Sciweavers

209 search results - page 29 / 42
» hicss 2009
Sort
View
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
14 years 2 months ago
EM Enforcing Information Flow Properties using Compensating Events
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...
Thoshitha T. Gamage, Bruce M. McMillin
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
14 years 2 months ago
Information Security: User Precautions, Attacker Efforts, and Enforcement
We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
Ivan P. L. Png, Qiu-Hong Wang
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 2 months ago
Using Knowledge Management Systems to Structure Knowledgeable Practices
The purpose of this study is to explore the role of knowledge management systems (KMS) in structuring knowledgeable practices within organizations. Specifically, we consider how i...
Chad Saunders, Mike Chiasson
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
14 years 2 months ago
A Systematic Approach to Improve Communication for Emergency Response
The importance of communication, information sharing and interoperability in an emergency response scenario have risen recently based on the frequency of disasters throughout the ...
Raheleh B. Dilmaghani, Ramesh R. Rao
HICSS
2009
IEEE
111views Biometrics» more  HICSS 2009»
14 years 2 months ago
The Impact of Social Support of Guild Members and Psychological Factors on Flow and Game Loyalty in MMORPG
The objective of this study is to identify the relationships in which social support influences flow and game loyalty through character control, character identity, guild identity...
Juseon Kang, Ilsang Ko, Yunjung Ko