Sciweavers

HICSS
2009
IEEE
96views Biometrics» more  HICSS 2009»
14 years 6 months ago
The Potential of Renewable Energy to Reduce the Dependence of the State of Hawaii on Oil
Deriving nearly 90% of its primary energy resources from oil, the State of Hawaii is more dependent on oil than any other U.S. state. The price of electricity in Hawaii is also mo...
Doug Arent, John Barnett, Gail Mosey, Alison Wise
HICSS
2009
IEEE
176views Biometrics» more  HICSS 2009»
14 years 6 months ago
Adoption of Electronic Commerce Technologies by SMEs in Malaysia
Electronic commerce (EC) offers many benefits to organizations of any size including small to medium- sized enterprises (SMEs). At this stage, there is still a need for a better u...
Sherah Kurnia, Basil Alzougool, Mazen Ali, Saadat ...
HICSS
2009
IEEE
109views Biometrics» more  HICSS 2009»
14 years 6 months ago
A Life Cycle Model of Virtual Communities
The importance of virtual communities is well established in Information Systems (IS) research. A significant number of studies on this topic have focused on investigating motivat...
Elham Mousavidin, Lakshmi Goel
HICSS
2009
IEEE
96views Biometrics» more  HICSS 2009»
14 years 6 months ago
Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines
Much recent work has focused on the process of auditing the results of elections. Little work has focused on auditing the e-voting systems currently in use. The facilities for doi...
Sean Peisert, Matt Bishop, Alec Yasinsac
HICSS
2009
IEEE
127views Biometrics» more  HICSS 2009»
14 years 6 months ago
Design Rules for User-Oriented IT Service Descriptions
Customers of complex IT-services increasingly demand integrated value bundles that fit their individual needs. At the same time, IT service providers are facing commoditization of...
Henrik Brocke, Thorsten Hau, Alexander Vogedes, Be...
HICSS
2009
IEEE
87views Biometrics» more  HICSS 2009»
14 years 6 months ago
Semantics-Driven Development for Electronic Government Applications
It has been argued that the challenges in electronic government are purely social: that existing methods and tools are perfectly adequate, and that electronic government projects ...
Charles Crichton, Jim Davies, Jeremy Gibbons, Stev...
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
14 years 6 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
HICSS
2009
IEEE
213views Biometrics» more  HICSS 2009»
14 years 6 months ago
AURUM: A Framework for Information Security Risk Management
—As companies are increasingly exposed to a variety of information security threats, they are permanently forced to pay attention to security issues. Risk management provides an ...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer
HICSS
2009
IEEE
159views Biometrics» more  HICSS 2009»
14 years 6 months ago
Collaborative Modeling - A Design Science Approach
We have used a design science approach to study the collaborative creation of conceptual models. We have designed a collaborative modeling architecture based on business needs and...
Peter Rittgen