Sciweavers

HICSS
2006
IEEE
118views Biometrics» more  HICSS 2006»
14 years 5 months ago
Mobilizing Customer Relationship Management - A Journey from Strategy to System Design
The bursting of the e-bubble affected expectations with regard to mobile initiatives and willingness to invest in them very negatively. In both academia and practice, there has re...
Ragnar Schierholz, Lutz Kolbe, Walter Brenner
HICSS
2006
IEEE
73views Biometrics» more  HICSS 2006»
14 years 5 months ago
Determining Success for Different Website Goals
In building a successful website it is imperative that the design matches the organization’s objectives, which should be well defined. Clearly, different types of websites will ...
L. Christian Schaupp, Weiguo Fan, France Belanger
HICSS
2006
IEEE
128views Biometrics» more  HICSS 2006»
14 years 5 months ago
An Ontology-Based Architecture for Tracking Information across Interactive Electronic Environments
This paper presents technical foundation, roadmap and initial results of the IDIOM project (Information Diffusion across Interactive Online Media). Information spreads rapidly acr...
Arno Scharl, Albert Weichselbraun
HICSS
2006
IEEE
92views Biometrics» more  HICSS 2006»
14 years 5 months ago
Optimal Design of E-Commerce Site Infrastructure from a Business Perspective
Abstract— A methodology for designing data center infrastructure for E-commerce sites is developed. It differs from existing methodologies in that it evaluates and compares alter...
Jacques Philippe Sauvé, Filipe Marques, Ant...
HICSS
2006
IEEE
161views Biometrics» more  HICSS 2006»
14 years 5 months ago
The Collaboration Engineering Maturity Model
The focus of this paper is to introduce a comprehensive model for assessing and improving the maturity of Collaboration Engineering (CE) processes. The model is targeted at introd...
Eric L. Santanen, Gwendolyn L. Kolfschoten, Kastur...
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
14 years 5 months ago
The Effect of Group Support Systems on the Emergence of Unique Information in a Risk Management Process: A Field Study
The management of operational risks, i.e., risks of loss resulting from inadequate or failed processes, people and systems or from external events, is crucial for the stability of...
Anne-Françoise Rutkowski, Bartel Van de Wal...
HICSS
2006
IEEE
133views Biometrics» more  HICSS 2006»
14 years 5 months ago
Being Literate with Large Document Collections: Observational Studies and Cost Structure Tradeoffs
How do people work with large document collections? We studied the effects of different kinds of analysis tools on the behavior of people doing rapid large-volume data assessment,...
Daniel M. Russell, Malcolm Slaney, Yan Qu, Mave Ho...
HICSS
2006
IEEE
142views Biometrics» more  HICSS 2006»
14 years 5 months ago
Measuring the Effectiveness of Honeypot Counter-Counterdeception
Honeypots are computer systems that try to fool cyberattackers into thinking they are ordinary computer systems, when in fact they are designed solely to collect data about attack...
Neil C. Rowe
HICSS
2006
IEEE
163views Biometrics» more  HICSS 2006»
14 years 5 months ago
Learning Ranking vs. Modeling Relevance
The classical (ad hoc) document retrieval problem has been traditionally approached through ranking according to heuristically developed functions (such as tf.idf or bm25) or gene...
Dmitri Roussinov, Weiguo Fan
HICSS
2006
IEEE
146views Biometrics» more  HICSS 2006»
14 years 5 months ago
Push-to-Talk over Bluetooth
Valter Rönnholm