Sciweavers

1733 search results - page 69 / 347
» Critical Information Systems Research: A Habermasian Approac...
Sort
View
HICSS
2008
IEEE
236views Biometrics» more  HICSS 2008»
15 years 7 months ago
A Case Study: Introducing eXtreme Programming in a US Government System Development Project
The US Military’s ability to meet its mission critical requirements calls for increased agility in its information technology development process. The purpose of this case study...
Ann L. Fruhling, Patrick McDonald, Christopher Dun...
GIS
2010
ACM
14 years 11 months ago
Moving forward: location privacy and location awareness
ended abstract looks forward at which shared concepts and approaches are shaping future research in the field of location privacy, as well as reflecting on the broader achievement...
Matt Duckham
IEEESCC
2006
IEEE
15 years 7 months ago
On Exploiting System Dynamics Modeling to Identify Service Requirements
SOA provides a flexible framework for betterintegrated systems that meet business needs. However, the existing methods are not successful in helping business analysts to devise ap...
Lianjun An, Jun-Jang Jeng, Cagdas E. Gerede
CSCW
2004
ACM
15 years 1 months ago
Ordering Systems: Coordinative Practices and Artifacts in Architectural Design and Planning
In their cooperative effort, architects depend critically on elaborate coordinative practices and artifacts. The article presents, on the basis of an in-depth study of architectura...
Kjeld Schmidt, Ina Wagner
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
15 years 7 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood