider...
Theresa Edgington, T. S. Raghu, Ajay S. Vinze
HICSS
2005
IEEE
127views Biometrics» more  HICSS 2005»
14 years 3 months ago
Wholly Owned Offshore Subsidiaries for IT Development: A Program of Research
Information Technology (IT) offshore outsourcing is a non-reversible trend due to its cost implications, and as a result, target of much inquiry in different areas of knowledge. W...
J. Roberto Evaristo, Jorge Luis Nicolas Audy, Rafa...