Sciweavers

209 search results - page 17 / 42
» hicss 2009
Sort
View
HICSS
2009
IEEE
213views Biometrics» more  HICSS 2009»
14 years 2 months ago
AURUM: A Framework for Information Security Risk Management
—As companies are increasingly exposed to a variety of information security threats, they are permanently forced to pay attention to security issues. Risk management provides an ...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
14 years 2 months ago
The Effect of Piracy on Markets for Consumer Transmutation Rights
We have shown in a previous study that selling content-transmutation rights to consumers increases total surplus of both producers and consumers of digital products. Our results w...
Karl Reiner Lang, Richard D. Shang, Roumen Vragov
HICSS
2009
IEEE
105views Biometrics» more  HICSS 2009»
14 years 2 months ago
Note Taking and Note Sharing While Browsing Campaign Information
Participants were observed while searching and browsing the internet for campaign information in a mock-voting situation in three online note-taking conditions: No Notes, Private ...
Scott P. Robertson, Ravi K. Vatrapu, George Abraha...
HICSS
2009
IEEE
125views Biometrics» more  HICSS 2009»
14 years 2 months ago
Employee Adoption of Corporate Blogs: A Quantitative Analysis
A new form of computer mediated communication that promises to revolutionize the way organizations communicate is internal corporate blogs. However, the academic literature on thi...
Sunil Wattal, Pradeep Racherla, Munir Mandviwalla
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
14 years 2 months ago
Experimental Evaluation of Wiki Technology and the Shaper Role in Rapid Interdisciplinary Requirements Negotiation
The challenges driven by multi-culture, multidiscipline stakeholders collaborating in a rapidly changing global environment necessitates an easily approachable mechanism for negot...
Di Wu, Da Yang, Supannika Koolmanojwong, Barry W. ...