The implementation of computerized workflow systems to support the collection and dissemination of patient information has been an area of focus in healthcare for many years. This...
During the past four decades, public trust in governments has continued to diminish due to various administrative, political, socio-cultural, economic, and mass media causes. Focu...
This paper provides a first idea on changes induced by new ICT that goes ‘beyond mobile’. Main aspects considered are value creation structures, value proposition of products ...
This conceptual paper suggests how Politeness Theory [6] – well known in anthropological and linguistic literatures – can contribute to the study of role relations in computer...
Although distributed Group Support Systems (GSS) are getting popular, there are still some limitations. One of the limitations is few substitutions for face-to-face (FTF) interact...
The underlying structure of why and how consumers value reliability of electric service is explored, together with the technological options and cost characteristics for the provi...
Timothy Mount, William Schulze, Richard E. Schuler
— The performance of two Bluetooth piconets linked through a bridge device is analyzed using the tools of queueing theory. We analyze both the Master/Slave (MS) and Slave/Slave (...
We examine a knowledge representation architecture to support context interchange mediation. For autonomous receivers and sources sharing a common subject domain, the mediator’s...
The perceived phenomenon that huge investments in information technology (IT) over the past four decades have yielded a very small gain in productivity has been dubbed the “IT p...
Technological systems involving hazards are typically managed by experienced personnel guided by wellformulated, pre-determined procedures. These procedures are designed to ensure...