Sciweavers

HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
14 years 3 months ago
Are There Contagion Effects in the Diffusion of IT Outsourcing?
Growth in the IT outsourcing industry during the past ten years has been exceptional. In this study, we theorize about and analyze the growth patterns of IT outsourcing at the leve...
Kunsoo Han, Robert J. Kauffman, Arti Mann, Barrie ...
HICSS
2009
IEEE
228views Biometrics» more  HICSS 2009»
14 years 3 months ago
Agents of Diffusion - Insights from a Survey of Facebook Users
In times of web 2.0 and its strong focus on user interaction in business models, entrepreneurs and investors of internet businesses often back up their ambitious growth expectatio...
Rebecca Ermecke, Philip Mayrhofer, Stefan Wagner
HICSS
2009
IEEE
178views Biometrics» more  HICSS 2009»
14 years 3 months ago
Applying Multi-Layered Analysis Framework on the Public Sector ICT Provision: An Illustration from a Municipal Wireless Network
As technology develops, local governments are increasingly becoming involved in providing municipal wireless service. However, many obstacles exist in municipal wireless provision...
Myungjae Kwak, Thomas A. Horan, Hana Oh
HICSS
2009
IEEE
123views Biometrics» more  HICSS 2009»
14 years 3 months ago
Health Information Service Adoption: Case of Telemedicine
Health Information Services deal with repository, retrieval and make use of medical information in order to improve service quality and reduce cost. Medical staff, administrative ...
Umit Topacan, Nuri Basoglu, Tugrul U. Daim
HICSS
2009
IEEE
104views Biometrics» more  HICSS 2009»
14 years 3 months ago
Second Life as a Medium for Lecturing in College Courses
Second Life is an online virtual world that is gaining popularity in academic institutions as an alternative means for collaborative and distance education. However, the number of...
Daniel C. Cliburn, Jeffrey L. Gross
HICSS
2009
IEEE
92views Biometrics» more  HICSS 2009»
14 years 3 months ago
Task Behaviors During Web Search: The Difficulty of Assigning Labels
By examining searcher behavior on a large search engine, we have identified seven basic kinds of task behaviors that can be observed in web search session logs. In the studies rep...
Daniel M. Russell, Diane Tang, Melanie Kellar, Rob...
HICSS
2009
IEEE
167views Biometrics» more  HICSS 2009»
14 years 3 months ago
E-Commerce and E-Government: How Do They Compare? What Can They Learn from Each Other?
For more than a decade e-Commerce and eGovernment applications have made major impacts in their respective sectors, private and public. Some time ago, we presented early insights ...
Hans Jochen Scholl, Karine Barzilai-Nahon, Jin-Hyu...
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
14 years 3 months ago
Agile Principles and Ethical Conduct
Software practitioners experience pressure to compromise their work and their reasonable care for others. Even as software becomes more beneficial, pervasive, and interconnected, ...
Ken H. Judy
HICSS
2009
IEEE
112views Biometrics» more  HICSS 2009»
14 years 3 months ago
Optimal Pumping Schedule and Salinity Control in a Coastal Aquifer: a Decision Support System
Proper management of coastal wells is important in order to satisfy demand, minimize costs, control salinity increase, and ultimately to define water resource strategies which are...
T. Ka'eo Duarte, Riccardo Minciardi, Michela Robba...
HICSS
2009
IEEE
104views Biometrics» more  HICSS 2009»
14 years 3 months ago
Celebrating Diversity in Volunteer Computing
The computing resources in a volunteer computing system are highly diverse in terms of software and hardware type, speed, availability, reliability, network connectivity, and othe...
David P. Anderson, Kevin Reed