Sciweavers

HICSS
2008
IEEE
85views Biometrics» more  HICSS 2008»
14 years 6 months ago
An Exploratory Examination of Knowledge Sharing Behaviors: Voluntary vs. Solicited
Knowledge sharing (KS) has been a central concern in knowledge management (KM) practice and research. However, KS has remained largely a simplistic concept. In this study, we diff...
Seokwoo Song, James T. C. Teng
HICSS
2008
IEEE
110views Biometrics» more  HICSS 2008»
14 years 6 months ago
Shared Mental Models among Open Source Software Developers
1 Shared understandings are important for software development as they guide to effective individual contributions to, and coordination of, the software development process. In thi...
Barbara Scozzi, Kevin Crowston, U. Yeliz Eseryel, ...
HICSS
2008
IEEE
93views Biometrics» more  HICSS 2008»
14 years 6 months ago
An Exploration of the Hygiene and Motivator Aspects of WebQual Constructs in Predicting Website Reuse
Most existing studies of website characteristics and their impact on intentions have assumed a linear relationship between them. However, motivational theories suggest that while ...
Ben Q. Liu, Dale Goodhue
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
14 years 6 months ago
An Analysis of Korean National Information Strategy of IT839
Recently, the Korean government launched the IT839 project with the objective of converting Korea into a ubiquitous information society. This study investigates the role of the Ko...
Dong Hee Shin, Won-Yong Kim
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
14 years 6 months ago
Cues to Deception in Online Chinese Groups
Advancing our knowledge about cues to deception is crucial to successful deception detection. A lengthy list of cues to deception has been identified via a myriad of deception stu...
Lina Zhou, Yu-wei Sung
HICSS
2008
IEEE
108views Biometrics» more  HICSS 2008»
14 years 6 months ago
Should Online Auctions Employ Dynamic Buyout Pricing Models?
Online auctions are inherently dynamic. Online auction designs that internalize temporal changes in the economic environment are generally expected to perform better than static d...
Roumen Vragov, Di Shang, Karl Reiner Lang
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
14 years 6 months ago
Development and Validation of Scales to Measure the Strategic Potential of IT-Enabled Resources: A Resource-Based Approach
This paper describes the development of reliable and valid scales for assessing the strategic potential of IT-enabled resources. Following to the resource-based view of the firm (...
Saggi Nevo, Michael R. Wade
HICSS
2008
IEEE
151views Biometrics» more  HICSS 2008»
14 years 6 months ago
Venice, California and World of Warcraft: Persistence and Ephemerality in Playful Spaces
Persistent digital media extend content beyond immediate ephemeral interactions and conversations. Systems such as email, instant messaging, digital kiosks, social networking site...
Silvia Lindtner, Bonnie A. Nardi
HICSS
2008
IEEE
87views Biometrics» more  HICSS 2008»
14 years 6 months ago
Drop-Down Democracy: Internet Portal Design Influences Voters' Search Strategies
In this study we report how different interfaces for searching the internet changed the strategies and information opportunities of voters as they searched for political informati...
Scott P. Robertson, Christine E. Wania, George Abr...
HICSS
2008
IEEE
105views Biometrics» more  HICSS 2008»
14 years 6 months ago
Video Content Description Using Fuzzy Spatio-temporal Relations
One of the important aspects in digital video applications is spatial and temporal characteristic. A very little progress has been achieved on spatiotemporal modeling of video dat...
Archana M. Rajurkar, R. C. Joshi, Santanu Chaudhar...