Sciweavers

232 search results - page 43 / 47
» hicss 2008
Sort
View
HICSS
2008
IEEE
122views Biometrics» more  HICSS 2008»
14 years 2 months ago
A Meta-theory for Understanding IS in Socio-technical Systems
Information systems (IS) research often attempts to examine and explain how technology leads to outcomes through usage of information technology (IT). Although extensive research ...
Dominic M. Thomas, Saurabh Gupta, Robert P. Bostro...
HICSS
2008
IEEE
237views Biometrics» more  HICSS 2008»
14 years 2 months ago
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
HICSS
2008
IEEE
114views Biometrics» more  HICSS 2008»
14 years 2 months ago
The Factors that Affect the Implementation Success of IS
How to implement an IS (information system) successfully remains a problem. To address this, drawing on information processing theory, this study proposes an integrated model that...
Shih-Wei Chou, Mong-Young He, Pi-Yi Chen
HICSS
2008
IEEE
121views Biometrics» more  HICSS 2008»
14 years 2 months ago
An Integrated Architecture for Demand Response Communications and Control
1 In the competitive electricity structure, demand response programs enable customers to react dynamically to changes in electricity prices. The implementation of such programs ma...
Michael LeMay, Rajesh Nelli, George Gross, Carl A....
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
14 years 2 months ago
Can a P2P File-Sharing Network Become an e-Marketplace?
The prevalence of P2P technology contributes the ease of file-sharing, but it also brings some problems such as free-riding and copyright infringement. To solve these problems, ma...
Fu-ren Lin, Hau-ming Lo, Cong-ren Wang