- In this paper we investigate techniques offered by current object-oriented development methods for the specification of the user-system dialogue aspect of a software system. Curr...
- Anyone familiar with the German IS research culture would expect to find numerous action researchers in Germany. However, a closer examination of the literature reveals there are...
The implementation and use of new information technology initiate changes. These changes can be either of a technological nature (and often explicitly known), or of a social natur...
: Economic theory and business strategists have pointed at the phenomenon of positive externalities and the related enabling and constraining aspects of an installed base. For inst...
In the United States, spam, unsolicited bulk or commercial e-mail, is considered to be a significant problem for both consumers and Internet Service Providers. It is currently attr...
Janice C. Sipior, Burke T. Ward, P. Gregory Bonner
Even though security requirements in health care are traditionally high, most computerized health care applications lack sophisticated security measures or focus only on single sec...
Event-driven Process Chains (EPCs) have been helped to achieve an important role in business process modeling by the commercial success of SAP and ARIS. Both users and IT experts m...
This paper presents a concept for the integration of quantitative and qualitative information sources with their accompanying management support functionalities from navigation and...
Abstract - Understanding the appropriation of CSCW-Tools is key to their successful implementation. This paper explores the social and organizational appropriation of the Cuparla C...