Sciweavers

235 search results - page 8 / 47
» hicss 2005
Sort
View
HICSS
2005
IEEE
191views Biometrics» more  HICSS 2005»
14 years 3 months ago
Collaboration in Context-Aware Mobile Phone Applications
Context-aware applications are expected to become a remarkable application area within future mobile computing. As mobile phones form a natural tool for interaction between people...
Jonna Häkkilä, Jani Mäntyjärvi
HICSS
2005
IEEE
141views Biometrics» more  HICSS 2005»
14 years 3 months ago
Factors Impacting Customers' Initial Trust in E-Businesses: An Empirical Study
Developing customers’ initial trust in e-businesses is critical for many online vendors, especially for startup companies. As an effort to understand initial trust in the busine...
Euijin Kim, Suresh Tadisina
HICSS
2005
IEEE
107views Biometrics» more  HICSS 2005»
14 years 3 months ago
Beyond Personal Webpublishing: An Exploratory Study of Conversational Blogging Practices
Although initially developed as low-threshold tools to publish on-line, weblogs increasingly appear to facilitate conversations. The objective of this study is to identify practic...
Lilia Efimova, Aldo de Moor
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
14 years 3 months ago
Secure Dynamic Source Routing
— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...
HICSS
2005
IEEE
128views Biometrics» more  HICSS 2005»
14 years 3 months ago
How to Overcome the Knowledge Paradox: Activate Knowledge Identity, Not Just Organize Information
A paradox appears to thwart traditional knowledge sharing efforts in organizations: the greater the benefit of a piece of knowledge to an organization the less likely that it will...
Sajda Qureshi, Peter Keen