Sciweavers

669 search results - page 69 / 134
» critical 2005
Sort
View
HICSS
2005
IEEE
125views Biometrics» more  HICSS 2005»
15 years 5 months ago
An Ontological Approach for Recovering Legacy Business Content
— Legacy Information Systems (LIS) pose a challenge for many organizations. On one hand, LIS are viewed as aging systems needing replacement; on the other hand, years of accumula...
Aseem Daga, Sergio de Cesare, Mark Lycett, Christo...
HICSS
2005
IEEE
188views Biometrics» more  HICSS 2005»
15 years 5 months ago
Developing Group Decision Support Systems for Deception Detection
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Amit V. Deokar, Therani Madhusudan
HICSS
2005
IEEE
153views Biometrics» more  HICSS 2005»
15 years 5 months ago
Developing a Knowledge-Based Organizational Performance Model for Discontinuous Participatory Enterprises
Our research seeks to understand how to extend established organization theory and emerging knowledgeflow theory to inform the design of organizations with discontinuous participa...
Rahinah Ibrahim, Mark E. Nissen
HICSS
2005
IEEE
131views Biometrics» more  HICSS 2005»
15 years 5 months ago
It's More than Just Use: An Investigation of Telemedicine Use Quality
Many information systems (IS) studies portray use as an indicator of system success. However, “simply saying that more use will yield more benefits without considering the natur...
Cynthia LeRouge, Alan R. Hevner
HICSS
2005
IEEE
145views Biometrics» more  HICSS 2005»
15 years 5 months ago
Risk Assessment in Complex Interacting Infrastructure Systems
Critical infrastructures have some of the characteristic properties of complex systems. They exhibit infrequent large failures events. These events, though infrequent, often obey ...
David E. Newman, Bertrand Nkei, Benjamin A. Carrer...