Sciweavers

131
Voted
HICSS
2008
IEEE
396views Biometrics» more  HICSS 2008»
15 years 7 months ago
The Use of the UTAUT Model in the Adoption of E-Government Services in Kuwait
E-government initiatives are in their infancy in many developing countries. The success of these initiatives is dependent on government support as well as citizens’ adoption of ...
Suha AlAwadhi, Anne Morris
HICSS
2008
IEEE
317views Biometrics» more  HICSS 2008»
15 years 7 months ago
Trust in Online Shopping: The Korean Student Experience
E-commerce has become an important part of business. In South Korea, the market size of online shopping malls was 13,460 billion Korean Won in 2006, and this figure keeps growing....
Ji-Seok Yoo, Jae-Nam Lee, Julian Hoffmann
91
Voted
HICSS
2008
IEEE
308views Biometrics» more  HICSS 2008»
15 years 7 months ago
The 8C Framework as a Reference Model for Collaborative Value Webs in the Context of Web 2.0
After a decade of innovations and advancement in Internet technologies (roughly from early 1990s to early 2000s), the first generation of Web-based
T. Andrew Yang, Dan J. Kim, Vishal Dhalwani, Tri K...
HICSS
2008
IEEE
251views Biometrics» more  HICSS 2008»
15 years 7 months ago
Business Process Modeling: A Service-Oriented Approach
This research concerns the definition of a service-oriented approach for business processes modeling. Business services are reusable process units that contain one or several proc...
Corine Cauvet, Gwladys Guzelian
HICSS
2008
IEEE
237views Biometrics» more  HICSS 2008»
15 years 7 months ago
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
Biometrics
Top of PageReset Settings