Sciweavers

HICSS
2008
IEEE
251views Biometrics» more  HICSS 2008»
14 years 5 months ago
Business Process Modeling: A Service-Oriented Approach
This research concerns the definition of a service-oriented approach for business processes modeling. Business services are reusable process units that contain one or several proc...
Corine Cauvet, Gwladys Guzelian
HICSS
2008
IEEE
308views Biometrics» more  HICSS 2008»
14 years 5 months ago
The 8C Framework as a Reference Model for Collaborative Value Webs in the Context of Web 2.0
After a decade of innovations and advancement in Internet technologies (roughly from early 1990s to early 2000s), the first generation of Web-based
T. Andrew Yang, Dan J. Kim, Vishal Dhalwani, Tri K...
HICSS
2008
IEEE
150views Biometrics» more  HICSS 2008»
14 years 5 months ago
Quantitative Early-Phase User Research Methods: Hard Data for Initial Product Design
We describe questions that commonly arise in early-phase user research for new technology products concerning customer needs, priorities, and market definition. We suggest that me...
Christopher N. Chapman, Edwin Love, James L. Alfor...
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
14 years 5 months ago
Can a P2P File-Sharing Network Become an e-Marketplace?
The prevalence of P2P technology contributes the ease of file-sharing, but it also brings some problems such as free-riding and copyright infringement. To solve these problems, ma...
Fu-ren Lin, Hau-ming Lo, Cong-ren Wang
HICSS
2008
IEEE
192views Biometrics» more  HICSS 2008»
14 years 5 months ago
Agent-Based Electricity Balancing with Distributed Energy Resources, A Multiperspective Case Study
Abstract— Distributed generation (DG) of electricity is providing an increasing part of the worldwide electricity supply. At the same time, there is a big potential of demand res...
Koen Kok, Zsófia Derzsi, Jaap Gordijn, Maar...
HICSS
2008
IEEE
86views Biometrics» more  HICSS 2008»
14 years 5 months ago
Overcoming Impediments to Cell Phone Forensics
: Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operat...
Wayne Jansen, Aurélien Delaitre, Ludovic Mo...
HICSS
2008
IEEE
128views Biometrics» more  HICSS 2008»
14 years 5 months ago
Elaboration Likelihood in Knowledge Management: A Model and Experimental Test
Understanding knowledge transfer using computer-mediated context is becoming essential given that organizations are spread more and more globally. In this paper, we adopt elaborat...
Kelly J. Fadel, Alexandra Durcikova, Hoon S. Cha
HICSS
2008
IEEE
187views Biometrics» more  HICSS 2008»
14 years 5 months ago
Relational Risk Mitigation: The Relationship Approach to Mitigating Risks in Business Process Outsourcing
Managing risks in outsourcing has been widely researched but is still not fully understood by either academics or practitioners. Recent research on IS outsourcing relationships ha...
Kim Wüllenweber, Stefanie Jahner, Helmut Krcm...
HICSS
2008
IEEE
121views Biometrics» more  HICSS 2008»
14 years 5 months ago
An Integrated Architecture for Demand Response Communications and Control
1 In the competitive electricity structure, demand response programs enable customers to react dynamically to changes in electricity prices. The implementation of such programs ma...
Michael LeMay, Rajesh Nelli, George Gross, Carl A....
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
14 years 5 months ago
Towards a Methodology for Profiling Cyber Criminals
The progress of future e-business and ecommerce will depend on the ability of our legal institutions to protect general users from cyber crimes. While there has been substantial p...
Leonard Kwan, Pradeep Ray, Greg Stephens