Sciweavers

HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
14 years 5 months ago
Assessment of Enterprise Information Security - The Importance of Information Search Cost
There are today several methods and standards available for assessment of the level of information security in an enterprise. A problem with these assessment methods is that they ...
Erik Johansson, Mathias Ekstedt, Pontus Johnson
HICSS
2006
IEEE
145views Biometrics» more  HICSS 2006»
14 years 5 months ago
Resource Decisions in Software Development Using Risk Assessment Model
The resource decisions in software project using cost models do not satisfy managerial decision, as it does not support trade-off analysis among resources. A Bayesian net approach...
Wiboon Jiamthubthugsin, Daricha Sutivong
HICSS
2006
IEEE
90views Biometrics» more  HICSS 2006»
14 years 5 months ago
Text Understanding Agents and the Semantic Web
— We discuss the challenges involved in adapting the OntoSem natural language processing system to the Web. One set of tasks involves processing Web documents, translating their ...
Akshay Java, Tim Finin, Sergei Nirenburg
HICSS
2006
IEEE
170views Biometrics» more  HICSS 2006»
14 years 5 months ago
A Complex Adaptive System Perspective of Enterprise Architecture in Electronic Government
Within the public sector, the deployment of enterprise architecture is often an attempt to address the decentralization/centralization relationships to improve the links between t...
Marijn Janssen, George Kuk
HICSS
2006
IEEE
94views Biometrics» more  HICSS 2006»
14 years 5 months ago
Reporting On-Campus Crime Online: User Intention to Use
National surveys demonstrate that millions of crimes go unreported in the United States. Several reasons may contribute to this lack of reporting and we are investigating these po...
Alicia Iriberri, Gondy Leroy, Nathan Garrett
HICSS
2006
IEEE
127views Biometrics» more  HICSS 2006»
14 years 5 months ago
Processing of Data Streams with Prediction Functions
Networks of sensors arise naturally in many different fields, from industrial applications (e.g., monitoring of environmental parameters in a chemical plant) to surveillance appl...
Sergio Ilarri, Ouri Wolfson, Eduardo Mena, Arantza...
HICSS
2006
IEEE
123views Biometrics» more  HICSS 2006»
14 years 5 months ago
Reexamining Media Capacity Theories Using Workplace Instant Messaging
This study empirically examines the general propositions of media capacity theories using a newer and increasing popular communication medium: Instant Messaging. We developed hypo...
Yu-Ting Caisy Hung, Wei-Chang Kong, Ai-Ling Chua, ...
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
14 years 5 months ago
The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
Qing Hu, Paul Hart, Donna Cooke
HICSS
2006
IEEE
113views Biometrics» more  HICSS 2006»
14 years 5 months ago
Examining Cross-Agency Collaborations in E-Government Initiatives
Cross-agency collaborations are critical to the success of e-government, which has great potential to transform the way that governments work, share information and deliver servic...
Paul Jen-Hwa Hu, Dai Cui, Alan Charles Sherwood
HICSS
2006
IEEE
97views Biometrics» more  HICSS 2006»
14 years 5 months ago
Dynamically Optimizing Parameters in Support Vector Regression: An Application of Electricity Load Forecasting
This study develops a novel model, GA-SVR, for parameters optimization in support vector regression and implements this new model in a problem forecasting maximum electrical daily...
Chin-Chia Hsu, Chih-Hung Wu, Shih-Chien Chen, Kang...