Sciweavers

HICSS
2007
IEEE
98views Biometrics» more  HICSS 2007»
13 years 11 months ago
A Tool for Training and Assistance in Emergency Response Planning
This paper presents research on developing a new type of software tool for training and assisting the personnel in emergency response planning. The tool, called Disciple-VPT, will...
Gheorghe Tecuci, Mihai Boicu, Thomas Hajduk, Dorin...
HICSS
2007
IEEE
93views Biometrics» more  HICSS 2007»
13 years 11 months ago
Understanding CIO Role Effectiveness: The Antecedents and Consequents
This research-in-progress paper describes the development of a research model exploring the antecedents and consequents of CIO role effectiveness. Specifically, we argue that CIO ...
Daniel Q. Chen, David S. Preston
HICSS
2007
IEEE
136views Biometrics» more  HICSS 2007»
13 years 11 months ago
Analog and Hybrid Computation Approaches for Static Power Flow
Analog and hybrid computation methods are areas of continued interest, particularly in specific applications where traditional digital computation techniques cannot achieve the de...
Aaron St. Leger, Chika O. Nwankpa
HICSS
2007
IEEE
174views Biometrics» more  HICSS 2007»
13 years 11 months ago
A Comparison of Statistical Approaches for Genetic Anticipation with Application to Pancreatic Cancer
Genetic anticipation for a particular disease can involve an earlier age at onset (or, diagnosis), greater severity, and/or a higher number of affected individuals in successive g...
Gleb R. Haynatzki, Randall E. Brand, Vera R. Hayna...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
13 years 11 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
HICSS
2007
IEEE
144views Biometrics» more  HICSS 2007»
13 years 11 months ago
Automatic Web Page Categorization using Principal Component Analysis
Today’s search engines retrieve tens of thousands of web pages in response to fairly simple query articulations. These pages are retrieved on the basis of the query terms occurr...
Richong Zhang, Michael A. Shepherd, Jack Duffy, Ca...
HICSS
2007
IEEE
113views Biometrics» more  HICSS 2007»
13 years 11 months ago
Understanding Changes in Consumer Payment Habits - Do Mobile Payments and Electronic Invoices Attract Consumers?
Mobile payment services have, thus far, failed to entice consumers. An apparent conclusion is that these services have failed to meet consumers’ payment needs. Deeper understand...
Tomi Dahlberg, Anssi Öörni
HICSS
2007
IEEE
72views Biometrics» more  HICSS 2007»
13 years 11 months ago
What Motivates Voluntary Engagement in Cooperative Information Systems
Firms invest heavily to develop on-line cooperative systems in the hope of creating unique value in the minds of their customers. However, when system use begins to decline, firms...
James B. Freedman
HICSS
2007
IEEE
192views Biometrics» more  HICSS 2007»
13 years 11 months ago
An Online Community as a New Tribalism: The World of Warcraft
Massive, multiplayer online role-playing games foster rich social environments. Within the game, players can interact with other players, make friends, create and cultivate new on...
Thomas W. Brignall III, Thomas L. Van Valey
HICSS
2007
IEEE
79views Biometrics» more  HICSS 2007»
13 years 11 months ago
User-Based Evaluations of Search Engines: Hygiene Factors and Motivation Factors
In cyberspace, the emergence and increasing importance of search engine prompts numerous evaluation studies in regard to its effectiveness. Based on a user-oriented perspective, t...
Ya-Lan Chuang, Ling-Ling Wu