Sciweavers

HICSS
2007
IEEE
630views Biometrics» more  HICSS 2007»
15 years 6 months ago
The Ability-Motivation-Opportunity Framework for Behavior Research in IS
Some theoretical models used in IS research may lack explanatory power and consistency because of their failure to provide an adequate means of accounting for contextual and situa...
Jerald Hughes
HICSS
2007
IEEE
382views Biometrics» more  HICSS 2007»
15 years 6 months ago
Using Computer Simulation in Operating Room Management: Impacts on Process Engineering and Performance
Operating rooms are regarded as the most costly hospital facilities. Due to rising costs and decreasing reimbursements, it is necessary to optimize the efficiency of the operating...
Andre S. Baumgart, Anja Zöller, Christof Denz...
HICSS
2007
IEEE
269views Biometrics» more  HICSS 2007»
15 years 6 months ago
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process
This paper discusses the need for both a series of electronic tools and procedural changes to the evidence collection process to accommodate the possibilities of wireless technolo...
Benjamin Turnbull, Jill Slay
HICSS
2007
IEEE
258views Biometrics» more  HICSS 2007»
15 years 6 months ago
Enterprise Architecture and IT Governance: A Risk-Based Approach
The USCP had enormous challenges with its IT Program and support to the internal and external stakeholders of the Department, because of a fragile IT infrastructure. The IT Progra...
James R. Getter
HICSS
2007
IEEE
222views Biometrics» more  HICSS 2007»
15 years 6 months ago
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...
Biometrics
Top of PageReset Settings