36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the最新文献

筛选
英文 中文
Exploring a causal model for the understanding of partnership 探索理解伙伴关系的因果模型
Jae-Nam Lee, Young-Gul Kim
{"title":"Exploring a causal model for the understanding of partnership","authors":"Jae-Nam Lee, Young-Gul Kim","doi":"10.1109/HICSS.2003.1174790","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174790","url":null,"abstract":"This study explores the sources of influence in a successful outsourcing partnership based on a behavioral-attitudinal theory of IS success. Six major partnership-related variables were identified from the literature in terms of social exchange theory, which has been mainly applied to the study of outsourcing partnerships. A causal model of outsourcing success was proposed in which three attitudinal variables (mutual benefits, commitment, and predisposition) were introduced as intervening variables into the relationship between behavioral variables (shared knowledge, mutual dependency, and organizational linkage) and outsourcing success. This model was then tested using a sample of 225 organizations in Korea. The proposed model was compared with a rival model without such intervening variables. The findings indicate that the proposed model has more significant paths and power than the rival model in assessing the relationship between partnership and outsourcing success.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127705083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Community collective efficacy: structure and consequences of perceived capacities in the Blacksburg Electronic Village 社区集体效能:结构和感知能力的后果在布莱克斯堡电子村
John Millar Carroll, D. Reese
{"title":"Community collective efficacy: structure and consequences of perceived capacities in the Blacksburg Electronic Village","authors":"John Millar Carroll, D. Reese","doi":"10.1109/HICSS.2003.1174585","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174585","url":null,"abstract":"Bandura's social cognitive construct \"perceived self-efficacy\" has been used widely to understand individual behavior as a function of domain-specific beliefs about personal capacities. Collective efficacy is the extension of the self-efficacy construct to organizations and groups; it refers to beliefs about collective capacities in specific domains. Our research is investigating the use of collective efficacy in understanding attitudes and behaviors of members of proximal residential communities with respect to issues like attachment, engagement, and sociality, specifically as modulated by use of the Internet and community networks. This paper describes our analysis of the structure and external validity of the collective efficacy construct.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127503372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Does e-business modeling really help? 电子商务建模真的有用吗?
J. Gordijn, H. Akkermans
{"title":"Does e-business modeling really help?","authors":"J. Gordijn, H. Akkermans","doi":"10.1109/HICSS.2003.1174398","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174398","url":null,"abstract":"Many innovative e-business ideas are hardly understood by their stakeholders when articulated, just by words. To create a better, also shared, understanding, and to enhance confidence in the feasibility of such verbal ideas, we have developed a model-based e-business development approach called e/sup 3/-value. But does a model-based approach really contribute to the development of innovative e-business ideas? To answer this question, we report on an innovative e-business idea about online news provisioning which has been explored, using our e/sup 3/-value approach, and which has been implemented afterwards. To see the merits of e/sup 3/-value we revisited, this project one-year-and-a-half after its implementation. It then shows up that indeed a modeling approach contributes to e-business development, but also some important lessons can be learned, to improve our methodology.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134604494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Balancing safety against performance: tradeoffs in Internet security 平衡安全与性能:互联网安全中的权衡
Vu A. Ha, D. Musliner
{"title":"Balancing safety against performance: tradeoffs in Internet security","authors":"Vu A. Ha, D. Musliner","doi":"10.1109/HICSS.2003.1174465","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174465","url":null,"abstract":"All Internet-accessible computing systems are currently faced with incessant threats ranging from simple script-kiddies to highly sophisticated criminal enterprises. In response to these threats, sites must perform extensive intrusion monitoring. This intrusion monitoring can have significant costs in terms of bandwidth, computing power, storage space, and licensing fees. Furthermore, when exploits are detected, the victims must take actions that can consume further resources and compromise their objectives (e.g., by reducing e-commerce server throughput). In this paper, we explore techniques for modeling the costs and benefits of various security monitoring and response actions. Given these models and stochastic expectations about the types of attacks that a site is likely to face, our CIRCADIA (cooperative intelligent real-time control architecture for dynamic information assurance) automatic security control system is able to make real-time tradeoffs between the level of safety and security that is enforced, and the level of system resources/performance that are applied to the main computational objectives (e.g., e-commerce transactions). We show how CIRCADIA is able to dynamically adjust its security activities to account for changing threat profiles and objectives. The result: a continually-optimized balance of security-maintaining activity that reduces risk while still allowing the system to meet its goals.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"28 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114041079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Supporting parameterised roles with object-based access control 支持基于对象的访问控制的参数化角色
M. Evered
{"title":"Supporting parameterised roles with object-based access control","authors":"M. Evered","doi":"10.1109/HICSS.2003.1174463","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174463","url":null,"abstract":"The per-method access control lists of standard Internet technologies allow only simple forms of access control to be expressed and enforced. They also fail to enforce a strict need-to-know view of persistent data. Real applications require more flexible security constraints including parameter restrictions, logging of accesses and state-dependent access constraints. In particular, the concept of parameterised roles, central to a fine-grained specification of access rules and compliance with privacy laws, should be supported in a natural way. In this paper, we demonstrate how an object-based approach using the mechanism of bracket capabilities can be used to enforce various kinds of access constraints including discretionary, mandatory and parameterised role-based access control. We give examples from a health information system incorporating secure patient access and secure access by appropriate medical and administrative personnel.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123919534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Roles of formal/informal networks and perceived compatibility in the diffusion of World Wide Web: the case of Indonesian banks 正式/非正式网络在万维网传播中的作用和可感知的兼容性:以印度尼西亚银行为例
D. Achjari, M. Quaddus
{"title":"Roles of formal/informal networks and perceived compatibility in the diffusion of World Wide Web: the case of Indonesian banks","authors":"D. Achjari, M. Quaddus","doi":"10.1109/HICSS.2003.1174428","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174428","url":null,"abstract":"This study takes a cultural perspective to derive formal and informal networks and aims to investigate their roles in the diffusion of World Wide Web (WWW) among Indonesian bank employees. The study also investigates the impact of perceived compatibility on WWW diffusion. To achieve these aims, a research model, which is based on the technology acceptance model (TAM) is developed. Data is collected from 360 nonMIS staff in six Indonesian banks via questionnaire. The responses are analysed using PLS. The results suggest that informal network affects individual's self-efficacy, and perceived compatibility impacts user's perception regarding WWW. Surprisingly, the impact of formal network on self-efficacy is negligible. The implications of the results are discussed taking a cultural perspective.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128545091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Introduction to information systems in global business 全球商业信息系统概论
P. Ribbers, C. Holland
{"title":"Introduction to information systems in global business","authors":"P. Ribbers, C. Holland","doi":"10.1109/HICSS.2003.1174614","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174614","url":null,"abstract":"This year’s mini-track on information systems in global business continues the tradition of applied research and original data analysis in a wide range of information technology and international business contexts. The papers cover many of the topical issues facing academics and managers working in information systems: outsourcing; productivity issues; Business to Business and supply chain innovations; implementation of ERP; marketing strategies and the emergence of global market networks. However these topics are examined with an emphasis on their global dimension. How does outsourcing change as it becomes a global process? What are the differences of B2B implementation in a developing economy compared with B2B systems in the US? How do country differences affect the global deployment of an ERP system? These are the types of issues that will be covered and discussed in the IS in global business mini-track. The downturn of stock-markets worldwide has reduced business spending on information systems and had a dramatic effect on the value and in some cases, viability of information technology companies. It has also raised the urgency for cost reduction, and in particular encouraged the use of offshore, or global, outsourcing services. The paper by Currie and Khan investigates the supply side of IT outsourcing services based on case research in twenty Indian companies. They argue that for Indian technology companies to succeed in the global outsourcing market, they must develop capabilities that enable them to move away from simple commoditized products to offer more sophisticated services that involve extensive research and development. The papers by Ganley, Kraemer and Wong, and Shao and Shu are related insofar as they analyze the economic effects of the IT industry in different countries. Ganleey et al assess the impact of IT production on the diffusion of IT within individual countries, and found a positive relationship in developed countries, and no relation in developing countries where it is assumed that the IT industry is focused on export rather than domestic use. Shao and Shu examine the productivity of the IT industry itself (rather than the more common study of how IT affects the general economy) and found that most of the increase in productivity within the IT industry is due to technological innovation in the production process. Both of these papers have significant implications on government policy and business strategy of IT companies. The second session is focused on large-scale infrastructure systems in the areas of ERP and business to business systems. The first paper by Reimers is concerned with the development and evolution of electronic commerce in China. It explores a fascinating concept of an industry-wide information system in which a set of standards for electronic commerce are agreed before the internal infrastructures centred on ERP are finalised. In the US and Europe, companies are grappling with the issues of defining i","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128442765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and survivable software systems 安全且可生存的软件系统
A. Krings, P. Oman
{"title":"Secure and survivable software systems","authors":"A. Krings, P. Oman","doi":"10.1109/HICSS.2003.1174907","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174907","url":null,"abstract":"With malicious computer and network attacks reaching epidemic proportions, issues of security and survivability of software systems have surfaced in a variety of application domains. Of real concern is the increasing reliance of critical applications on networked computer systems. Failure or compromises of such systems could cause threats to national infrastructures or lead to catastrophe ( e.g., loss of life, damage to the environment, or unacceptable financial losses). Driven by market speed and feature demand, commercial software developers have high pressures to deliver products rapidly, usually at the expense of quality and security. Given these market pressures and the increasing complexity of today’s software, it is unrealistic to assume total security and robustness. Hence, the research area of secure and survivable systems has addressed the ability of systems to fulfill their missions even in the presence of failures, accidents or malicious attacks. Whereas resilience to failures and accidents has been the focus of research in fault-tolerant systems design, resilience to malicious attacks has become a challenge in the field of system survivability. Principally, essential services must be designed to withstand attacks. This requirement goes beyond the scope of computer and network security, which has been traditionally addressing detection and resistance to attacks.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117208850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An individual view on cooperation networks 个人对合作网络的看法
Tim Weitzel, D. Beimborn, W. König
{"title":"An individual view on cooperation networks","authors":"Tim Weitzel, D. Beimborn, W. König","doi":"10.1109/HICSS.2003.1174385","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174385","url":null,"abstract":"Networks utilizing modern communication technologies can offer competitive advantages to those using them wisely. But due to the existence of network effects, planning and operating networks is difficult. In this paper, the strategic situation of individual agents deciding on network participation is analyzed. A systematic equilibrium analysis using computer-based simulations reveals principal solution scenarios for network agents and shows that network cooperation problems might frequently be not as difficult to resolve as often feared. In particular, strategic situations are identified showing that a majority of individuals might be better off getting the optimal solution from a central principal and that in many cases simple information intermediation can solve the start-up problem notorious in network economics.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115617990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The conceptualization of trust, risk and their electronic commerce: the need for clarifications 信任、风险及其电子商务的概念:澄清的需要
D. Gefen, V. Rao, N. Tractinsky
{"title":"The conceptualization of trust, risk and their electronic commerce: the need for clarifications","authors":"D. Gefen, V. Rao, N. Tractinsky","doi":"10.1109/HICSS.2003.1174442","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174442","url":null,"abstract":"In recent years, significant advances have been made in the understanding of trust and risk in electronic commerce. However, in examining the published research, some troublesome trends surface. These trends include: (a) the tendency to treat conceptualizations of trust and risk as unidimensional constructs, ignoring the large body of literature suggesting that they are complex, multidimensional constructs; (b) the tendency to ignore whether trustworthiness is part of trust or a possibly different construct; and (c) the tendency to articulate relationships between trust and risk idiosyncratically without attention to prior articulations. These trends are troublesome because they have the potential to hamper the field's ability to do cumulative research in the long run. The goal of this article is to highlight these trends and call for greater attention to the issues raised in future research.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115167634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 127
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信