Sciweavers

209 search results - page 30 / 42
» hicss 2009
Sort
View
HICSS
2009
IEEE
109views Biometrics» more  HICSS 2009»
14 years 2 months ago
The Construction of Peers and Artifacts: The Organizing Role of "Programming Guidelines"
In this paper, we1 study new organizational forms for production processes that emerge in large scale Free/Libre Open Source Software (FLOSS) projects. We will focus on the textua...
Vincenzo D'Andrea, Stefano De Paoli, Maurizio Teli
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
14 years 2 months ago
Making it Hard to Lie: Cultural Determinants of Media Choice for Deception
In today’s business environment, deception is commonplace. In hiring situations, successful deception by job candidates can lead to a poor fit between the candidate’s abilitie...
Christopher P. Furner, Joey F. George
HICSS
2009
IEEE
104views Biometrics» more  HICSS 2009»
14 years 2 months ago
Second Life as a Medium for Lecturing in College Courses
Second Life is an online virtual world that is gaining popularity in academic institutions as an alternative means for collaborative and distance education. However, the number of...
Daniel C. Cliburn, Jeffrey L. Gross
HICSS
2009
IEEE
122views Biometrics» more  HICSS 2009»
14 years 2 months ago
Applying a ThinkLet- and ThinXel-Based Group Process Modeling Language: A Prototype of a Universal Group Support System
Group Support Systems (GSS) can improve the productivity of Group Work by offering a variety of tools to assist a virtual group across geographical distances. Experience shows tha...
Stefan Werner Knoll, Martin Hörning, Graham H...
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
14 years 2 months ago
A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication Interfaces
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Bogdan Hoanca, Kenrick J. Mock