The objective of this study is to identify the relationships in which social support influences flow and game loyalty through character control, character identity, guild identity...
In recent years many national e-government standards have been developed. Even though the definition of such standards may be a necessary condition for the creation of interoperab...
Significant temporal and monetary costs are associated with the development and implementation of a knowledge management system (KMS). To justify this investment, it is important ...
Nicole F. Velasquez, Alexandra Durcikova, Rajiv Sa...
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Grounded on both social cognitive theory and expectation-disconfirmation theory (EDT), this study aims to investigate how individuals’ continuance intention of knowledge creatio...
Emergencies today seem larger, more complex, and unique than those of the past. Responding to them requires flexibility and creativity not easily achieved. The threat-rigidity the...
This research explores how a wide range of automobile crash, emergency responder, hospital, and trauma information could be useful to emergency medical practitioners for making de...
Benjamin L. Schooley, Thomas A. Horan, Michael Mar...
This paper briefly reviews the state of Enterprise System Architecting (ESA) and concludes that assumptions of incremental technical evolution (overlaid by selective organizationa...
The process of recruiting employees has changed since the internet entered enterprises. From simply posting job ads and information on the internet to online application forms and...
Sven Laumer, Alexander von Stetten, Andreas Eckhar...
The research design, evaluation methodology, and statistical analysis of the clinical efficacy of healthcare information technology (HIT) implementation can be a challenging task....
Lance Roberts, Marcia M. Ward, Jane M. Brokel, Dou...