36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the最新文献

筛选
英文 中文
A preliminary assessment of different trust formation models: the effect of third party endorsements on online shopping 不同信任形成模式的初步评估:第三方背书对网上购物的影响
Sarah P. W. Shek, C. Sia, Kai H. Lim
{"title":"A preliminary assessment of different trust formation models: the effect of third party endorsements on online shopping","authors":"Sarah P. W. Shek, C. Sia, Kai H. Lim","doi":"10.1109/HICSS.2003.1174443","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174443","url":null,"abstract":"This study investigates two trust building models - Mayer's factor-based model, and McKnight's process-based model of trust formation. It critically outlines the two different models of trust formation and adapts them for application in an online environment. Through a series of case studies we undertake a preliminary assessment of which model fits better to online shopper behaviors. We use the cases and interviews of online shoppers to understand how trust is formed in new online shopping experiences, and develop preliminary insights into the effectiveness of third party endorsements for trust building. We focus on comparative impact of satisfied customers' individual endorsements and portal affiliation. The findings of interviews raise our understanding of online trust formation and online consumer buying intentions. Also, this study raises a number of hypotheses, and suggests how Internet firms should utilize different endorsement strategies.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114354979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Revisiting the firewall abolition act 重新审视防火墙废除法案
P. Robinson, J. Haller
{"title":"Revisiting the firewall abolition act","authors":"P. Robinson, J. Haller","doi":"10.1109/HICSS.2003.1174466","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174466","url":null,"abstract":"Mobility and the new global economy are accompanied by requirements for dynamism and flexibility, with respect to e-commerce, inter-organizational activity, and security. The classical approach to computer security, typified by firewalls, is no longer suitable to encourage and facilitate the growth and nomadic collaboration foreseen for current and future corporate environs. This paper investigates the nature of firewalls, their concepts, goals, history and implementations, in order to determine the validity of the claims of inadequacy made. We present arguments surrounding these claims from both business and technical perspectives. This includes consideration of real-world scenarios and identification of the fundamental concerns for corporate network administration. We further present possibilities for application level security to address the shortfalls of firewalls and providing end-to-end security over heterogeneous networks. This includes a formal definition, proposed architecture, comparison to firewalls, and references to existing technologies and research in this direction.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128030926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Knowledge management technology for revealing cognitive within a management team 用于揭示管理团队内部认知的知识管理技术
David P. Tegarden, L. Tegarden, S. Sheetz
{"title":"Knowledge management technology for revealing cognitive within a management team","authors":"David P. Tegarden, L. Tegarden, S. Sheetz","doi":"10.1109/HICSS.2003.1174267","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174267","url":null,"abstract":"The cognitive diversity of top management teams has been shown to affect the performance of a firm. However, most approaches to measure cognitive diversity never attempt to open the \"black box\" to understand what makes up the cognitive diversity of the team. This research reports on an approach that identifies diverse belief structures, i.e., cognitive subgroups, through the use of causal mapping and cluster analysis. The procedures of the approach are automated using group support systems technology resulting in a group cognitive mapping system (GCMS). The results from a study of 13 top managers on a strategic planning team for an information services firm show that the use of causal mapping provides an efficient and effective way to identify idiosyncratic and shared knowledge among members of a top management team.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125476708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile distributed information systems 移动分布式信息系统
Fraunhofer Ipsi meissner
{"title":"Mobile distributed information systems","authors":"Fraunhofer Ipsi meissner","doi":"10.1109/HICSS.2003.1174829","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174829","url":null,"abstract":"In today's mobile society, access to relevant information and to context-specific services \"anytime, anywhere\" is becoming increasingly important. Mobile users are often particularly interested in information about and services in their immediate vicinity, thus Mobile Distributed Information Systems must address location-dependent distribution of and access to services and information from mobile devices. In addition to location, other environmental aspects, such as the user’s current situation, topology and available bandwidth of wireless networks, battery power and characteristics of mobile devices, are also relevant for determining information and service requirements. For mobile applications, a dynamic reconfigurable architecture is thus required to support flexible reaction to changing contexts and seamless operation in foreign environments, with little or no need for manual reconfiguration. In addition, the wide deployment of mobile devices requires appropriate solution to the design of optimized user interfaces and interaction models. With mobile devices becoming more and more popular and powerful, communication and cooperation between mobile users in an ad-hoc manner are strongly desired. Consequently, the long-established distinction between clients and servers is blurred, which calls for an extension of the architectural paradigm towards peers or alternating roles. This HICSS Minitrack addresses such issues and is intended to serve as a forum for the exchange of ideas in this fast-moving field.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124313400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applying the task-technology fit model to WWW-based conceptualization and measurement 任务技术拟合模型在基于www的概念和测量中的应用
Y. Benslimane, M. Plaisent, P. Bernard
{"title":"Applying the task-technology fit model to WWW-based conceptualization and measurement","authors":"Y. Benslimane, M. Plaisent, P. Bernard","doi":"10.1109/HICSS.2003.1174568","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174568","url":null,"abstract":"This research examines the application of the task-technology fit (TTF) model to World Wide Web (WWW) usage for electronic commerce (EC) purposes. Conducted from corporate buyers' perspective, this study assesses the extent to which Internet websites in general support the procurement process. The model suggests that a better fit between the tasks required during the procurement process and Internet Web sites' functionalities leads to a higher level of WWW usage, which then leads to an improved performance for users. All relevant constructs are discussed. Scales used to measure them are then developed. Data collected from 110 corporate buyers from over 100 organizations operating in a wide range of industries helped assess the validity and reliability of the scales needed to test the soundness of the model. This paper presents the results from instrument validation.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124474470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Consumers cognition towards communities: customer-centred community design using the means-end chain perspective 消费者对社区的认知:基于终端链视角的以客户为中心的社区设计
Peter Aschmoneit, Mark Heitmann
{"title":"Consumers cognition towards communities: customer-centred community design using the means-end chain perspective","authors":"Peter Aschmoneit, Mark Heitmann","doi":"10.1109/HICSS.2003.1174577","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174577","url":null,"abstract":"This paper presents research on the application of the means-end chain (MEC) framework for investigating customers cognitive structure regarding community applications. It is argued that the understanding of customers cognition is crucial for the development of sustainable communities. MEC analysis is seen as a means to support the community design tasks, especially concept development. The MEC analysis within concept development helps to improve the success rate of the new designed community by the early integration of customer needs and benefits. Based on theoretical considerations about the MEC framework and its limitations, a case study regarding an newly designed information community is illustrated. Data was collected conducting individual laddering interviews online at a major information portal in Germany. Dividing answers into attributes, consequences, and values and using content analysis hierarchical value maps (HVM) for both, messaging applications and information portals, were constructed. To support concept development of a new information community, as a distribution platform for content, the findings of both HVMs were considered. Examples illustrate, that the MEC analysis helps to create a community concept that is focused on the targeted customers. It is supporting the creative process of finding community function and features that are fitting or can be linked to the existing cognitive structures of the targeted individuals regarding community applications.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129483938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
ERP/ERP II issues and answers: session overview ERP/ERP II问题与解答:会议概述
G. Corbitt
{"title":"ERP/ERP II issues and answers: session overview","authors":"G. Corbitt","doi":"10.1109/HICSS.2003.1174607","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174607","url":null,"abstract":"This is the fourth year at HICSS where there is a session devoted to ERP (Enterprise Resource Planning) systems research. Last year, participants at the session discussed the idea of expanding ERP to include the add-on products sometimes called ERP II or EAI (Enterprise Application Integration or expanded ERP systems). Based on this suggestion, the mini-track was modified to include ERP II systems as well. There were 10 full papers submitted and 1 other paper that was partially complete. The papers selected for this year’s conference cover a full range of topics from conceptual modeling to specific case studies. Even though software sales are depressed, ERP systems remain in the forefront of software development activities. More important, however, ERP is just the beginning of a future trend towards EAI. Some think that EAI, a term even more vague than ERP, is the future of computing systems and a necessary foundation for full integration of enterprise-wide applications [Manchester, 1999, Stein, 1999, and Teresko, 1999]. The literature is just beginning to define what EAI means, but all agree that it is a pre-requisite to successful deployment of e-commerce and e-business applications. Most simply, EAI is the opening of internal systems to customers and suppliers so that e-business can be enabled through the Internet. How EAI can take place is still a large question. The first paper addresses this broader area of EAI. “Towards a Novel Framework for the Assessment of Enterprise Application Integration Packages” provides a conceptual framework that can be used both to select an appropriate EAI solution for an enterprise and to conduct further research in EAI implementation. Similarly, the second paper, “Benefits of an ERP Maintenance Model to Management”, introduces a model to use to","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127319399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Introduction to internet security 互联网保安简介
J. Tront, R. Marchany
{"title":"Introduction to internet security","authors":"J. Tront, R. Marchany","doi":"10.1109/HICSS.2003.1174460","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174460","url":null,"abstract":"Viruses are running rampant. Encryption schemes have been broken. Passwords have been compromised and account information has been intercepted. Recent events throughout the world have caused people to become very circumspect when it comes to transacting business over electronic media. Will this cause the Internet to be abandoned as a vehicle for transacting business? Without the ability to trust in the scrupulous behavior on both ends of a transaction, most prudent e-commerce operators and clients may decide to forgo the use of the Internet and revert back to old methods of doing business. To counter this trend, the issues of network security on the Internet must be constantly reviewed and appropriate countermeasures devised. At the same time, security measures must be appropriately devised so that they do not inhibit or in any way dissuade the intended ecommerce operation. As the use of wireless technology grows, the number of events and the far reaching effects of network security problems are likely to have an even larger impact on e-commerce.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132993215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Perceived strategic value and adoption of electronic commerce: an empirical study of small and medium sized businesses 感知战略价值与电子商务的采用:对中小企业的实证研究
Elizabeth E. Grandón, J. Pearson
{"title":"Perceived strategic value and adoption of electronic commerce: an empirical study of small and medium sized businesses","authors":"Elizabeth E. Grandón, J. Pearson","doi":"10.1109/HICSS.2003.1174427","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174427","url":null,"abstract":"By combining two independent research streams, we examine the strategic value and adoption of electronic commerce (e-commerce) as perceived by top managers in small and medium sized enterprises (SME). We propose a research model that posits three factors that have been found to be influential in previous research in the perception of strategic value of other information technologies. Inspired by the technology acceptance model of Davis (1989) and other relevant research in the area, we also identify four factors that we believe will influence e-commerce adoption. We hypothesize a causal link between the perceived strategic value of e-commerce and e-commerce adoption. To validate the research model, we collected data from top managers/owners of SME via an Internet survey. Confirmatory factor analysis was used to test the factors utilized in this study while canonical correlation analysis was employed to validate the causal link between the two main constructs of this study.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131311655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Design and evaluation of improvement method on the Web information navigation - a stochastic search approach Web信息导航改进方法的设计与评价——随机搜索方法
B. Yen, Y. Wan
{"title":"Design and evaluation of improvement method on the Web information navigation - a stochastic search approach","authors":"B. Yen, Y. Wan","doi":"10.1109/HICSS.2003.1174476","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174476","url":null,"abstract":"With the advent of fast growing Internet and World Wide Web (WWW), more and more companies start the electronic commerce to enhance the business competitiveness. On the other hand, more and more people surf on the Web for information gathering/processing. Due to unbalanced traffic and poorly organized information, users suffer the slow communication and disordered information organization. The information provider can analyze the traffic and uniform resource locator (URL) counters to adjust the organization; however, heterogeneous navigation patterns and dynamic fluctuating Web traffic make the tuning process very complicated. Alternatively the user may be provided with guidance to navigate through the Web pages efficiently. In this paper, a Web site was modeled as a Markov chain associated with the corresponding dynamic traffic and designated information pages. We consider four models: inexperienced surfers on guidance-less sites, experienced surfers on guidance-less sites, sites with the mean-length guidance, and sites with the known-first-arc guidance (generalized as sites with dynamic stochastic shortest path guidance). Simulation is conducted to evaluate the performance of the different types of navigation guidance. We also propose a reformulation policy to highlight the hyperlinks as steering guidance. The evolution on complexity and applicability is also discussed for the design guideline of general improvement methods. The paper concludes with the summary and future directions.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131341777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信