Sciweavers

HICSS
2007
IEEE
134views Biometrics» more  HICSS 2007»
13 years 11 months ago
Barriers to Adoption of e-Government
Technology adoption is well defined in e-business. The environment within which leaders must act in government is significantly different that that navigated by business leaders. ...
Wm. Arthur Conklin
HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
13 years 11 months ago
An Observational Study of Voters on the Internet
Voters in a democracy have the responsibility to learn about the candidates and issues on which they are deciding. The internet offers voters unparalleled opportunities for findin...
Scott P. Robertson, Christine E. Wania, Sang Joon ...
HICSS
2007
IEEE
133views Biometrics» more  HICSS 2007»
13 years 11 months ago
Assembling Sensor Networks
Sometimes sensors need to be assembled in response to an emergency. Such assemblage might take a variety of forms. At one extreme, sensors might converge on a single point. At the...
Jeffrey V. Nickerson
HICSS
2007
IEEE
85views Biometrics» more  HICSS 2007»
13 years 11 months ago
The Impact of Value on Governance Decisions for IT-Based Alliances: Evidence from a Joint Venture in the Wireless Networks Indus
Consideration of cost and resource benefits generated from an alliance have prevailed the theoretical and empirical research about strategic alliances and value networks/ webs. As...
Adamantia G. Pateli, George M. Giaglis
HICSS
2007
IEEE
134views Biometrics» more  HICSS 2007»
13 years 11 months ago
A Classifier to Evaluate Language Specificity of Medical Documents
Consumer health information written by health care professionals is often inaccessible to the consumers it is written for. Traditional readability formulas examine syntactic featu...
Trudi Miller, Gondy Leroy, Samir Chatterjee, Jie F...
HICSS
2007
IEEE
182views Biometrics» more  HICSS 2007»
13 years 11 months ago
An Empirical Assessment of Factors that Influence the Effectiveness of SMS Advertising
Mobile advertising has emerged as one of the most popular applications in mobile commerce, particularly in the form of SMS advertising campaigns. However, looking at the process o...
Dimitris Drossos, George M. Giaglis, George Lekako...
HICSS
2007
IEEE
102views Biometrics» more  HICSS 2007»
13 years 11 months ago
Social Facilitators and Inhibitors to Online Fluency
Studies of Internet use continue to show a gap between those with and without access to the Internet and its resources. However, recent work indicates that this is not a straightf...
Caroline Haythornthwaite
HICSS
2007
IEEE
132views Biometrics» more  HICSS 2007»
13 years 11 months ago
Complex Interacting Infrastructure Systems
Critical infrastructures have some of the characteristic properties of complex systems. They exhibit infrequent large failures events. These events, though infrequent, often obey ...
Ian Dobson
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
13 years 11 months ago
Insuring Big Losses Due to Security Breaches through Insurance: A Business Model
Security breaches deter e-commerce activities. Organizations spend millions of dollars on security appliances to make online transactions more secure. Nonetheless, a new virus or ...
Arunabha Mukhopadhyay, Samir Chatterjee, Rahul Roy...