Sciweavers

HICSS
2008
IEEE
86views Biometrics» more  HICSS 2008»
14 years 6 months ago
Overcoming Impediments to Cell Phone Forensics
: Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operat...
Wayne Jansen, Aurélien Delaitre, Ludovic Mo...
HICSS
2008
IEEE
128views Biometrics» more  HICSS 2008»
14 years 6 months ago
Elaboration Likelihood in Knowledge Management: A Model and Experimental Test
Understanding knowledge transfer using computer-mediated context is becoming essential given that organizations are spread more and more globally. In this paper, we adopt elaborat...
Kelly J. Fadel, Alexandra Durcikova, Hoon S. Cha
HICSS
2008
IEEE
187views Biometrics» more  HICSS 2008»
14 years 6 months ago
Relational Risk Mitigation: The Relationship Approach to Mitigating Risks in Business Process Outsourcing
Managing risks in outsourcing has been widely researched but is still not fully understood by either academics or practitioners. Recent research on IS outsourcing relationships ha...
Kim Wüllenweber, Stefanie Jahner, Helmut Krcm...
HICSS
2008
IEEE
121views Biometrics» more  HICSS 2008»
14 years 6 months ago
An Integrated Architecture for Demand Response Communications and Control
1 In the competitive electricity structure, demand response programs enable customers to react dynamically to changes in electricity prices. The implementation of such programs ma...
Michael LeMay, Rajesh Nelli, George Gross, Carl A....
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
14 years 6 months ago
Towards a Methodology for Profiling Cyber Criminals
The progress of future e-business and ecommerce will depend on the ability of our legal institutions to protect general users from cyber crimes. While there has been substantial p...
Leonard Kwan, Pradeep Ray, Greg Stephens
HICSS
2008
IEEE
114views Biometrics» more  HICSS 2008»
14 years 6 months ago
The Factors that Affect the Implementation Success of IS
How to implement an IS (information system) successfully remains a problem. To address this, drawing on information processing theory, this study proposes an integrated model that...
Shih-Wei Chou, Mong-Young He, Pi-Yi Chen
HICSS
2008
IEEE
127views Biometrics» more  HICSS 2008»
14 years 6 months ago
Future e-Government Research: 13 Research Themes Identified in the eGovRTD2020 Project
E-government research has become a recognized research domain and many policies and strategies are formulated for e-government implementations. Most of these target the next few y...
Maria Wimmer, Cristiano Codagnone, Marijn Janssen
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
14 years 6 months ago
Distributed Innovation in Classes of Networks
Rapid developments in digital technologies have brought to force new challenges in innovation. In this paper, we propose a taxonomic framework of innovation networks in order to i...
Youngjin Yoo, Kalle Lyytinen, Richard J. Boland Jr...
HICSS
2008
IEEE
132views Biometrics» more  HICSS 2008»
14 years 6 months ago
Monitoring of Power System Dynamic Behavior Using Characteristic Ellipsoid Method
The potential uses of the sub-second GPSsynchronized phasor data collected from various locations within an electric power system promise endless benefits for the applications tar...
Yuri V. Makarov, Carl H. Miller, Tony B. Nguyen
HICSS
2008
IEEE
237views Biometrics» more  HICSS 2008»
14 years 6 months ago
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...