Sciweavers

2491 search results - page 384 / 499
» Social Networking
Sort
View
ICIS
2000
15 years 5 months ago
Initial trust, perceived risk, and the adoption of internet banking
Studieson the adoptionof business-to-consumere-commerce have not simultaneouslyconsideredtrust and risk as important determinants of adoption behavior. Further, trust in informati...
Kyung Kyu Kim, Bipin Prabhakar
150
Voted
AEI
2007
119views more  AEI 2007»
15 years 4 months ago
Exploring the CSCW spectrum using process mining
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
CLEIEJ
2008
88views more  CLEIEJ 2008»
15 years 4 months ago
A Trust Model for a Group of E-mail Servers
E-mail services are essential in the Internet. However, the current e-mail architecture presents problems that open it to several threats. Alternatives have been proposed to solve...
Leonardo de Oliveira, Carlos Maziero
IJON
2008
98views more  IJON 2008»
15 years 4 months ago
Factorisation and denoising of 0-1 data: A variational approach
Presence-absence (0-1) observations are special in that often the absence of evidence is not evidence of absence. Here we develop an independent factor model, which has the unique...
Ata Kabán, Ella Bingham
IJKL
2007
97views more  IJKL 2007»
15 years 4 months ago
Knowledge society arguments revisited in the semantic technologies era
: In the light of high profile governmental and international efforts to realise the knowledge society, I review the arguments made for and against it from a technology standpoint....
Yannis Kalfoglou