Sciweavers

HICSS
2009
IEEE
150views Biometrics» more  HICSS 2009»
14 years 2 months ago
An N-Gram Based Approach to Automatically Identifying Web Page Genre
The research reported in this paper is the first phase of a larger project on the automatic classification of web pages by their genres, using ngram representations of the web pag...
Jane E. Mason, Michael A. Shepherd, Jack Duffy
HICSS
2009
IEEE
155views Biometrics» more  HICSS 2009»
14 years 2 months ago
Explaining the Continuous Use of Social Virtual Worlds: An Applied Theory of Planned Behavior Approach
Social virtual worlds (SVWs) have become increasingly popular spaces for social interaction. To be attractive to engage with, maintaining a sufficient base of active users is a si...
Jani Merikivi, Matti Mäntymäki
HICSS
2009
IEEE
119views Biometrics» more  HICSS 2009»
14 years 2 months ago
Information Sharing at National Borders: Extending the Utility of Border Theory
Research has identified the potential and challenges of information sharing in government settings mostly within the context of a single country. The challenges facing inter-gover...
Celene Navarrete, Sehl Mellouli, Theresa A. Pardo,...
HICSS
2009
IEEE
111views Biometrics» more  HICSS 2009»
14 years 2 months ago
The Impact of Social Support of Guild Members and Psychological Factors on Flow and Game Loyalty in MMORPG
The objective of this study is to identify the relationships in which social support influences flow and game loyalty through character control, character identity, guild identity...
Juseon Kang, Ilsang Ko, Yunjung Ko
HICSS
2009
IEEE
88views Biometrics» more  HICSS 2009»
14 years 2 months ago
Can National E-Government Standards Find Acceptance?
In recent years many national e-government standards have been developed. Even though the definition of such standards may be a necessary condition for the creation of interoperab...
Daniel Veit, Nils P. Parasie
HICSS
2009
IEEE
165views Biometrics» more  HICSS 2009»
14 years 2 months ago
Studying Knowledge Management System Success in System Administration
Significant temporal and monetary costs are associated with the development and implementation of a knowledge management system (KMS). To justify this investment, it is important ...
Nicole F. Velasquez, Alexandra Durcikova, Rajiv Sa...
HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
14 years 2 months ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung
HICSS
2009
IEEE
179views Biometrics» more  HICSS 2009»
14 years 2 months ago
Understanding Continuance Intention of Knowledge Creation in Online Communities from a Social-Psychological Perspective
Grounded on both social cognitive theory and expectation-disconfirmation theory (EDT), this study aims to investigate how individuals’ continuance intention of knowledge creatio...
Shih-Wei Chou, Ching-Chang Lee, Yu-Chieh Chang, Ch...
HICSS
2009
IEEE
114views Biometrics» more  HICSS 2009»
14 years 2 months ago
Reexamining Threat Rigidity: Implications for Design
Emergencies today seem larger, more complex, and unique than those of the past. Responding to them requires flexibility and creativity not easily achieved. The threat-rigidity the...
Linda Plotnick, Murray Turoff, Gerd Van Den Eede
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
14 years 2 months ago
Integrated Patient Health Information Systems to Improve Traffic Crash Emergency Response and Treatment
This research explores how a wide range of automobile crash, emergency responder, hospital, and trauma information could be useful to emergency medical practitioners for making de...
Benjamin L. Schooley, Thomas A. Horan, Michael Mar...