“Don’t put all your eggs in one basket” is common wisdom with respect to financial portfolio theory. The configuration of customer portfolios with regard to appropriate risk...
Traditional GSS workflow leverages the abilities of an expert facilitator to lead groups through the convergence activities. This dependence on a facilitator creates a bottleneck ...
The aim of this paper is twofold: to provide a theoretical model to analyze obstacles, challenges, and incentives which lead a nonprofessional user to design websites and produce ...
Like a computer, the human brain inputs, processes, stores and outputs information. Yet the brain evolved along different design principles from those of the Von Neumann architect...
1 : Given the documented benefits of telemedicine, especially in resource-constrained health-care contexts, we empirically examine the factors they contribute to successful transfe...
Mengistu Kifle, Victor Wacham A. Mbarika, Clive Ts...
The number of publications in biomedicine is increasing enormously each year. To help researchers digest the information in these documents, text mining tools are being developed ...
Gondy Leroy, Marcelo Fiszman, Thomas C. Rindflesch
Networked constellations are often formed to provide commercial IT services by leveraging the Internet technology. The provision of IT services should remain scalable, meaning tha...
Increased Internet traffic and the sophistication of companies in tracking that traffic have made privacy a critical issue in electronic commerce (e-commerce). This has spawned a ...
The US Military’s ability to meet its mission critical requirements calls for increased agility in its information technology development process. The purpose of this case study...
Ann L. Fruhling, Patrick McDonald, Christopher Dun...
The study described in this paper contributes to the growing repository of event studies in the field of information technology (IT) research. The empirical results presented in t...