Sciweavers

HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
14 years 2 months ago
Which collaboration patterns are most challenging: A global survey of facilitators
Facilitation is a key success factor for effective Group Support Systems (GSS) applications. The development of effective support for facilitation becomes more critical than ever ...
Mariëlle den Hengst, Mark Adkins
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
14 years 2 months ago
Language Networks on LiveJournal
Language use in 1,000 randomly-selected and 5,025 crawled LiveJournals was analyzed in order to determine the overall language demographics, the robustness of four non-English lan...
Susan C. Herring, John C. Paolillo, Irene Ramos-Vi...
HICSS
2007
IEEE
99views Biometrics» more  HICSS 2007»
14 years 2 months ago
Delta Hedging Energy Portfolios: an Exploratory Study
1 Delta hedging, although widely used in commodity markets, needs to be further adapted to electricity markets. Given the extreme volatility of electricity prices, even a portfolio...
Richard Goldberg, James Read, Art Altman, Remi Aud...
HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
14 years 2 months ago
Redefining and Measuring Virtual Work in Teams: An Application of Social Network Analysis
For several decades organizational researchers have explored the practice of using electronic technology to communicate when team members work physically apart from each other. Ye...
Priscilla Arling
HICSS
2007
IEEE
126views Biometrics» more  HICSS 2007»
14 years 2 months ago
Does Visualization Affect Perceptions of Ethically Complex Policy Decisions: An Experimental Study
Visualization as a communication medium is an important factor when considering how individuals are influenced in a decision about a complex policy issue. Age, race and gender may...
Deirdre Hahn, Rick Shangraw, Mark Keith, David H. ...
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
14 years 2 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood
HICSS
2007
IEEE
93views Biometrics» more  HICSS 2007»
14 years 2 months ago
Managing Citizen Relationships in Disasters: Hurricane Wilma, 311 and Miami-Dade County
As recent events have shown, effective knowledge sharing has become important at all political levels, especially when disasters occur. In this paper, we present the case of Miami...
Alexander Schellong, Thomas Langenberg
HICSS
2007
IEEE
181views Biometrics» more  HICSS 2007»
14 years 2 months ago
A Methodology to Evaluate Agent Oriented Software Engineering Techniques
Systems using Software Agents (or Multi-Agent Systems, MAS) are becoming more popular within the development mainstream because, as the name suggests, an Agent aims to handle task...
Chia-En Lin, Krishna M. Kavi, Frederick T. Sheldon...
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
14 years 2 months ago
e-Government in Transition Countries: Prospects and Challenges
The implementation of e-government is a challenging task in any developed political context, but all the more uniquely so in the post-communist transitioning countries. These coun...
Mysore Ramaswamy, Audrey N. Selian