Sciweavers

HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
14 years 6 months ago
CRM and Customer Portfolio Management for E-Tailers
“Don’t put all your eggs in one basket” is common wisdom with respect to financial portfolio theory. The configuration of customer portfolios with regard to appropriate risk...
Dennis Kundisch, Stefan Sackmann, Markus Ruch
HICSS
2008
IEEE
111views Biometrics» more  HICSS 2008»
14 years 6 months ago
Participant-Driven Collaborative Convergence
Traditional GSS workflow leverages the abilities of an expert facilitator to lead groups through the convergence activities. This dependence on a facilitator creates a bottleneck ...
Joel H. Helquist, John Kruse, Mark Adkins
HICSS
2008
IEEE
96views Biometrics» more  HICSS 2008»
14 years 6 months ago
Factors Influencing Users' Intentions to Make the Web Accessible to People with Disabilities
The aim of this paper is twofold: to provide a theoretical model to analyze obstacles, challenges, and incentives which lead a nonprofessional user to design websites and produce ...
Karine Barzilai-Nahon, Izak Benbasat, Nancy Lou
HICSS
2008
IEEE
142views Biometrics» more  HICSS 2008»
14 years 6 months ago
Some Implications of Comparing Brain and Computer Processing
Like a computer, the human brain inputs, processes, stores and outputs information. Yet the brain evolved along different design principles from those of the Von Neumann architect...
Brian Whitworth
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
14 years 6 months ago
A TeleMedicine Transfer Model for Sub-Saharan Africa
1 : Given the documented benefits of telemedicine, especially in resource-constrained health-care contexts, we empirically examine the factors they contribute to successful transfe...
Mengistu Kifle, Victor Wacham A. Mbarika, Clive Ts...
HICSS
2008
IEEE
121views Biometrics» more  HICSS 2008»
14 years 6 months ago
The Impact of Directionality in Predications on Text Mining
The number of publications in biomedicine is increasing enormously each year. To help researchers digest the information in these documents, text mining tools are being developed ...
Gondy Leroy, Marcelo Fiszman, Thomas C. Rindflesch
HICSS
2008
IEEE
89views Biometrics» more  HICSS 2008»
14 years 6 months ago
Multi-perspective Assessment of Scalability of IT-Enabled Networked Constellations
Networked constellations are often formed to provide commercial IT services by leveraging the Internet technology. The provision of IT services should remain scalable, meaning tha...
Zsófia Derzsi, Jaap Gordijn, Koen Kok
HICSS
2008
IEEE
134views Biometrics» more  HICSS 2008»
14 years 6 months ago
Internet Privacy in E-Commerce: Framework, Review, and Opportunities for Future Research
Increased Internet traffic and the sophistication of companies in tracking that traffic have made privacy a critical issue in electronic commerce (e-commerce). This has spawned a ...
J. Efrim Boritz, Won Gyun No, R. P. Sundarraj
HICSS
2008
IEEE
236views Biometrics» more  HICSS 2008»
14 years 6 months ago
A Case Study: Introducing eXtreme Programming in a US Government System Development Project
The US Military’s ability to meet its mission critical requirements calls for increased agility in its information technology development process. The purpose of this case study...
Ann L. Fruhling, Patrick McDonald, Christopher Dun...
HICSS
2008
IEEE
144views Biometrics» more  HICSS 2008»
14 years 6 months ago
Stock Price Reactions to Investments in EAI and ERP: A Comparative Event Study
The study described in this paper contributes to the growing repository of event studies in the field of information technology (IT) research. The empirical results presented in t...
Narcyz Roztocki, Heinz Roland Weistroffer