Sciweavers

703 search results - page 76 / 141
» Influencers and their barriers to technology
Sort
View
HICSS
2009
IEEE
105views Biometrics» more  HICSS 2009»
15 years 4 months ago
Note Taking and Note Sharing While Browsing Campaign Information
Participants were observed while searching and browsing the internet for campaign information in a mock-voting situation in three online note-taking conditions: No Notes, Private ...
Scott P. Robertson, Ravi K. Vatrapu, George Abraha...
HICSS
2008
IEEE
396views Biometrics» more  HICSS 2008»
15 years 4 months ago
The Use of the UTAUT Model in the Adoption of E-Government Services in Kuwait
E-government initiatives are in their infancy in many developing countries. The success of these initiatives is dependent on government support as well as citizens’ adoption of ...
Suha AlAwadhi, Anne Morris
CISIM
2007
IEEE
15 years 4 months ago
The Compact Three Stages Method of the Signature Recognition
In this paper the off–line type signature analyses have been considered. Signature image by means of three different approaches is analysed, what allows to define features (weigh...
Piotr Porwik
PERSUASIVE
2007
Springer
15 years 4 months ago
The Behavior Chain for Online Participation: How Successful Web Services Structure Persuasion
The success of many online services today depends on the company’s ability to persuade users to take specific actions, such as registering or inviting friends. We examined over 5...
B. J. Fogg, Dean Eckles
SEMWEB
2007
Springer
15 years 4 months ago
A Framework for Cooperative Ontology Construction Based on Dependency Management of Modules
To construct large scale ontologies, two major approaches are discussed by many researchers. One is a cooperative construction of ontologies, and the other is a modularization of o...
Kouji Kozaki, Eiichi Sunagawa, Yoshinobu Kitamura,...