Sciweavers

HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
14 years 6 months ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung
HICSS
2009
IEEE
179views Biometrics» more  HICSS 2009»
14 years 6 months ago
Understanding Continuance Intention of Knowledge Creation in Online Communities from a Social-Psychological Perspective
Grounded on both social cognitive theory and expectation-disconfirmation theory (EDT), this study aims to investigate how individuals’ continuance intention of knowledge creatio...
Shih-Wei Chou, Ching-Chang Lee, Yu-Chieh Chang, Ch...
HICSS
2009
IEEE
114views Biometrics» more  HICSS 2009»
14 years 6 months ago
Reexamining Threat Rigidity: Implications for Design
Emergencies today seem larger, more complex, and unique than those of the past. Responding to them requires flexibility and creativity not easily achieved. The threat-rigidity the...
Linda Plotnick, Murray Turoff, Gerd Van Den Eede
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
14 years 6 months ago
Integrated Patient Health Information Systems to Improve Traffic Crash Emergency Response and Treatment
This research explores how a wide range of automobile crash, emergency responder, hospital, and trauma information could be useful to emergency medical practitioners for making de...
Benjamin L. Schooley, Thomas A. Horan, Michael Mar...
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 6 months ago
Service Migration in an Enterprise System Architecture
This paper briefly reviews the state of Enterprise System Architecting (ESA) and concludes that assumptions of incremental technical evolution (overlaid by selective organizationa...
Stephen Cohen, William Money, Stephen Kaisler
HICSS
2009
IEEE
145views Biometrics» more  HICSS 2009»
14 years 6 months ago
Online Gaming to Apply for Jobs - The Impact of Self- and E-Assessment on Staff Recruitment
The process of recruiting employees has changed since the internet entered enterprises. From simply posting job ads and information on the internet to online application forms and...
Sven Laumer, Alexander von Stetten, Andreas Eckhar...
HICSS
2009
IEEE
98views Biometrics» more  HICSS 2009»
14 years 6 months ago
Methodological Approaches to Measuring the Effects of Implementation of Health Information Technology (HIT)
The research design, evaluation methodology, and statistical analysis of the clinical efficacy of healthcare information technology (HIT) implementation can be a challenging task....
Lance Roberts, Marcia M. Ward, Jane M. Brokel, Dou...
HICSS
2009
IEEE
134views Biometrics» more  HICSS 2009»
14 years 6 months ago
Exploring Two Enterprise Semantic Integration Systems
An Enterprise Semantic Integration System (ESIS) provides cross-domain and cross-department insights by normalizing and merging structured, semistructured, and unstructured data s...
Mark Ginsburg, Alex Kass, Peter Z. Yeh
HICSS
2009
IEEE
66views Biometrics» more  HICSS 2009»
14 years 6 months ago
The Potential of Example Driven Modelling for Decision Support Spreadsheets
In this paper we present a novel alternative means of modelling Decision support spreadsheets called Example Driven Modelling. The concept and rationale of the approach is discuss...
S. Thorne, D. Ball
HICSS
2009
IEEE
116views Biometrics» more  HICSS 2009»
14 years 6 months ago
Digital Cross-Organizational and Cross-Border Collaboration: A Scientometric Study
Digital cross-organizational and cross-border collaboration are emerging research issues. Significant drivers of this development are collaboration-related information systems. A ...
Maria Madlberger, Narcyz Roztocki