Sciweavers

HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
13 years 11 months ago
Breaching the Knowledge Transfer Blockade in IT Offshore Outsourcing Projects - A Case from the Financial Services Industry
In this paper the authors present the results of a research project that strives to fill a literature gap in IT offshore outsourcing research by analyzing clientside managerial me...
Robert Gregory, Roman Beck, Michael Prifling
HICSS
2009
IEEE
88views Biometrics» more  HICSS 2009»
13 years 11 months ago
Automatic Voltage Controllers for South Korean Power System
The paper proposes two automatic voltage controllers for the South Korean power system. Simulation results from detailed Korean power-flow models show that the controllers can pro...
Xing Liu, Vaithianathan Venkatasubramanian, Tae-Ky...
HICSS
2009
IEEE
111views Biometrics» more  HICSS 2009»
13 years 11 months ago
Supporting the Design of Health Information Systems: Action Research as Knowledge Translation
In this paper we show how action research contributes to the design of health information systems by constructing knowledge addressing users’ concerns in a timely manner. Our ai...
Pernille Bjørn, Ellen Balka
HICSS
2009
IEEE
121views Biometrics» more  HICSS 2009»
13 years 11 months ago
People Sensemaking and Relationship Building on an Enterprise Social Network Site
This paper describes a social network site designed to support employees within an enterprise in connecting and learning about each other through personal and professional sharing...
Joan Morris DiMicco, Werner Geyer, David R. Millen...
HICSS
2009
IEEE
101views Biometrics» more  HICSS 2009»
13 years 11 months ago
Building a Better Similarity Trap with Statistically Improbable Features
One of the persistent topics in digital forensic research in recent years has been the problem of finding all things similar. Developed tools usually take on the form of similarit...
Vassil Roussev
HICSS
2009
IEEE
73views Biometrics» more  HICSS 2009»
13 years 11 months ago
Towards Tool Support for the Configuration of Non-Functional Properties in SPLs
Julio Sincero, Wolfgang Schröder-Preikschat, ...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
13 years 11 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
13 years 11 months ago
Understanding the "Boundary" in Information Sharing and Integration
The definition of “boundary” in the context of multiorganizational information sharing and integration initiatives is developed in the paper. Both current literature and a cas...
Lei Zheng, Tung-Mou Yang, Theresa A. Pardo, Yuanfu...
HICSS
2009
IEEE
94views Biometrics» more  HICSS 2009»
13 years 11 months ago
A Pragmatic Framework for Ethical Decision Making: The Limits of Professional Codes
The need for professionals to make informed ethical choices in design and management of information systems is more important than ever. However, the relative newness of the infor...
Robert M. Mason, Kevin Gallagher
HICSS
2009
IEEE
111views Biometrics» more  HICSS 2009»
13 years 11 months ago
The Financial Impact of IT Governance Mechanisms' Adoption: An Empirical Analysis with Brazilian Firms
Recently, it appears on the agenda of many organizations the concept of IT governance in order to justify and mainly optimize IT investments. Some studies have shown that companie...
Guilherme Lerch Lunardi, João Luiz Becker, ...