Sciweavers

4324 search results - page 667 / 865
» Online social networks
Sort
View
ICIS
2000
15 years 3 months ago
Initial trust, perceived risk, and the adoption of internet banking
Studieson the adoptionof business-to-consumere-commerce have not simultaneouslyconsideredtrust and risk as important determinants of adoption behavior. Further, trust in informati...
Kyung Kyu Kim, Bipin Prabhakar
HICSS
2008
IEEE
215views Biometrics» more  HICSS 2008»
15 years 2 months ago
Harry Potter and the Meat-Filled Freezer: A Case Study of Spontaneous Usage of Visualization Tools
This paper is a report on early user activity in Many Eyes, a public web site where users may upload data, create visualizations, and carry on discussions. Since the site launched...
Fernanda B. Viégas, Martin Wattenberg, Matt...
AEI
2007
119views more  AEI 2007»
15 years 1 months ago
Exploring the CSCW spectrum using process mining
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
92
Voted
BEHAVIOURIT
2007
91views more  BEHAVIOURIT 2007»
15 years 1 months ago
Reality is our laboratory: communities of practice in applied computer science
This paper presents a longitudinal study of the course ‘High-tech Entrepreneurship and New Media’. The course design is based on socio-cultural theories of learning and consid...
Markus Rohde, Ralf Klamma, Matthias Jarke, Volker ...
110
Voted
CLEIEJ
2008
88views more  CLEIEJ 2008»
15 years 1 months ago
A Trust Model for a Group of E-mail Servers
E-mail services are essential in the Internet. However, the current e-mail architecture presents problems that open it to several threats. Alternatives have been proposed to solve...
Leonardo de Oliveira, Carlos Maziero