Sciweavers

HICSS
2005
IEEE
142views Biometrics» more  HICSS 2005»
14 years 3 months ago
Learning Effectiveness in Web-Based Technology-Mediated Virtual Learning Environment
A framework that delineates the relationships between learner control and learning effectiveness is absent. This study aims to fill this void. Unlike previous research, this study...
Shih-Wei Chou, Chien-Hung Liu
HICSS
2005
IEEE
88views Biometrics» more  HICSS 2005»
14 years 3 months ago
Information Fusion for Intelligence Analysis
1 Ensuring the accuracy of intelligence assessments is made difficult by the pervasiveness of uncertainty in intelligence information and the demand to fuse information from multip...
Kari Chopra, Craig Haimson
HICSS
2005
IEEE
120views Biometrics» more  HICSS 2005»
14 years 3 months ago
User Motivation and Persuasion Strategy for Peer-to-Peer Communities
In recent years, peer-to-peer systems have become more and more popular, especially with some successful applications like Napter, Kazaa and edoney. However, how to motivate user ...
Ran Cheng, Julita Vassileva
HICSS
2005
IEEE
133views Biometrics» more  HICSS 2005»
14 years 3 months ago
User-Oriented Relevance Judgment: A Conceptual Model
The concept of relevance has been heatedly debated in last decade. Not satisfied with the narrow and technical definition of system relevance, researchers turn to the subjective a...
Zhiwei Chen, Yunjie Xu
HICSS
2005
IEEE
117views Biometrics» more  HICSS 2005»
14 years 3 months ago
Movie Review Mining: a Comparison between Supervised and Unsupervised Classification Approaches
Web content mining is intended to help people discover valuable information from large amount of unstructured data on the web. Movie review mining classifies movie reviews into tw...
Pimwadee Chaovalit, Lina Zhou
HICSS
2005
IEEE
136views Biometrics» more  HICSS 2005»
14 years 3 months ago
Assessing the Readiness of Internet-Based IOS and Evaluating Its Impact on Adoption
This study explores the readiness factors for the adoption of Internet-based inter-organizational systems (IOS) via a case analysis of fifteen Taiwanese firms. By proposing a thre...
Hsin-Lu Chang, Shin-Horng Chen
HICSS
2005
IEEE
117views Biometrics» more  HICSS 2005»
14 years 3 months ago
MobCon: A Generative Middleware Framework for Java Mobile Applications
While dedicated technologies such as e.g., Sun’s J2ME MIDP offer a simple programming model for mobile applications, appropriate support for modularizing the implementation of t...
Vasian Cepa, Mira Mezini
HICSS
2005
IEEE
109views Biometrics» more  HICSS 2005»
14 years 3 months ago
Moving Beyond Tacit and Explicit: Four Dimensions of Knowledge
R. Mitch Casselman, Danny A. Samson
HICSS
2005
IEEE
140views Biometrics» more  HICSS 2005»
14 years 3 months ago
On Contamination in Information Ecosystems
1 On the Internet, digitally active small and medium sized enterprises (SME) face numerous security risks. When SMEs join networks, business ideas and malicious activities may inte...
Bengt Carlsson, Andreas Jacobsson