hicss 2012 论文列表

45th Hawaii International International Conference on Systems Science (HICSS-45 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui, HI, USA.

Wireless Grids for Cultural Self-Preservation: Assessing E-Readiness in a Native American Nation.
Topology Skewing for Improved Route Selection in Wireless Multi-hop Networks.
The Impact of Temporal Factors on Mobility Patterns.
Security Vulnerabilities in Hybrid Flow-Specific Traffic-Adaptive Medium Access Control.
Precision Geolocation of Mobile WiMax Subscribers Using Timing Adjust Measurements.
Analysis and Evaluation of the German Toll System Using a Holistic Executable Specification.
Using Virtualization to Ensure Uninterrupted Access to Software Applications for Financial Services Firms.
Teaching Hypervisor Design, Implementation, and Control to Undergraduate Computer Science and Computer Engineering Students.
Improving the Latency of VMExit Forwarding in Recursive Virtualization for the x86 Architecture.
Partitioning Trust in Network Testbeds.
On the Fault-Detection Capabilities of Adaptive Random Test Case Prioritization: Case Studies with Large Test Suites.
New Trends in Security Evaluation of Bayesian Network-Based Malware Detection Models.
Effort Estimates for Vulnerability Discovery Projects.
Effectiveness of Random Testing of Embedded Systems.
Cloud Chamber: A Self-Organizing Facility to Create, Exercise, and Examine Software as a Service Tenants.
Automated Behavior Computation for Software Analysis and Validation.
Lightweight Introduction of EAST-ADL2 in an Automotive Software Product Line.
An Information Systems Design Product Theory for Integrated Requirements, Test and Defect Management Systems.
Towards Cloud Computing SLA Risk Management: Issues and Challenges.
Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment.
Cloud Computing Security: From Single to Multi-clouds.
Challenges in Cross-Organizational Security Management.
Are Your Papers in Order? Developing and Enforcing Multi-tenancy and Migration Policies in the Cloud.
A New Deliberation Mechanism for Service-Oriented Operating Systems.
Investigating the Long-Term Acceptance of Agile Methodologies: An Empirical Study of Developer Perceptions in Scrum Projects.
Effect of Task Mental Models on Software Developer's Performance: An Experimental Investigation.
STAAF: Scaling Android Application Analysis with a Modular Framework.
Novel Anti-forensics Approaches for Smart Phones.
Including Stakeholder Perspectives in Digital Forensic Programs.
Cyber Crime Assessment.
Android: Static Analysis Using Similarity Distance.
Improving Security Assurance of Embedded Systems through Systemic Dissolution of Architected Resources.
Hardware-Assisted Application Integrity Monitor.
Foundations for Software Assurance.
Determining Software Product Release Readiness by the Change-Error Correlation Function: On the Importance of the Change-Error Time Lag.
Business Process Mining and Reconstruction for Financial Audits.
Analyzing Workflows in Business Processes for Obstructions due to Authorization Policies.
Towards a Framework for Assessing Agility.
The Many Lives of an Agile Story: Design Processes, Design Products, and Understandings in a Large-Scale Agile Development Project.
Scrum Practice Mitigation of Global Software Development Coordination Challenges: A Distinctive Advantage?
Identifying Common Characteristics in Fundamental, Integrated, and Agile Software Development Methodologies.
Automated Acceptance Testing as an Agile Requirements Engineering Practice.
Agile Values, Innovation and the Shortage of Women Software Developers.
Working under Grey Skies: Information Systems Development and Organizational Identity in a Post-merger Context.
Using Deterrence to Mitigate Employee Internet Abuse.
Organizing for Digital Infrastructure Innovation: The Interplay of Initiated and Sustained Attention.
Merging Conceptual Modeling and Law for Legally Compliant Information Systems Design-A Framework-Based Research Agenda.
Linking Relevance to Practical Significance.
Computing Requirements: Cognitive Approaches to Distributed Requirements Engineering.
On Countering Methods Erosion: Contributing towards Stronger and More Empirically Grounded Information Systems Theory.
Discovering the Multifaceted Roles of Information Technologies with a Holistic Configurational Theory Approach.
Developing Interfield Nomological Nets.
Conceptualizing the Organizational IT Artifact via the Construct of Organizational Integration.
Are We Becoming Socially Impaired? Computer-Mediated Communication, Human Evolution, and Social Capital.
What Influences IT Professional Psychological Contract Violation?
The Influences of Employees' Emotions and Cognition on IT Adoption: Some Perspectives from Iran.
Team and Organizational Identification among Information Systems Personnel: An Exploratory Investigation of Post IT Outsourcing Personnel Impacts.
Requirements Analysis for a Student Relationship Management System-Results from an Empirical Study in Ivy League Universities.
Professional or Faux Pas? Effects of Multicommunicating on the Analyst-User Relationship.
Investigating Social Computing in Competitive Dynamics.
Examining Trust within the Team in IT Startup Companies-An Empirical Study in the People's Republic of China.
Can ERP Adoptions Change Organisational Culture in Developing Countries in Asia? An Empirical Investigation.
An Exploratory Examination of Antecedents to Software Piracy: A Cross-Cultural Comparison.
The Chief Information Officer and Chief Financial Officer Dyad-How an Effective Relationship Impacts Individual Effectiveness and Strategic Alignment.
Resource-Based View in Empirical IT Business Value Research-An Evidence-Based Literature Review.
Reconsidering the Dimensions of Business-IT Alignment.
IT Governance Processes and IT Alignment: Viewpoints from the Board of Directors.
IT Governance Mechanisms in Multisourcing-A Business Group Perspective.
Finding the Right Balanced Scorecard for Business-Driven IT Management: A Literature Review.
Extending BITA Maturity Model from Organizational Culture Perspective.
Exploring the Influence of Vendor Reputation in IT Outsourcing Decisions: A Transaction Cost Perspective.
Email Governance: Are Companies in Financial Industries More Mature?
Cloudrise: Opportunities and Challenges for IT Governance at the Dawn of Cloud Computing.
An IT Balance Scorecard Design under Service Management Philosophy.
Aligning Multiple Definitions of Alignment-A Literature Review.
The Role of Objects in the Coordination of Knowledge-Intensive Projects: A Study of Computer Games Development.
SCRUM Project Architecture and Thriving Systems Theory.
Investigating the Interactive Effect of Control in Information Systems Development Projects.
Institutionalization, Embedded Rationality, and the Escalation of Commitment to IT Projects.
Humanizing User Influence Tactics in the Quest to Reduce Resistance against IT Project Management Methodology Use.
The Emergence of Information Infrastructure Risk Management in IT Services.
Determinants of User Involvement in Software Projects.
Comparing Risks in Individual Software Development and Standard Software Implementation Projects: A Delphi Study.
Celebrating IT Projects Success: A Multi-domain Analysis.
Stock Market Reaction to Information Technology Investments in the USA and Poland: A Comparative Event Study.
Potential of Cloud-Based Infrastructure for Small Business Development.
Measuring Social Capital in the Domain of Community Wireless Networks.
Determinants of Worldwide Technology Utilization and Availability a Geospatial and Regression Analysis.
Decision Enhancement Services for Small and Medium Enterprise Start-Ups in Uganda.
Challenges and Opportunities in Planning and Implementation of ICT for the Bottom of the Pyramid: An Experience Sharing from India.
Reminder Systems for Reducing No-shows in General Practices.
Product Performance Based Business Models: A Service Based Perspective.
Peaker Outsourcing for Service Systems with Time-Varying Arrival Rates.
Integrating Business Partners on Demand: The Effect on Capacity Planning for Cost Driven Support Processes.
Efficiency Implications of E-Procurement System Capabilities and Usage Behavior: Status Quo and Directions for Future Research.
E-Book Platform Competition in the Presence of Two-Sided Network Externalities.
Durable Goods Pricing in the Presence of Volatile Demand.
Co-production and Co-creation of Value: A Differential Games Approach.
An Exploratory Study of Supply Chain Management IT Solutions.
Potential of RFID in Emergency Management: Task-Technology Fit Perspective.
Evaluating Variance in Cost-Benefit Perceptions of RFID Systems in the Supply Chain Sector.
Determinants of RFID Technology Adoption Intention in the Saudi Retail Industry: An Empirical Study.
Upgrading to a New Version of an ERP System: A Multilevel Analysis of Influencing Factors in a Software Ecosystem.
Solution Based Procedures to Determine Business Models of Enterprise Systems Providers.
How Leadership Styles Impact Enterprise Systems Success throughout the Lifecycle: A Theoretical Exploration.
ERP and E-Business Systems Development, Innovation and Business Performance-An Empirical Investigation.
Contextual Aspects in Enterprise Integration.
Benefits Identification in Inter-organizational Information System Implementation Projects: A Multi-case Study Approach.
Are Enterprise System Related Misfits Always a Bad Thing?
A Design Proposal for a Benefits Management Method for Enterprise System Implementations.
The Misuse of Spreadsheets in the Nuclear Fuel Industry: The Falsification of Safety Critical Nuclear Fuel Data Using Spreadsheets at British Nuclear Fuels Limited (BNFL).
Reducing Unauthorized Access by Insiders through User Interface Design: Making End Users Accountable.
Flow Experiences in Learning to Use a Spreadsheet Application.
End User Computing: The Dark Matter (and Dark Energy) of Corporate IT.
Can Anybody Help?: Mitigating IS Development Project Risk with User Involvement.
An Individual's Problem Space and Web Information Searching: A Proposed Study on Mental Organization of Keyword Importance and Efficiency in Everyday Web Information Searching.
Versioning Strategy of Information Goods with Network Externality in the Presence of Piracy.
The Special Challenges of Ecommerce in China: A Preliminary Investigation of Sufficient Conditions for Generating Adequate Consumer Trust for Initial Launch.
Risk-Aware Service Level Agreement Design for Enterprise Information Systems.
Predicting Enterprise Efficiency: The Impact of IT Capability.
Platform Pricing with Strategic Buyers.
Optimal Digital Rights Management with Uncertain Piracy.
Network Centrality and Contributions to Online Public Good-The Case of Chinese Wikipedia.
Modularity and Inequality of Code Contribution in Open Source Software Development.
Live Show Everywhere: Distribution Dynamics and Internet Influence on Concert Location.
Implications of Negative Network Effect in the Security Software Market.
Content Contribution in Social Media: The Case of YouTube.
Competition and Strategic Partnership between Intermediary Platforms in the Presence of Heterogeneous Technologies.
Business Model Representation Incorporating Real Options: An Extension of e3-Value.
Structuring Organizational Communication: Employees' Role and Network Position as Predictive of Institutional Talk About the Adoption of Technology.
Recent Developments in the Global Telecommunication Network.
Multi-modal Multi-granular Analysis: Exploring Communication Networks under Varying Lenses.
Do Me a Solid? Information Asymmetry, Liking, and Compliance Gaining Online.
Communication Motives, Satisfaction, and Social Support in the Workplace: Are Supervisors Effective Support Sources in Employee Networks?
Two Cases on How to Improve the Visibility of Business Process Performance.
Towards Process-Oriented Recommender Capabilities in Flexible Process Environments-State of the Art.
Towards Business Process Modeling in Business Contracting-Analyzing Collaboration Contracts as a Field of Application for Process Models.
Standardization Frameworks in Services Offshoring: The Relationship between Process Implementation Thoroughness, Task Complexity, and Performance Improvement.
Network-Based Business Process Analysis.
Improving Healthcare Processes through Small-Scale Innovations.
Evaluating Business Models: Evidence on User Understanding and Impact to BPM Correspondence.
Development of a Generic Tool for the Application of Maturity Models-Results from a Design Science Approach.
Data Quality Requirements of Collaborative Business Processes.
Business Process Modelling Towards Derivation of Information Technology Goals.
An Integrative Model of IT-Enabled Business Process Change: Causal Structures in Theory, Research and Practice.
A Dynamic Capability-Based Framework for Business Process Management: Theorizing and Empirical Application.
Using Business Transactions to Analyse the Consistency of Business Process Models.
Mapping the Enterprise Architecture Principles in TOGAF to the Cybernetic Concepts-An Exploratory Study.
Improving Government Enterprise Architecture Practice-Maturity Factor Analysis.
Disentangling the Value of Information and Analytics through Componentized Business Architecture.
A Self-Fueling Coordination Model for Enterprise Architecting Effectiveness.
A Comprehensive EA Benefit Realization Model-An Exploratory Study.
Using Quantitative Analyses to Construct a Capability Maturity Model for Business Intelligence.
Towards a Method to Improve Alignment of Objective and Subjective Information Requirements of Decision Makers-The Potential of System Dynamics for Information Requirements Analysis.
The Strategic Role of Business Intelligence in the Extended Enterprise: BI Configurations for Control Affordances in Outsourcing.
The Impact of Agility Requirements on Business Intelligence Architectures.
Paradise by the Dashboard Light: Designing Governance Metrics in Turbulent Environments.
Managing the Enterprise Business Intelligence App Store: Sentiment Analysis Supported Requirements Engineering.
Extending BPMN for Business Activity Monitoring.
Critical Contextual Success Factors for Business Intelligence: A Delphi Study on Their Relevance, Variability, and Controllability.
Business Intelligence Challenges in the Context of Goods- and Service-Dominant Logic.
A Multi-agent Framework for Distributed Business Intelligence Systems.
The Creativity Passdown Effect: Sharing Design Thinking Processes with Design Theory.
Systematic Service Innovation in Organizations: EDCI-A Template for Human-Centered Design of E-Services.
IS Design Thinking in Disaster Management Research.
Combining Design Science and Design Research Perspectives-Findings of Three Prototyping Projects.
A Design Theory for IT Supporting Online Communities.
A Conceptual Framework to Construct an Artefact for Meta-Abstract Design Knowledge in Design Science Research.
Strategic Alignment and the Implementation of a Knowledge Management System: A Social Representation Perspective.
Leveraging Knowledge for Innovation: What Makes a Difference?
Knowledge Management Impact on Corporate Entrepreneurship: A Malaysian Study.
Knowledge Management and Innovation Performance in Australian Service Sector Organizations.
Investigating the Critical Success Factors and Infrastructure of Knowledge Management for Open Innovation Adoption: The Case of GlaxoSmithKline (GSK) in Egypt.
The Impact of Organizational Social Web Site Usage on Work Performance: A Multilevel Structural Interaction Perspective.
Dynamic Knowledge Mapping: A Visualization Approach for Knowledge Management Systems.
Diffusion of an Online Collaboration Tool: The Case of Google Wave Adoption Failure.
Design, Implementation, and Evaluation of a Virtual Meeting Tool-Based Innovation for UML Technology Training in Global Organizations.
Where to Look for Knowledge Management Success.
It's Not "Just" Validation: The Effect of Organizational Justice on Contributions to a Knowledge Repository.
Conceptualizing Knowledge Use: A Theoretical Framework and Empirical Study.
Understanding the Influence of Social Media in the Workplace: An Integration of Media Synchronicity and Social Capital Theories.
The Nature of Knowledge in the Social Media Age: Implications for Knowledge Management Models.
Social Technologies for Cross-Functional Product Development: SWOT Analysis and Implications.
Searching for Answers-Knowledge Exchange through Social Media in Organizations.
Return on Investment in Social Media-Does the Hype Pay Off? Towards an Assessment of the Profitability of Social Media in Organizations.
Knowledge Sharing in the Workplace: A Social Networking Site Assessment.
Knowledge-Based Theory of the Firm, Challenges by Social Media.
Guidelines to Align Communities of Practice with Business Objectives: An Application of Social Media.
Encouraging the Mindful Consideration of Enterprise 2.0: Design and Deployment of a GDSS-Supported Collaborative Strategic Episode.
Effectiveness of Knowledge Seeking Behaviors Embedded in Social Networks: A Perspective of Individuals in Workplaces.
Variation of Work Practices in Technology-Mediated Environment-Knowledge Work Activity Framework Perspective.
Opening the Black Box of Outsourcing Knowledge Intensive Business Processes-A Longitudinal Case Study of Outsourcing Recruiting Activities.
Knowledge Intensive Business Processes: An Exploratory Study.
Whom to Ask for What knowledge? A Comparison of Exchange Partners and Their Impact on Knowledge Types.
Understanding the Effect of Innovative Climate and Interaction Involvement on User Intention to Share Knowledge.
The Impact of Importance and Distribution on Information Exchange in Team Decision Making: Preliminary Results.
Project Complexity and Knowledge Transfer in Global Software Outsourcing Project Teams: A Transactive Memory Systems Perspective.
Knowledge Transfer within Organizations: A Social Network Perspective.
Knowledge Sharing Barriers in Growing Software Companies.
Knowledge Problems in Corrective Software Maintenance-A Case Study.
Explore the Knowledge Integration in Knowledge Teams from a Transactive Memory Perspective.
Encouraging Knowledge Contribution to Electronic Repositories: The Roles of Rewards and Job Design.
User Acceptance of Knowledge-Based System Recommendations: Explanations, Arguments, and Fit-Research in Progress.
KM Issues with Retiring and Transient Explosive Ordnance Disposal (EOD) Airmen and Their Impact on Air Force EOD Response Capabilities.
Expanding the Disaster Management Knowledge Space through Spatial Mediation.
Contribution and Limits of IT-Enabled Codification and Dissemination of Traditional Knowledge: Case of Bamiléké People.
A Role-Based Resource Management Approach for Emergency Organizations.
A Text Analysis Approach to Motivate Knowledge Sharing via Microsoft SharePoint.
How Can Knowledge Management Support Competence-Based Learning? Towards a Research Agenda.
Acculturation Disparity Analysis Model (ADAM): Experts and Apprentices.
A Framework for Reflective Business Process Management.
Matching Up the Gap between Perceived Importance and Knowledge for IT Skills among Australian Accountants.
Knowledge Creation and Financial Firm Performance: Mediating Processes from an Organizational Agility Perspective.
Barriers to Knowledge Acquisition, Transfer and Management in Regional Knowledge Economy Development.
Using Sequence Analysis to Classify Web Usage Patterns across Websites.
Forecasting the Unemployment Rate by Neural Networks Using Search Engine Query Data.
Diversification of Web Search Results through Social Interest Mining.
A Text Mining Model for Strategic Alliance Discovery.
Uncovering Multi-mediated Associations in Socio-technical Networks.
The Influence of Self-Concept Improvement on Member Loyalty to Online Communities: An Empirical Comparison between Social Networks and Virtual Worlds.
Social Media as a Driver for New Rhetorical Practices in Organisations.
Social Capital and Knowledge Sharing in Online Communities: A Mediation Model.
Self Discrepancy, Perceived Privacy Rights, and Contribution in Virtual Communities.
Purposive Sampling on Twitter: A Case Study.
Political Communication and Influence through Microblogging-An Empirical Analysis of Sentiment in Twitter Messages and Retweet Behavior.
Negotiating Cultural Values in Social Media: A Case Study from Wikipedia.
Linguistic Markers of Secrets and Sensitive Self-Disclosure in Twitter.
Idea Generation in Virtual Communities for Innovation: The Influence of Participants' Motivation on Idea Quality.
Categorizing Behavior in Online Communities: A Look Into the World of Cake Bakers.
Who Will Remain? An Evaluation of Actual Person-Job and Person-Team Fit to Predict Developer Retention in FLOSS Projects.
Network-Based Analysis of the Structure and Evolution of an Open Source Software Product.
Goals and Tasks: Two Typologies of Citizen Science Projects.
Describing the Software Forge Ecosystem.
Citizen Engineering: Methods for "Crowdsourcing" Highly Trustworthy Results.
An Empirical Study of Volunteer Members' Perceived Turnover in Open Source Software Projects.
Visualizing Behavioral Data from a 3D Virtual Learning Environment: A Preliminary Study.
Statistical Discourse Analysis of a Role-Based Online Discussion Forum: Patterns of Knowledge Construction.
Exposing Chat Features through Analysis of Uptake between Contributions.
Exploring Patterns and Configurations in Networked Learning Texts.
The Dual Regimes of Digital Innovation Management.
Human Capital in the Domain of Community Wireless Networks.
Business Models in the Software Industry.
Security Policy Compliance: User Acceptance Perspective.
Measuring Impact on Missions and Processes: Assessment of Cyber Breaches.
Manage Risks through the Enterprise Architecture.
Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior.
End User Perception of Online Risk under Uncertainty.
Assimilation of Security-Related Policies in U.S. Firms: An Empirical Study of Web Assimilation and Related Knowledge as Antecedents.
An Integrative Model of Information Security Awareness for Assessing Information Systems Security Risk.
A Composite Framework for Behavioral Compliance with Information Security Policies.
The Tradeoff between Online Community Activity and Consumption: Evidence from Online Poker.
The Impact of Observational Learning and Electronic Word of Mouth on Consumer Purchase Decisions: The Moderating Role of Consumer Expertise and Consumer Involvement.
Social Brand Value and the Value Enhancing Role of Social Media Relationships for Brands.
Revitalizing the P's of E-Marketing with Customer Experience Management.
Online Auctions and Multichannel Retailing.
Investigating Consumers' Variety Seeking Behavior in the Light of Online Reviews: An Individual Level Panel Analysis.
Digital Advertising's Human Toll: How Implied Cost-to-User Affects Web Content Platforms (A Research Proposal).
Cultural, Individual and Device-Specific Antecedents on Mobile Banking Adoption: A Cross-National Study.
The Implementation of Large-Scale Information Systems in Small and Medium-Sized Enterprises-A Case Study of Work-and Health-Related Consequences.
Social Aspects in Technology Acceptance: Theory Integration and Development.
Four Types of Attitudes in ICT Acceptance and Use? A Critical Assessment on the Basis of Empirical and Scientometric Data.
Exploring Factors Impacting Users' Attitude and Intention towards Social Tagging Systems.
Do I Want to Pay to Download Movies? Predicting Acceptance of Legal Online Movie Download Services.
Dissatisfaction Does Not Mean Rejection: A Theory of Reinvention of Applicable Technologies by Mindful and Unfaithful Users.
B2B E-Commerce Adoption by the Grocery Industry in Developing Countries: Indonesia versus Bahrain.
Algorithmic Trading Systems: A Multifaceted View of Adoption.
Visualization of ATM Usage Patterns to Detect Counterfeit Cards Usage.
Unethical Use of Information Technology: A Two-Country Study.
Moral Beliefs, Self-Control, and Sports: Effective Antidotes to the Youth Computer Hacking Epidemic.
Investigating the Effectiveness of IS Security Countermeasures towards Cyber Attacker Deterrence.
Empirical Analysis of Online Anonymity and User Behaviors: The Impact of Real Name Policy.
Using OWL Ontologies for Clinical Guidelines Based Comorbid Decision Support.
Secure and Reliable Distributed Health Records: Achieving Query Assurance across Repositories of Encrypted Health Data.
Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable Documents.
Pattern Discovery of User Interface Sequencing by Rehabilitation Clients with Cognitive Impairments.
Evaluating and Improving the Perioperative Process: Benchmarking and Redesign of Preoperative Patient Evaluations.
ESCAP: Towards the Design of an AI Architecture for a Virtual Counselor to Tackle Students' Exam Stress.
An Examination of the Relationships among IT Capability Intentions, IT Infrastructure Integration and Quality of Care: A Study in U.S. Hospitals.
A Hybrid Web Based Personal Health Record System Shielded with Comprehensive Security.
The Impact of IT on Quality of Care: Evaluation of an Integrated Chronic Disease Management System.
Technology Acceptance by Health Professionals in Canada: An Analysis with a Modified UTAUT Model.
Motivations Underlying the Adoption of ERP Systems in Healthcare Organizations: An Analysis from "Success Stories".
Measuring Users' Mental Strain When Performing Technology Based Surgical Tasks on a Surgical Simulator Using Thermal Imaging Technology.
IT Strategic Planning in a Pediatric Hospital: Overview of the Process and Outcomes.
IT Adoption: HealthCare Metrics Tracking.
Innovation in Weight Loss Intervention Programs: An Examination of a 3D Virtual World Approach.
Importance of the Relative Advantage of RFID as Enabler of Asset Management in the Healthcare: Results from a Delphi Study.
Factors in Physician Expectations of a Forthcoming Electronic Health Record Implementation.
Evolving the Business Model to Improve Care Performance for Remote Patient Management: A Case Study.
Evaluation of an Electronic Patient Record in a Nursing Home: One Size Fits All?
Evaluation and Neuronal Network-Based Classification of the PHRs Privacy Policies.
Evaluating the Impact of Electronic Health Records on Clinical Reasoning Performance.
Developing an Instrument for Information Quality for Clinical Decision Making.
Approach to the Evaluation of a Method for the Adoption of Information Technology Governance, Risk Management and Compliance in the Swiss Hospital Environment.
An E-Health Readiness Assessment Framework for Public Health Services-Pandemic Perspective.
A Method for Modeling Health Informatics Capacity in Patient Journeys Supported by Interprofessional Teams.
MindFlow: Intelligent Workflow for Clinical Trials in Mental Healthcare.
Efficient De-identification of Electronic Patient Records for User Cognitive Testing.
Use of, Preferences for, and Expectations Regarding Personal Health Records among People Affected by Cancer: Results of a LIVESTRONG Survey and the 2008 Health Information National Trends Survey.
Towards Semantically Enabled Next Generation Community Health Information Portals: The PopSciGrid Pilot.
Public Health Informatics: Increasing Use and Access.
PALMS: A Modern Coevolution of Community and Computing Using Policy Driven Development.
A Seeded Cloud Approach to Health Cyberinfrastructure: Preliminary Architecture Design and Case Applications.
Personal Health Records: Identifying Utilization Patterns from System Use Logs and Patient Interviews.
Investigation of a Consumer Focused Health IT System: The Role of Claimant Information in the Social Security Determination Process.
Improving the Compliance of Transplantation Medicine Patients with an Integrated Mobile System.
Cycles of Electronic Health Records Adaptation by Physicians: How Do the Positive and Negative Experiences with the EHR System Affect Physicians' EHR Adaptation Process?
Consumer Perspectives on Quality Attributes in Evaluating Health Websites.
Considering the Visual Element in Clinical Pediatric Data Management.
Access, Awareness and Use of Internet Self-Help Websites for Depression in University Students.
The Shape of Interoperability: Reviewing and Characterizing a Central Area within eGovernment Research.
The Revolution That Wasn't: Investigating Barriers to Platform-Based E-Service Delivery Partnerships.
Exploring the Motive for Data Publication in Open Data Initiative: Linking Intention to Action.
Attitudinal Determinants of E-Government Technology Use among U.S. Local Public Managers.
A Review of Success Factors and Challenges of Public Sector BPR Implementations.
Achieving Network Stability through Convergence-Case Study of an E-Government Project Using Actor Network Theory.
Tweets and Votes: A Study of the 2011 Singapore General Election.
Social Capital and the Networked Public Sphere: Implications for Political Social Media Sites.
Shepherding and Censorship: Discourse Management in the Tea Party Patriots Facebook Group.
Interactive Effects of Networked Publics and Social Media on Transforming the Public Sphere: A Survey of Iran's Leaderless 'Social Media Revolution'.
Understanding the Impact of Political Structure, Governance and Public Policy on E-Government.
Factors Influencing Citizen Adoption of E-Government Services: A Cross-Cultural Comparison (Research in Progress).
Incrementally Clustering Legislative Interpellation Documents.
Critical Success Factors for Shared Services: Results from Two Case Studies.
A Self-Determination Perspective on IT-Based Citizen Advisory Support.
Measurement of Open Government: Metrics and Process.
Identifying Informational Needs for Open Government: The Case of Egypt.
ICT for Governance and Policy Modelling: Research Challenges and Future Prospects in Europe.
E-Participation and Climate Change: Are Local Governments Actively Promoting Responsible Behaviors and Offering Opportunities for Citizen Involvement?
Assessing Transparency in Government: Rhetoric, Reality and Desire.
Who Really Did It? Controlling Malicious Insiders by Merging Biometric Behavior with Detection and Automated Responses.
On Tuning the Knobs of Distribution-Based Methods for Detecting VoIP Covert Channels.
Managing Malicious Insider Risk through BANDIT.
Insider Threat Security Reference Architecture.
Insider Threat Behavior Factors: A Comparison of Theory with Reported Incidents.
Identifying At-Risk Employees: Modeling Psychosocial Precursors of Potential Insider Threats.
Fraud Prediction and the Human Factor: An Approach to Include Human Behavior in an Automated Fraud Audit.