Sciweavers

HICSS
2003
IEEE
359views Biometrics» more  HICSS 2003»
15 years 6 months ago
Assessing the Readiness of Firms for CRM: A Literature Review and Research Model
The concept of customer relationship management (CRM) resonates with managers in today's competitive economy. Yet recent articles in the business press have described CRM imp...
Rosalie J. Ocker, Susan Mudambi
HICSS
2003
IEEE
260views Biometrics» more  HICSS 2003»
15 years 6 months ago
Automating Land Management: An Interpretive Analysis of Information Technology Management within the Bureau of Land Management
Given societies’ massive investment in information technology and the potentially catastrophic consequences of IT failures, it is becoming increasingly critical to understand ho...
John C. Beachboard
HICSS
2003
IEEE
250views Biometrics» more  HICSS 2003»
15 years 6 months ago
A Method for Demand-Driven Information Requirements Analysis in Data Warehousing Projects
Information requirements analysis for data warehouse systems differs significantly from requirements analysis for conventional information systems. Existing data warehouse specifi...
Robert Winter, Bernhard Strauch
HICSS
2003
IEEE
221views Biometrics» more  HICSS 2003»
15 years 6 months ago
"Applying TAM to E-Services Adoption: The Moderating Role of Perceived Risk"
Consumer adoption of e-services is an important goal for many service providers, however little is known about how different consumer segments perceive and evaluate them for adopt...
Mauricio Featherman, Mark A. Fuller
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
15 years 6 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
Biometrics
Top of PageReset Settings