: Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operat...
Understanding knowledge transfer using computer-mediated context is becoming essential given that organizations are spread more and more globally. In this paper, we adopt elaborat...
Managing risks in outsourcing has been widely researched but is still not fully understood by either academics or practitioners. Recent research on IS outsourcing relationships ha...
1 In the competitive electricity structure, demand response programs enable customers to react dynamically to changes in electricity prices. The implementation of such programs ma...
Michael LeMay, Rajesh Nelli, George Gross, Carl A....
The progress of future e-business and ecommerce will depend on the ability of our legal institutions to protect general users from cyber crimes. While there has been substantial p...
How to implement an IS (information system) successfully remains a problem. To address this, drawing on information processing theory, this study proposes an integrated model that...
E-government research has become a recognized research domain and many policies and strategies are formulated for e-government implementations. Most of these target the next few y...
Rapid developments in digital technologies have brought to force new challenges in innovation. In this paper, we propose a taxonomic framework of innovation networks in order to i...
Youngjin Yoo, Kalle Lyytinen, Richard J. Boland Jr...
The potential uses of the sub-second GPSsynchronized phasor data collected from various locations within an electric power system promise endless benefits for the applications tar...
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...