Sciweavers

HICSS
2008
IEEE
108views Biometrics» more  HICSS 2008»
14 years 1 months ago
Free-Riding and Competition in Network Markets for Digital Goods
— We present a continuous, stochastic model — the first of its kind — for the monetary flow in multi-level markets allowing for the quantitative assessment of the incentive...
Andreas U. Schmidt
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
14 years 1 months ago
The Role and Emerging Landscape of Data Pools in the Retail and Consumer Goods Industries
In terms of electronic collaboration, the value chains of the retail and consumer goods industries can be ranked among the most advanced. Recent studies have underlined the import...
Jan Schemm, Christine Legner
HICSS
2008
IEEE
111views Biometrics» more  HICSS 2008»
14 years 1 months ago
Cooperation and Coordination in Decentralized Communication Networks
Research has shown that decentralized networks and organizations perform better and have more satisfied members than centralized ones. Further, decentralized self-organizing netwo...
Devan Rosen
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
14 years 1 months ago
Tag Clouds: Data Analysis Tool or Social Signaller?
We examine the recent information visualization phenomenon known as tag clouds, which are an interesting combination of data visualization, web design element, and social marker. ...
Marti A. Hearst, Daniela Karin Rosner
HICSS
2008
IEEE
85views Biometrics» more  HICSS 2008»
14 years 1 months ago
An Exploratory Examination of Knowledge Sharing Behaviors: Voluntary vs. Solicited
Knowledge sharing (KS) has been a central concern in knowledge management (KM) practice and research. However, KS has remained largely a simplistic concept. In this study, we diff...
Seokwoo Song, James T. C. Teng
HICSS
2008
IEEE
110views Biometrics» more  HICSS 2008»
14 years 1 months ago
Shared Mental Models among Open Source Software Developers
1 Shared understandings are important for software development as they guide to effective individual contributions to, and coordination of, the software development process. In thi...
Barbara Scozzi, Kevin Crowston, U. Yeliz Eseryel, ...
HICSS
2008
IEEE
93views Biometrics» more  HICSS 2008»
14 years 1 months ago
An Exploration of the Hygiene and Motivator Aspects of WebQual Constructs in Predicting Website Reuse
Most existing studies of website characteristics and their impact on intentions have assumed a linear relationship between them. However, motivational theories suggest that while ...
Ben Q. Liu, Dale Goodhue
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
14 years 1 months ago
An Analysis of Korean National Information Strategy of IT839
Recently, the Korean government launched the IT839 project with the objective of converting Korea into a ubiquitous information society. This study investigates the role of the Ko...
Dong Hee Shin, Won-Yong Kim
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
14 years 1 months ago
Cues to Deception in Online Chinese Groups
Advancing our knowledge about cues to deception is crucial to successful deception detection. A lengthy list of cues to deception has been identified via a myriad of deception stu...
Lina Zhou, Yu-wei Sung