Sciweavers

HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 1 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
HICSS
2007
IEEE
144views Biometrics» more  HICSS 2007»
14 years 1 months ago
Automatic Web Page Categorization using Principal Component Analysis
Today’s search engines retrieve tens of thousands of web pages in response to fairly simple query articulations. These pages are retrieved on the basis of the query terms occurr...
Richong Zhang, Michael A. Shepherd, Jack Duffy, Ca...
HICSS
2007
IEEE
113views Biometrics» more  HICSS 2007»
14 years 1 months ago
Understanding Changes in Consumer Payment Habits - Do Mobile Payments and Electronic Invoices Attract Consumers?
Mobile payment services have, thus far, failed to entice consumers. An apparent conclusion is that these services have failed to meet consumers’ payment needs. Deeper understand...
Tomi Dahlberg, Anssi Öörni
HICSS
2007
IEEE
72views Biometrics» more  HICSS 2007»
14 years 1 months ago
What Motivates Voluntary Engagement in Cooperative Information Systems
Firms invest heavily to develop on-line cooperative systems in the hope of creating unique value in the minds of their customers. However, when system use begins to decline, firms...
James B. Freedman
HICSS
2007
IEEE
192views Biometrics» more  HICSS 2007»
14 years 1 months ago
An Online Community as a New Tribalism: The World of Warcraft
Massive, multiplayer online role-playing games foster rich social environments. Within the game, players can interact with other players, make friends, create and cultivate new on...
Thomas W. Brignall III, Thomas L. Van Valey
HICSS
2007
IEEE
79views Biometrics» more  HICSS 2007»
14 years 1 months ago
User-Based Evaluations of Search Engines: Hygiene Factors and Motivation Factors
In cyberspace, the emergence and increasing importance of search engine prompts numerous evaluation studies in regard to its effectiveness. Based on a user-oriented perspective, t...
Ya-Lan Chuang, Ling-Ling Wu
HICSS
2007
IEEE
148views Biometrics» more  HICSS 2007»
14 years 1 months ago
A Survey of B2B Methodologies and Technologies: From Business Models towards Deployment Artifacts
Abstract— In recent years business-to-business (B2B) ecommerce has been subject to major rethinking. A paradigm shift from document centric file-based interchange of business in...
Jürgen Dorn, Christoph Grün, Hannes Wert...
HICSS
2007
IEEE
157views Biometrics» more  HICSS 2007»
14 years 1 months ago
E-Government Evaluation: Reflections On Three Organisational Case Studies
The deployment of e-Government continues at a significant cost and pace in the worldwide public sector. An important area of research is that of the evaluation of e-Government. In...
Stephen Jones, Zahir Irani, Amir M. Sharif
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
14 years 1 months ago
Decision Support in Health Care via Root Evidence Sampling
— Bayesian networks play a key role in decision support within health care. Physicians rely on Bayesian networks to give medical treatment, generate what-if scenarios, and other ...
Benjamin B. Perry, Eli Faulkner
HICSS
2007
IEEE
108views Biometrics» more  HICSS 2007»
14 years 1 months ago
Addressing IT Security for Critical Control Systems
— Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. In this environment, the risk...
Martin Naedele