Sciweavers

235 search results - page 14 / 47
» hicss 2006
Sort
View
HICSS
2006
IEEE
96views Biometrics» more  HICSS 2006»
15 years 3 months ago
The Impact of Electronic Monitoring on Hazard Communications
This research examines how monitoring electronic communications can influence the types and frequency of communication of potentially damaging information, which we term hazard co...
Carolyn F. Holton, Robert M. Fuller
HICSS
2006
IEEE
94views Biometrics» more  HICSS 2006»
15 years 3 months ago
Reporting On-Campus Crime Online: User Intention to Use
National surveys demonstrate that millions of crimes go unreported in the United States. Several reasons may contribute to this lack of reporting and we are investigating these po...
Alicia Iriberri, Gondy Leroy, Nathan Garrett
78
Voted
HICSS
2006
IEEE
118views Biometrics» more  HICSS 2006»
15 years 3 months ago
Information Quality as a Common Ground for Key Players in e-Government Integration and Interoperability
Whereas computer-supported sharing of information is a core issue of e-Government integration and interoperation, the key players involved hardly find any guidance how to settle f...
Ralf Klischewski, Hans Jochen Scholl
78
Voted
HICSS
2006
IEEE
142views Biometrics» more  HICSS 2006»
15 years 3 months ago
Measuring the Effectiveness of Honeypot Counter-Counterdeception
Honeypots are computer systems that try to fool cyberattackers into thinking they are ordinary computer systems, when in fact they are designed solely to collect data about attack...
Neil C. Rowe
HICSS
2006
IEEE
161views Biometrics» more  HICSS 2006»
15 years 3 months ago
The Collaboration Engineering Maturity Model
The focus of this paper is to introduce a comprehensive model for assessing and improving the maturity of Collaboration Engineering (CE) processes. The model is targeted at introd...
Eric L. Santanen, Gwendolyn L. Kolfschoten, Kastur...