Drawing a distinction between relational and nonrelational sources, we explore the antecedents to selecting an information source. The antecedents to use have been categorized int...
This paper proposes an approach to developing corporate policies for electronic commerce. The Internet and related public-private networks, such as EDI and Intranets are growing r...
We present a method for automatically learning a set of discriminatory facial components for face recognition. The algorithm performs an iterative growing of components starting w...
A method is presented for identifying individuals by shape, given a sequence of noisy silhouettes segmented from video. A spectral partitioning framework is used to cluster similar...
This study investigates how individuals assess risks in IT development projects under different conditions. We focus on three conditions: the perceived control over the IT project...
Stephen Du, Mark Keil, Lars Mathiassen, Yide Shen,...