Sciweavers

HICSS
2007
IEEE
258views Biometrics» more  HICSS 2007»
14 years 5 months ago
Enterprise Architecture and IT Governance: A Risk-Based Approach
The USCP had enormous challenges with its IT Program and support to the internal and external stakeholders of the Department, because of a fragile IT infrastructure. The IT Progra...
James R. Getter
HICSS
2007
IEEE
119views Biometrics» more  HICSS 2007»
14 years 5 months ago
Supporting distributed scientific collaboration: Implications for designing the CiteSeer collaboratory
It is unclear if and how collaboratories have enhanced distributed scientific collaboration. Furthermore, little is known in the way of design strategies to support such collabora...
Umer Farooq, Craig H. Ganoe, John M. Carroll, C. L...
HICSS
2007
IEEE
215views Biometrics» more  HICSS 2007»
14 years 5 months ago
A Metrics Generation Model for Measuring the Control Objectives of Information Systems Audit
Information Technology governance (ITG) which was a relatively new concept in the late 1990s, has gained importance in the 21st century due to factors namely the collapse of Enron...
Mathew Nicho, Brian Cusack
HICSS
2007
IEEE
103views Biometrics» more  HICSS 2007»
14 years 5 months ago
A Convolution Algorithm for Evaluating Supply Chain Delivery Performance
The effective management of a supply chain requires performance measures that accurately represent the underlying structure of the supply chain. Measures such as delivery performa...
Alfred L. Guiffrida, Robert A. Rzepka, Mohamad Y. ...
HICSS
2007
IEEE
139views Biometrics» more  HICSS 2007»
14 years 5 months ago
Physicians' Resistance toward Healthcare Information Technologies: A Dual-Factor Model
This paper proposes and validates a theory of physician resistance toward IT usage by drawing on prior research in the resistance to change literature and a recent dual-factor mod...
Anol Bhattacherjee, Neset Hikmet
HICSS
2007
IEEE
176views Biometrics» more  HICSS 2007»
14 years 5 months ago
BDFS: A Real-Time Search Algorithm for Central Office (CO) Optimization
Sethuraman Janardhanan, Ambuj Mahanti, Debashis Sa...
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
14 years 5 months ago
An Empirical Analysis of Fraud Detection in Online Auctions: Credit Card Phantom Transaction
The online auction is a well-known business model that shows how business can be changed with the aid of new technologies. On the other hand, although the online auction allows bu...
Myungsin Chae, Seonyoung Shim, Hyungjun Cho, Byung...
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
14 years 5 months ago
Stochastic Formal Methods: An Application to Accuracy of Numeric Software
— This paper provides a bound on the number of numeric operations (fixed or floating point) that can safely be performed before accuracy is lost. This work has important implic...
Marc Daumas, David Lester
HICSS
2007
IEEE
148views Biometrics» more  HICSS 2007»
14 years 5 months ago
Binding Now or Binding Later: The Performance of UDDI Registries
In service-oriented environments, the fluidity of the marketplace introduces changes in service offerings and subsequent connection failures for users still bound to outdated serv...
M. Brian Blake, Amy Lynn Sliva, Michael zur Muehle...
HICSS
2007
IEEE
102views Biometrics» more  HICSS 2007»
14 years 5 months ago
Facilitating Mobile Music Sharing and Social Interaction with Push!Music
Maria Håkansson, Mattias Rost, Mattias Jacob...