Sciweavers

HICSS
2008
IEEE
396views Biometrics» more  HICSS 2008»
13 years 11 months ago
The Use of the UTAUT Model in the Adoption of E-Government Services in Kuwait
E-government initiatives are in their infancy in many developing countries. The success of these initiatives is dependent on government support as well as citizens’ adoption of ...
Suha AlAwadhi, Anne Morris
HICSS
2008
IEEE
87views Biometrics» more  HICSS 2008»
13 years 11 months ago
How Many Attackers Can Selfish Defenders Catch?
Marios Mavronicolas, Burkhard Monien, Vicky G. Pap...
HICSS
2008
IEEE
119views Biometrics» more  HICSS 2008»
13 years 11 months ago
Tree Mining in Mental Health Domain
The number of mentally ill people is increasing globally each year. Despite major medical advances, the identification of genetic and environmental factors responsible for mental ...
Maja Hadzic, Fedja Hadzic, Tharam S. Dillon
HICSS
2008
IEEE
155views Biometrics» more  HICSS 2008»
13 years 11 months ago
Pseudonymization for improving the Privacy in E-Health Applications
— Electronic health records (EHR) promise to improve communication between health care providers, thus leading to better quality of patients’ treatment and reduced costs. As hi...
Bernhard Riedl, Veronika Grascher, Stefan Fenz, Th...
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
13 years 11 months ago
STEALing Lab Support in Digital Forensics Education
Timothy M. Vidas, David A. Branch, Alex Nicoll
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
13 years 11 months ago
A Cross-Cultural Comparison of Perceived Strategic Importance of RFID for CIOs in Germany and Italy
Purpose: Drawing from literature on innovation, strategy and culture the objective of this study is to explore the role of perceived potentials and perceived strategic importance ...
Stefanie Jahner, Jan Marco Leimeister, Uta Franzis...
HICSS
2008
IEEE
89views Biometrics» more  HICSS 2008»
13 years 11 months ago
Reference Models and Modeling Languages for Product-Service Systems - Status-Quo and Perspectives for Further Research
Being confronted with decreasing margins and a rising customer demand for integrated solutions, manufacturing companies integrate complementary services into their portfolio. Offe...
Jörg Becker, Daniel Beverungen, Ralf Knackste...
HICSS
2008
IEEE
146views Biometrics» more  HICSS 2008»
13 years 11 months ago
Toward a Generic Model of Security in an Organizational Context: Exploring Insider Threats to Information Infrastructure
This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical in...
Ignacio J. Martinez-Moyano, Michael E. Samsa, Jame...
HICSS
2008
IEEE
161views Biometrics» more  HICSS 2008»
13 years 11 months ago
IT Business Alignment as Governance Tool for Firm-Internal Relationship Quality: A Longitudinal Case Study
Many business processes are relying on a smooth and flexible IT support. A major finding of IS research is that in order to generate value from IT the complementarities between IT...
Heinz-Theo Wagner, Tim Weitzel
HICSS
2008
IEEE
94views Biometrics» more  HICSS 2008»
13 years 11 months ago
The Impact of Conflict and Conflict Management Style on Deadbeats and Deserters in Virtual Teams
Individuals face additional challenges when interacting in virtual teams. The lack of media richness and the asynchronous nature of technologically transmitted messages make commu...
Kimberly A. Furumo