Sciweavers

HICSS
2006
IEEE
169views Biometrics» more  HICSS 2006»
14 years 5 months ago
Bridging the Digital Divide: Feasibility of Training Community Health Advisors to Use the Internet for Health Outreach
We assessed the feasibility of “bridging the digital divide” by training community health advisors (CHAs) from low-income communities to use high-quality Internet-based health...
Thomas K. Houston, Kimberly Robinson, Eta Berner, ...
HICSS
2006
IEEE
117views Biometrics» more  HICSS 2006»
14 years 5 months ago
Assessing User Satisfaction of E-Government Services: Development and Testing of Quality-in-Use Satisfaction with Advanced Trave
The public sector provides a variety of services to citizens. The delivery of information for these services over electronic means such as the Internet forms an important componen...
Thomas A. Horan, Tarun Abhichandani, Raghuvira Ray...
HICSS
2006
IEEE
96views Biometrics» more  HICSS 2006»
14 years 5 months ago
The Impact of Electronic Monitoring on Hazard Communications
This research examines how monitoring electronic communications can influence the types and frequency of communication of potentially damaging information, which we term hazard co...
Carolyn F. Holton, Robert M. Fuller
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
14 years 5 months ago
Mobile RFID - A Case from Volvo on Innovation in SCM
Utilization of Radio Frequency Identification (RFID) is often presented as improving supply chain management even though there are still few in-depth studies that support the hype...
Magnus Holmqvist, Gunnar Stefansson
HICSS
2006
IEEE
115views Biometrics» more  HICSS 2006»
14 years 5 months ago
Enterprise Architecture Implementation and Management: A Case Study on Interoperability
The focus of this study is to explore why public agencies implement enterprise architecture programs and the interoperability challenges they are faced with when governing these p...
Kristian Hjort-Madsen
HICSS
2006
IEEE
165views Biometrics» more  HICSS 2006»
14 years 5 months ago
Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast
Secure multicast has a variety of applications in ecommerce, e-banking, command and control, video-ondemand, and other internet-based services. In this paper, we present algorithm...
Mohammad Hossain Heydari, Linda Morales, Ivan Hal ...
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
14 years 5 months ago
Hotlist or Bibliography? A Case of Genre on the Web
Bibliography—the collection, description, and arrangement of information items—is a vibrant activity and a popular form of expression on the internet. Yet, fashionable forms o...
David G. Hendry, Allyson Carlyle
HICSS
2006
IEEE
86views Biometrics» more  HICSS 2006»
14 years 5 months ago
How Voluntary Online Learning Communities Emerge in Blended Courses
A comparative case study used content analysis to observe the emergence of voluntary online learning communities in two blended courses. The study developed an interaction-based a...
Robert Heckman, Qing Li, Xue Xiao
HICSS
2006
IEEE
122views Biometrics» more  HICSS 2006»
14 years 5 months ago
Experiences and Media Perceptions of Senders and Receivers in Knowledge Transfer: An Exploratory Study
Guided by knowledge transfer (KT) literature and Channel Expansion Theory (CET), we explore the relationship between the KT process, role-based experiences and media perceptions i...
Bryan K. Hasty, Anne P. Massey, Susan A. Brown
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
14 years 5 months ago
Using Social Network Analysis to Test an IT-Enabled Business Process Reengineering Theory
After more than a decade of research in information technology-enabled business process reengineering (BPR), no clear theory explains the link between information technology (IT) ...
Nik R. Hassan, Tom C. Richards, Jack D. Becker