Sciweavers

HICSS
2006
IEEE
141views Biometrics» more  HICSS 2006»
13 years 11 months ago
An Ontology-Based Architecture for Knowledge Commerce
Inter-organizational knowledge networks and knowledge marketplaces have emerged in order to enable organizations to share or commercially exploit their knowledge outside narrow or...
Kostas Kafentzis, Panos Georgolios, Athanasios Bou...
HICSS
2006
IEEE
150views Biometrics» more  HICSS 2006»
13 years 11 months ago
E-Government Evaluation: Reflections on Two Organisational Studies
Senior executives in public sector organisations have been charged with delivering an e-Government agenda. A key emerging area of research is that of the evaluation of e-Governmen...
Stephen Jones, Zahir Irani, Amir M. Sharif, Marino...
HICSS
2006
IEEE
111views Biometrics» more  HICSS 2006»
13 years 11 months ago
Physical Security and Vulnerability Modeling for Infrastructure Facilities
Dean A. Jones, Chad E. Davis, Mark A. Turnquist, L...
HICSS
2006
IEEE
101views Biometrics» more  HICSS 2006»
13 years 11 months ago
IT Projects: Conflict, Governance, and Systems Thinking
Triggered by several embarrassing (and costly) IT project collapses in New Zealand’s public sector, a government report found that effective project control required good govern...
David Johnstone, Sid L. Huff, Beverley G. Hope
HICSS
2006
IEEE
75views Biometrics» more  HICSS 2006»
13 years 11 months ago
Computer Security Risks in the Internet Era: Are Small Business Owners Aware and Proactive?
This article empirically examines the awareness, concern, and actions of home-based small business owners regarding Internet-based computer security risks. A scientific, Internet-...
David W. Johnson, Harold Koch
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
13 years 11 months ago
Assessment of Enterprise Information Security - The Importance of Information Search Cost
There are today several methods and standards available for assessment of the level of information security in an enterprise. A problem with these assessment methods is that they ...
Erik Johansson, Mathias Ekstedt, Pontus Johnson
HICSS
2006
IEEE
145views Biometrics» more  HICSS 2006»
13 years 11 months ago
Resource Decisions in Software Development Using Risk Assessment Model
The resource decisions in software project using cost models do not satisfy managerial decision, as it does not support trade-off analysis among resources. A Bayesian net approach...
Wiboon Jiamthubthugsin, Daricha Sutivong
HICSS
2006
IEEE
90views Biometrics» more  HICSS 2006»
13 years 11 months ago
Text Understanding Agents and the Semantic Web
— We discuss the challenges involved in adapting the OntoSem natural language processing system to the Web. One set of tasks involves processing Web documents, translating their ...
Akshay Java, Tim Finin, Sergei Nirenburg
HICSS
2006
IEEE
170views Biometrics» more  HICSS 2006»
13 years 11 months ago
A Complex Adaptive System Perspective of Enterprise Architecture in Electronic Government
Within the public sector, the deployment of enterprise architecture is often an attempt to address the decentralization/centralization relationships to improve the links between t...
Marijn Janssen, George Kuk
HICSS
2006
IEEE
94views Biometrics» more  HICSS 2006»
13 years 11 months ago
Reporting On-Campus Crime Online: User Intention to Use
National surveys demonstrate that millions of crimes go unreported in the United States. Several reasons may contribute to this lack of reporting and we are investigating these po...
Alicia Iriberri, Gondy Leroy, Nathan Garrett