Sciweavers

HICSS
2009
IEEE
127views Biometrics» more  HICSS 2009»
14 years 11 hour ago
A Conceptual and Operational Definition of 'Social Role' in Online Community
Both online and off, people frequently perform particular social roles. These roles organize behavior and give structure to positions in local networks. As more of social life bec...
Eric Gleave, Howard T. Welser, Thomas M. Lento, Ma...
HICSS
2009
IEEE
147views Biometrics» more  HICSS 2009»
14 years 11 hour ago
Determining a Firm's Optimal Outsourcing Rate: A Learning Model Perspective
We present a decision model of a firm’s optimal outsourcing rate as an extension of Cha et. al [1]’s previous work on the economic risk of knowledge loss and deskilling in the...
Hoon S. Cha, David E. Pingry, Matt E. Thatcher
HICSS
2009
IEEE
177views Biometrics» more  HICSS 2009»
14 years 11 hour ago
Intelligent Alarm Processing: From Data Intensive to Information Rich
The requirement for power system operators to respond more efficiently to the stressed power system conditions that may create large number of alarms asks fort advanced alarm proc...
Mladen Kezunovic, Yufan Guan
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
14 years 11 hour ago
EM Enforcing Information Flow Properties using Compensating Events
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...
Thoshitha T. Gamage, Bruce M. McMillin
HICSS
2009
IEEE
106views Biometrics» more  HICSS 2009»
14 years 11 hour ago
IT Capacities Assessment Tool: A Survey of Hospitals in Canada
This study presents an IT assessment tool that aims at capturing the level of IT sophistication in hospitals. In order to develop a measure that reflects IT capacities in hospital...
Mirou Jaana, Guy Paré, Claude Sicotte
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
14 years 11 hour ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
HICSS
2009
IEEE
176views Biometrics» more  HICSS 2009»
14 years 11 hour ago
The Effects of Culture of Adoption of Telemedicine in Medically Underserved Communities
Within the information systems discipline, three streams have emerged that address the issue of information technology adoption, diffusion and use. The first examines the factors ...
Stacie N. Nwabueze, Peter Meso, Victor Wacham A. M...
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
14 years 11 hour ago
Breaching the Knowledge Transfer Blockade in IT Offshore Outsourcing Projects - A Case from the Financial Services Industry
In this paper the authors present the results of a research project that strives to fill a literature gap in IT offshore outsourcing research by analyzing clientside managerial me...
Robert Gregory, Roman Beck, Michael Prifling
HICSS
2009
IEEE
88views Biometrics» more  HICSS 2009»
14 years 11 hour ago
Automatic Voltage Controllers for South Korean Power System
The paper proposes two automatic voltage controllers for the South Korean power system. Simulation results from detailed Korean power-flow models show that the controllers can pro...
Xing Liu, Vaithianathan Venkatasubramanian, Tae-Ky...
HICSS
2009
IEEE
111views Biometrics» more  HICSS 2009»
14 years 11 hour ago
Supporting the Design of Health Information Systems: Action Research as Knowledge Translation
In this paper we show how action research contributes to the design of health information systems by constructing knowledge addressing users’ concerns in a timely manner. Our ai...
Pernille Bjørn, Ellen Balka