This paper suggests that the effects of counterterrorism policy on Violent Non-State Actors can be explored via systems dynamics. Specifically, we create a descriptive model of th...
Information technologies hold great promise in their ability to link distributed workers, allowing organizations to take advantage of the potential benefits of effectively gatheri...
Terri L. Griffith, Mark A. Fuller, Gregory B. Nort...
Many organizations pursue knowledge management (KM) initiatives, with different degrees of success. One key aspect of KM often neglected in practice is that it not only concerns t...
This research, draws upon an integrative model of IT business value, examines the mediating effect of an "IT organizational assimilation capacity" between IS integration...
This paper describes the human computer interface of a new emergency medical services application, which uses several emerging technologies to clarify the inherent complexity and ...
— This paper demonstrates how two different sets of powerful domain specific language features can be specified and deployed as composable language extensions. These extensions...
Speech recognition has matured over the past years to the point that companies can seriously consider its use. However, from a developer’s perspective we observe that speech inp...
Werner Kurschl, Stefan Mitsch, Rene Prokop, Johann...
Increasing use of e-government has raised issues about the privacy of information provided by citizens to government. This paper explores the experiences and concerns of New Zeala...
This paper examines the relationship between time duration and the quality of brainstorming output. Quality of brainstorming output is operationalized using creativity and feasibi...