Sciweavers

HICSS
2009
IEEE
115views Biometrics» more  HICSS 2009»
14 years 1 months ago
Effects of Adaptivity and Other External Variables on Mobile Service Adoption
User Interface between user and information systems has a great role in system adoption. Based on technology acceptance model, acceptance of a system is explained as a function of...
Ebru Polat, Nuri Basoglu, Tugrul U. Daim
HICSS
2009
IEEE
111views Biometrics» more  HICSS 2009»
14 years 1 months ago
Beyond Microblogging: Conversation and Collaboration via Twitter
Courtenay Honeycutt, Susan C. Herring
HICSS
2009
IEEE
111views Biometrics» more  HICSS 2009»
14 years 1 months ago
Signs: Increasing Expression and Clarity in Instant Messaging
Despite its popularity, commercial instant messaging has changed little in the past 15 years. Conversations are linear, immutable, and susceptible to errors in turn-taking and ref...
Aaron Zinman, Judith S. Donath
HICSS
2009
IEEE
88views Biometrics» more  HICSS 2009»
14 years 1 months ago
SOA and EA - Sustainable Contributions for Increasing Corporate Agility
— Service oriented architectures (SOA) have been introduced for various reasons over the previous couple of
Joachim Schelp, Stephan Aier
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 1 months ago
Using Knowledge Management Systems to Structure Knowledgeable Practices
The purpose of this study is to explore the role of knowledge management systems (KMS) in structuring knowledgeable practices within organizations. Specifically, we consider how i...
Chad Saunders, Mike Chiasson
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
14 years 1 months ago
Interorganizational Governance of Information Technology
This study aims at better understanding how information technology (IT) governance supports organizations in their business exchanges with other organizations. Its main objective ...
Anne-Marie Croteau, François Bergeron
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
14 years 1 months ago
Information Security: User Precautions, Attacker Efforts, and Enforcement
We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
Ivan P. L. Png, Qiu-Hong Wang
HICSS
2009
IEEE
146views Biometrics» more  HICSS 2009»
14 years 1 months ago
A Dissemination Protocol to Guarantee Data Accessibility within N-Hops for Wireless Sensor Networks
One of the major challenges of designing a dissemination protocol for Wireless Sensor Networks (WSNs) is energy efficiency. Flooding and SPIN, which are very well-known proactive ...
Moonseong Kim, Matt W. Mutka, Sang-Hun Cho, Hyunse...
HICSS
2009
IEEE
129views Biometrics» more  HICSS 2009»
14 years 1 months ago
Using Collaborative Filtering Algorithms as eLearning Tools
Collaborative information filtering techniques play a key role in many Web 2.0 applications. While they are currently mainly used for business purposes such as product recommendat...
Frank Loll, Niels Pinkwart
HICSS
2009
IEEE
131views Biometrics» more  HICSS 2009»
14 years 1 months ago
Challenges in Software Product Line Composition
The idea to develop applications and infrastructure software as software product lines (SPLs) is continuously growing in acceptance throughout the software industry. The ability t...
Horst Schirmeier, Olaf Spinczyk