To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Grounded on both social cognitive theory and expectation-disconfirmation theory (EDT), this study aims to investigate how individuals’ continuance intention of knowledge creatio...
Emergencies today seem larger, more complex, and unique than those of the past. Responding to them requires flexibility and creativity not easily achieved. The threat-rigidity the...
This research explores how a wide range of automobile crash, emergency responder, hospital, and trauma information could be useful to emergency medical practitioners for making de...
Benjamin L. Schooley, Thomas A. Horan, Michael Mar...
This paper briefly reviews the state of Enterprise System Architecting (ESA) and concludes that assumptions of incremental technical evolution (overlaid by selective organizationa...
The process of recruiting employees has changed since the internet entered enterprises. From simply posting job ads and information on the internet to online application forms and...
Sven Laumer, Alexander von Stetten, Andreas Eckhar...
The research design, evaluation methodology, and statistical analysis of the clinical efficacy of healthcare information technology (HIT) implementation can be a challenging task....
Lance Roberts, Marcia M. Ward, Jane M. Brokel, Dou...
An Enterprise Semantic Integration System (ESIS) provides cross-domain and cross-department insights by normalizing and merging structured, semistructured, and unstructured data s...
In this paper we present a novel alternative means of modelling Decision support spreadsheets called Example Driven Modelling. The concept and rationale of the approach is discuss...
Digital cross-organizational and cross-border collaboration are emerging research issues. Significant drivers of this development are collaboration-related information systems. A ...