Sciweavers

349 search results - page 36 / 70
» hicss 2003
Sort
View
82
Voted
HICSS
2003
IEEE
110views Biometrics» more  HICSS 2003»
15 years 3 months ago
Telecommunication Infrastructure Investments and Firm Performance
This research adopts Barua’s [1] three-tier Business Value Complementarity (BVC) model to study the performance of telephone companies (Telcos). Our study integrates constructs ...
Hy Sonya Hsu, Siva K. Balasubramanian
74
Voted
HICSS
2003
IEEE
139views Biometrics» more  HICSS 2003»
15 years 3 months ago
Modeling of information dominance in complex systems: A system partitioning and hybrid control framework
This paper1 provides a view of modeling the information dominance problem of military systems as representative of modeling other complex systems. The ideas are an extension of ea...
John R. James
80
Voted
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 3 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
15 years 3 months ago
Can IT Help Government to Restore Public Trust?: Declining Public Trust and Potential Prospects of IT in the Public Sector
During the past four decades, public trust in governments has continued to diminish due to various administrative, political, socio-cultural, economic, and mass media causes. Focu...
M. Jae Moon
123
Voted
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
15 years 3 months ago
Message Sense Maker: Engineering a Tool Set for Customer Relationship Management
To determine the important trends and issues in thousands of comments from customers and make strategic decisions about business operations, managers must go over these messages m...
Dmitri Roussinov, J. Leon Zhao