Sciweavers

HICSS
2011
IEEE
386views Biometrics» more  HICSS 2011»
12 years 8 months ago
Cloud Hooks: Security and Privacy Issues in Cloud Computing
In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that...
Wayne A. Jansen
HICSS
2011
IEEE
247views Biometrics» more  HICSS 2011»
12 years 8 months ago
Model-Driven Development Meets Security: An Evaluation of Current Approaches
Although our society is critically dependent on software systems, these systems are mainly secured by protection mechanisms during operation instead of considering security issues...
Kresimir Kasal, Johannes Heurix, Thomas Neubauer
HICSS
2011
IEEE
164views Biometrics» more  HICSS 2011»
12 years 8 months ago
Trace Ethnography: Following Coordination through Documentary Practices
We detail the methodology of ‘trace ethnography’, which combines the richness of participant-observation with the wealth of data in logs so as to reconstruct patterns and prac...
R. Stuart Geiger, David Ribes
HICSS
2011
IEEE
261views Biometrics» more  HICSS 2011»
12 years 8 months ago
Improved Patient Outcomes through Collaborative Monitoring and Management of Subtle Behavioral and Physiological Health Changes
This paper describes a highly mobile collaborative patient-centric, self-monitoring, symptom recognition and self intervention system along with a complementary clinical nursing t...
Paul J. Fortier, Brendon Puntin, Osama Aljaroudi
HICSS
2011
IEEE
235views Biometrics» more  HICSS 2011»
12 years 8 months ago
What Are the Business Benefits of Enterprise Mashups?
Enterprise mashups (EMs) are a new technology that enables the automation of situational needs of knowledge workers. EMs imply a new development paradigm based on the peer product...
Volker Hoyer, Katarina Stanoevska-Slabeva, Simone ...
HICSS
2011
IEEE
199views Biometrics» more  HICSS 2011»
12 years 8 months ago
Have IS Researchers Lost Bandura's Self-Efficacy Concept? A Discussion of the Definition and Measurement of Computer Self-Effica
There has been something of an academic debate between proponents of two different kinds of computer self-efficacy: general computer self-efficacy ala Compeau and Higgins on the o...
Jennifer L. Claggett, Dale Goodhue
HICSS
2011
IEEE
185views Biometrics» more  HICSS 2011»
12 years 8 months ago
Determinants of Mode of Innovation in IT Firms
Rajiv Banker, Sunil Wattal, Jose M. Plehn-Dujowich
HICSS
2011
IEEE
226views Biometrics» more  HICSS 2011»
12 years 8 months ago
Collaborative Learning through Wireless Grids
In this paper, we describe wireless grids, an emerging technology that enables ad hoc sharing of resources (such as screen, services and microphone) on edge devices (such as mobil...
Angela Usha Ramnarine-Rieks, Lee W. McKnight, Ruth...
HICSS
2011
IEEE
168views Biometrics» more  HICSS 2011»
12 years 8 months ago
WordBridge: Using Composite Tag Clouds in Node-Link Diagrams for Visualizing Content and Relations in Text Corpora
We introduce WordBridge, a novel graph-based visualization technique for showing relationships between entities in text corpora. The technique is a node-link visualization where b...
KyungTae Kim, Sungahn Ko, Niklas Elmqvist, David S...
HICSS
2011
IEEE
335views Biometrics» more  HICSS 2011»
12 years 8 months ago
Cyberinfrastructure for Secondary Use of EHR Data: SSA's Use of the Nationwide Health Information Network
This study examined the use of the Nationwide Health Information Network as a cyberinfrastructure for secure and interoperable transport of existing clinical data from electronic ...
Sue S. Feldman, Thomas A. Horan