Sciweavers

HICSS
2010
IEEE
235views Biometrics» more  HICSS 2010»
14 years 6 months ago
Knowledge Sourcing from Repositories: The Role of System Characteristics and Autonomy
Organizations invest in the development of knowledge repositories (KR) to foster knowledge reuse and integration. Yet many KR initiatives fail to meet expectations, in part becaus...
Alexandra Durcikova, Kelly J. Fadel
HICSS
2010
IEEE
208views Biometrics» more  HICSS 2010»
14 years 6 months ago
Using Personality Factors to Predict Interface Learning Performance
This current study explored the impact of individual differences in personality factors on interface interaction and learning performance in both an interactive visualization and ...
Tera Marie Green, Dong Hyun Jeong, Brian Fisher
HICSS
2010
IEEE
162views Biometrics» more  HICSS 2010»
14 years 6 months ago
A Cyberinfrastructure Framework for Comparative Effectiveness Research in Healthcare
Omar F. El-Gayar, Surendra Sarnikar, Matthew J. Wi...
HICSS
2010
IEEE
154views Biometrics» more  HICSS 2010»
14 years 6 months ago
The Effects of Perceived Visual Aesthetics on Process Satisfaction in GSS Use
Although group support systems (GSS) can potentially have tremendous impacts in helping to solve the challenges faced by organizations and societies today, research to date has pr...
Alex Ivanov, Christoph Schneider
HICSS
2010
IEEE
130views Biometrics» more  HICSS 2010»
14 years 6 months ago
On the Reliability of Software Piracy Statistics
Despite tremendous debate and policy interest in software piracy, the accuracy of piracy statistics compiled by the Business Software Alliance (BSA) has been accepted at face valu...
Ivan P. L. Png
HICSS
2010
IEEE
180views Biometrics» more  HICSS 2010»
14 years 6 months ago
Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity
Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While m...
Craig A. Shue, Minaxi Gupta
HICSS
2010
IEEE
276views Biometrics» more  HICSS 2010»
14 years 6 months ago
Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices
This paper provides insight into the ramifications of battery exhaustion Denial of Service (DoS) attacks on battery-powered mobile devices. Several IEEE 802.11 Wi-Fi, IEEE 802.15....
Benjamin R. Moyers, John Paul Dunning, Randolph Ma...
HICSS
2010
IEEE
153views Biometrics» more  HICSS 2010»
14 years 6 months ago
Reorganizing Projects through Enterprise System: Emerging Role of Enterprise System in Radical Organizational Change
In this paper we analyze the role of Enterprise System (ES) in shaping a company’s transformation process by conducting an in-depth case study in a large European high-tech comp...
Merja Mattila, Joe Nandhakumar, Petri Hallikainen,...
HICSS
2010
IEEE
231views Biometrics» more  HICSS 2010»
14 years 6 months ago
Evaluation Framework for Personal Health Records: Microsoft HealthVault Vs. Google Health
Personal health records (PHR) is a technology for managing the information playing field in healthcare. With multiple vendors competing on this relatively new market, an evaluatio...
Ali Sunyaev, Dmitry Chornyi, Christian Mauro, Helm...
HICSS
2010
IEEE
162views Biometrics» more  HICSS 2010»
14 years 6 months ago
Modeling the Impact of Increasing PHEV Loads on the Distribution Infrastructure
Numerous recent reports have assessed the adequacy of current generating capacity to meet the growing electricity demand from Plug-in Hybrid Electric Vehicles (PHEVs) and the pote...
Chris Farmer, Paul Hines, Jonathan Dowds, Seth Blu...