The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
As recent events have shown, effective knowledge sharing has become important at all political levels, especially when disasters occur. In this paper, we present the case of Miami...
Systems using Software Agents (or Multi-Agent Systems, MAS) are becoming more popular within the development mainstream because, as the name suggests, an Agent aims to handle task...
Chia-En Lin, Krishna M. Kavi, Frederick T. Sheldon...
The implementation of e-government is a challenging task in any developed political context, but all the more uniquely so in the post-communist transitioning countries. These coun...
Articulation work is a critical factor in information infrastructure building projects that involve multiple and diverse communities. It brings awareness of language differences, ...
In these days, companies need highly flexible processes to deal with changing environments and competitors. Using traditional process models that have to be modeled in all detail...
The paper combines and extends the technologies of fuzzy sets and association rules, considering users’ differential emphasis on each attribute through fuzzy regions. A fuzzy da...
Hospital surgery environments are dynamic and high risk. They require coordination across multiple groups whose incentives, cultures, and routines can conflict. In this paper, we ...
Yuqing Ren, Sara B. Kiesler, Susan R. Fussell, Pet...
Online service quality is a much-studied concept. Despite this, dimensions that make up service quality, and the items used to measure those dimensions have proven unstable. It is...
Mary Tate, Joerg Evermann, Beverley G. Hope, Stuar...
The media industry is challenged to find new lines of business as technology redefines content, distribution and customer expectations. This is a case study of Oxygen Media where ...