Sciweavers

HICSS
2007
IEEE
148views Biometrics» more  HICSS 2007»
14 years 6 months ago
A Survey of B2B Methodologies and Technologies: From Business Models towards Deployment Artifacts
Abstract— In recent years business-to-business (B2B) ecommerce has been subject to major rethinking. A paradigm shift from document centric file-based interchange of business in...
Jürgen Dorn, Christoph Grün, Hannes Wert...
HICSS
2007
IEEE
157views Biometrics» more  HICSS 2007»
14 years 6 months ago
E-Government Evaluation: Reflections On Three Organisational Case Studies
The deployment of e-Government continues at a significant cost and pace in the worldwide public sector. An important area of research is that of the evaluation of e-Government. In...
Stephen Jones, Zahir Irani, Amir M. Sharif
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
14 years 6 months ago
Decision Support in Health Care via Root Evidence Sampling
— Bayesian networks play a key role in decision support within health care. Physicians rely on Bayesian networks to give medical treatment, generate what-if scenarios, and other ...
Benjamin B. Perry, Eli Faulkner
HICSS
2007
IEEE
108views Biometrics» more  HICSS 2007»
14 years 6 months ago
Addressing IT Security for Critical Control Systems
— Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. In this environment, the risk...
Martin Naedele
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
14 years 6 months ago
Web Application Scanners: Definitions and Functions
There are many commercial software security assurance tools that claim to detect and prevent vulnerabilities in application software. However, a closer look at the tools often lea...
Elizabeth Fong, Vadim Okun
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
14 years 6 months ago
Second-Best Combinatorial Auctions - The Case of the Pricing-Per-Column Mechanism
One of the main contributions of classical mechanism design is the derivation of the Groves mechanisms. The class of Groves mechanisms are the only mechanisms that are strategy-pr...
Dirk Neumann, Björn Schnizler, Ilka Weber, Ch...
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
14 years 6 months ago
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology
This paper describes how the curriculum and course format at the Air Force Institute of Technology (AFIT) has evolved based on our experience with the highly-successful Cyber Defe...
Barry E. Mullins, Timothy H. Lacey, Robert F. Mill...
HICSS
2007
IEEE
181views Biometrics» more  HICSS 2007»
14 years 6 months ago
Potentials of Social Networks for Knowledge Management with Regard to the Development of Stable Competences and Dynamic Capabili
In order to balance the tensions of the concepts of organizational core competencies and dynamic capability we introduce social knowledge networks as a strategic means from a know...
Harald F. O. von Kortzfleisch, Ines Mergel, Christ...
HICSS
2007
IEEE
172views Biometrics» more  HICSS 2007»
14 years 6 months ago
Support for Computer Forensics Examination Planning with Domain Modeling: A Report of One Experiment Trial
In any forensic investigation, planning and analysis activities are required in order to determine what digital media will be seized, what types of information will be sought in t...
Alfred C. Bogen, David A. Dampier, Jeffrey C. Carv...
HICSS
2007
IEEE
114views Biometrics» more  HICSS 2007»
14 years 6 months ago
Organizational Assimilation of Vertical Standards: An Integrative Model
Vertical standards are complex networked technologies whose assimilation is subject to extensive interorganizational dependence and network effects. Classical theories of diffusio...
Rubén A. Mendoza, T. Ravichandran