36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the最新文献

筛选
英文 中文
Economics of technology standards: implications for offline movie piracy in a global context 技术标准经济学:全球背景下对线下电影盗版的影响
R. Chellappa, S. Shivendu
{"title":"Economics of technology standards: implications for offline movie piracy in a global context","authors":"R. Chellappa, S. Shivendu","doi":"10.1109/HICSS.2003.1174453","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174453","url":null,"abstract":"Reduced sizes of music files due to compression technologies has allowed for piracy to become a rampant problem on the Internet even in the absence of significant bandwidth. However given the large sizes of video files, movies are still largely pirated by duplicating DVDs, VCDs and other physical media. Conventionally DVD formats have differed across various regions in the world albeit for controlling theatrical releases of movies. This paper formulates an analytical model to study the implication of varying technology standards of DVD players across different regions on the piracy of movies. This research identifies conditions under which consumers engage in global and regional piracy. Our findings show that maintaining separate technology standards across regions is effective in not only thwarting global piracy but it also allows movie studios to create variable quality movies and engage in discriminatory pricing. While consumers may still engage in local piracy, the overall profits to the firm under variable technology standards are shown to be higher then when a common DVD standard is adopted across all regions. The paper concludes with recommendations for research and practice.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116401984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Personalization through mask marketing 通过面具营销实现个性化
Moritz Strasser, A. Zugenmaier
{"title":"Personalization through mask marketing","authors":"Moritz Strasser, A. Zugenmaier","doi":"10.1109/HICSS.2003.1174582","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174582","url":null,"abstract":"Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are exploited to generate a profile of interests of the users. Marketing measures like advertisements in form of banners or product presentation are tailored according to these profiles. This kind of customizing suffers from insufficient information about the current interests of the users: the profiles are only a collection of past actions of the users. Additionally, sometimes personalization is seen an invasion of privacy and often unsolicited advertisements unrelated to the users' real interests are cited as an example of the nuisances of 1-to-1 marketing. This shows the dilemma that 1-to-1 marketing faces: The users feel they already offer too much information about themselves. Currently, users solve this dilemma by disabling all technical means that enable user profiling, e.g. by disabling cookies in their Web browsers, using anonymity services, and providing fake identities to Web sites. We propose an approach based on peer-to-peer networks to allow marketing to a specific target group while preserving the privacy of users, we call it mask-marketing. In this concept a user assumes the identity of a mask representing his or her intentions. E.g., a user buying a Christmas present will use the \"Christmas shopping\" identity, afterwards the same user may use an \"engineering\" mask for an information search relating to his work. The users are able to present their preferences and intentions without these being attributable to their true identity. The masks, which are technically realized by sharing cookies, are distributed and updated using a peer-to-peer networking approach. This permits use of a mask by several different users. All actions performed by different users under the identity of one mask contribute to the profile of this mask. Creation and distribution don't require a central service. This is an advantage since the sensitive profile data is not concentrated in a central entity in the network, which could be viewed by privacy sensitive users with suspicion.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116618692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Individual differences in private banking: empirical evidence from Finland 私人银行的个体差异:来自芬兰的经验证据
Heikki Karjaluoto, T. Koivumäki, J. Salo
{"title":"Individual differences in private banking: empirical evidence from Finland","authors":"Heikki Karjaluoto, T. Koivumäki, J. Salo","doi":"10.1109/HICSS.2003.1174449","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174449","url":null,"abstract":"The financial industry can nowadays be viewed as a battlefield where the players are keenly planning new ways to achieve competitive advantage. Besides increasing competition and change, the current trend in private banking has been the consumer movement from traditional branch banking to stand-alone, online banking. This paper examines the uptake of online banking by the use of a survey (1167 responses) conducted during the summer of 2000 in Finland. The main results of the study indicate that while the diffusion of electronic delivery channels has been rapid, the management of digital customer relationships has become of key importance. By comparing different types of bank customers and by evaluating their perceptions of technology and delivery channels, it can be argued that nonusers of online banking might be most loyal segment whereas online banking users can be considered more likely to change their banks.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123878833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Introduction to minitrack: computational issues in bioinformatics 微型轨道导论:生物信息学中的计算问题
Hesham H. Ali
{"title":"Introduction to minitrack: computational issues in bioinformatics","authors":"Hesham H. Ali","doi":"10.1109/HICSS.2003.1174801","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174801","url":null,"abstract":"With a strong foundation in Computational Biology and Computational Chemistry, Bioinformatics is fast emerging as one of the most exciting scientific disciplines in the twenty-first century. A true multidisciplinary field of study, Bioinformatics deals with the development and use of mathematical and computational methods to assist in modeling and solving problems in biosciences. Employing algorithmic approaches are expected to be essential to the development and advancement of many fields in biosciences. This, in part, is due to the recent explosion of biological data, which requires an associated increase in the scale and sophistication of the automated systems and tools that enable researchers to take advantage of its availability. Additionally, there are a large number of research projects and applications that demands automated computational support. The need for Bioinformatics reflects the radical changes that the biological sciences have undergone recently. As more important biological elements are studied and their roles in complex biological systems are discovered, it is apparent that integrating computational research and experimental work will be crucial in exploring and understanding these discoveries. Although the Bioinformatics Minitrack focuses on the computational issues in Bioinformatics, its main goal is to provide a venue for researchers from all related fields to present new integrated approaches to address real Bioinformatics problems. This is apparent in all five papers that comprise the minitrack. Each paper presents a new concept, tool or technique that is motivated by an important problem related to Bioinformatics. The first two papers in the minitrack deal with issues related to whole genomes. In the first paper, “Comparative Genome Anotation for Mapping, Prediction and discovery of Genes,” by Kappen and Salbaum, the analysis of specific chromosomes in two genomes, the human genome and the muse genome, leads to fully assemble a large contiguous sequence that contains fourteen genes. While the paper leaning toward the bioscience aspect of Bioinformatics, the second paper employs computational techniques to deal with alignment problems at the genome level. In the paper, titled, “A Prototype for Multiple Whole Genome Alignment,” by","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121719771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Peer-to-peer (P2P) computing 点对点(P2P)计算
D. Schoder, K. Fischbach
{"title":"Peer-to-peer (P2P) computing","authors":"D. Schoder, K. Fischbach","doi":"10.1109/HICSS.2003.1174578","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174578","url":null,"abstract":"Reduced to a common denominator the term peer-to-peer (P2P) refers to technology which enables two or more peers to collaborate spontaneously in a network of equals (peers) by using appropriate information and communication systems without the necessity for central coordination. P2P applications include file sharing, grid computing, web services, P2P groupware and instant messaging. Napster and Gnutella or the AOL Instant Messenger are famous examples, each with millions of users. Operating largely independent of central coordination,","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124644044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Project management minitrack focus: leveraging information technology 项目管理重点:利用信息技术
H. Thamhain
{"title":"Project management minitrack focus: leveraging information technology","authors":"H. Thamhain","doi":"10.1109/HICSS.2003.1174636","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174636","url":null,"abstract":"Perspective. Project management is one of the most critical processes for implementing multidisciplinary ventures and leveraging company resources, ranging from new product developments to production setups, service rollouts and organizational mergers. At the same time, advances in information technology had a profound impact on project management as an enabling tool, affecting project management capabilities, scope and leadership style enormously. IT-based project management tools and techniques range from software for project planning/tracking to web-based project support systems. These new technologies provide a contemporary framework for multi-functional linkages and communications, essential for successfully integrating today’s complex projects. However, the increased level of data access, processing and interconnectivity, also creates vast challenges involving a wide spectrum of management and organizational issues. In addition there have been substantial developments in the application of project management to IT and software development projects. Many of these IT based project management tools are linked to project execution, others are designed to support scope definition and control, team management, and global integration.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125018220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rationalizing, probing, understanding: the evolution of the systems adoption field 理性化、探索性、理解性:制度采用领域的演变
S. Ramanathan, J. Rose
{"title":"Rationalizing, probing, understanding: the evolution of the systems adoption field","authors":"S. Ramanathan, J. Rose","doi":"10.1109/HICSS.2003.1174732","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174732","url":null,"abstract":"Previous surveys of the interorganizational systems (IOS) adoption field have developed taxonomic schemes to improve general understanding of the field. This paper instead studies the historical development of the field and describes its evolution in a stage model. In the rationalizing stage researchers tried to discover and communicate reasons for some apparently successful adoptions of IOS. However it soon became clear that IOS adoption was relatively limited and in the probing stage the focus changed to investigating the failure of the promised seamless integration. No unified coherent theoretical account emerged from these studies, so in the understanding stage researchers widened the focus of study to try to develop a richer account of the many complex influences on IOS adoption. The three stages are associated with different objectives, assumptions, theoretical backgrounds and research approaches.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128970341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reaching for the site: meta tag litigation and access to Internet-based information 到达网站:元标签诉讼和访问基于互联网的信息
B. D. Vuyst, Katia Bodard
{"title":"Reaching for the site: meta tag litigation and access to Internet-based information","authors":"B. D. Vuyst, Katia Bodard","doi":"10.1109/HICSS.2003.1174454","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174454","url":null,"abstract":"The Internet is often described as a free and open communication space, accessible to all and allowing access to any and all. The question put in this paper is, generally, how freely accessible this space is, and in how far there may be restraints imposed by intellectual property owners, in particular in and in the context of the area of searching and the use of search engines. Conflicts arise especially on the use of meta tags in search engines. Meta tags are indeed important tools in searching for sites and names on the Internet. Hence, they may acquire an economic and financial value. As a counterpoint to that valorization, however, they may be abused to distort competition and to impinge on intellectual property rights of those mentioned in the meta tags. The emerging meta tag litigation in different countries, including the U.S. and several European countries among which Germany, Italy, Denmark and Belgium, is used in this paper, after a jurisprudential analysis, as a qualitative proxy for indicating, from a legal policy viewpoint, limits on free searching and reaching of Web sites, in particular as regards the restraints that may properly be imposed by intellectual property owners on meta tagging of names that are protected by their trademark rights, or by search engines to reduce spamming.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123246741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A model for evaluating potential WBE innovations [Web-based education] 评估潜在WBE创新的模型[基于网络的教育]
David Jones, Kieren Jamieson, D. Clark
{"title":"A model for evaluating potential WBE innovations [Web-based education]","authors":"David Jones, Kieren Jamieson, D. Clark","doi":"10.1109/HICSS.2003.1174340","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174340","url":null,"abstract":"Due to the constantly evolving nature of Web-based education (WBE) it is often difficult for educators to understand the issues, challenges, impact, and effort required to introduce WBE innovations. This lack of knowledge can contribute to the limited adoption and less than successful implementation of WBE innovations. This paper draws on an aspect of innovation diffusion theory to propose a model through which educators can evaluate potential WBE innovations. It is proposed that this model can aid educators increase their awareness of potential implementation issues, estimate the likelihood of reinvention, and predict the amount and type of effort required to achieve successful implementation of specific WBE innovations. The worth of the model is demonstrated by drawing on past experience.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129419497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Whoops... did I use the wrong concept to predict e-commerce trust? Modeling the risk-related effects of trust versus distrust concepts 哎呀……我是否使用了错误的概念来预测电子商务信任?对信任与不信任概念的风险相关影响进行建模
Harrison McKnight, Chuck Kacmar, V. Choudhury
{"title":"Whoops... did I use the wrong concept to predict e-commerce trust? Modeling the risk-related effects of trust versus distrust concepts","authors":"Harrison McKnight, Chuck Kacmar, V. Choudhury","doi":"10.1109/HICSS.2003.1174393","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174393","url":null,"abstract":"Significant work has been initiated on trust in e-commerce settings, but little research has addressed distrust. Because of its connection to the insecurities that are found in risky situations, disposition to distrust is particularly suited to addressing issues of high risk, while disposition to trust is better suited for low risk issues. High risk issues include: a) perceptions that the Web is risky; and b) a willingness to depend on a specific unknown Web vendor in light of that risk. This theoretical position serves as the basis of a model of what causes consumers to initially decide to trust/distrust the Web and to explore and trust a Web site. The model includes three dispositions to trust constructs and one disposition to distrust construct. As proposed, the study found that disposition to trust predicted the low risk Web constructs, while disposition to distrust predicted the high risk Web constructs. This suggests that disposition to distrust has greater potential for predicting high-risk outcome constructs in e-commerce. This article contributes by showing how various aspects of disposition to trust/distrust affect consumer Web perceptions in different ways, depending on their level of risk. For e-commerce research, the findings of this article suggest that perhaps scholars have been studying a less effective factor for addressing risk - disposition to trust - instead of what may be a more effective factor - disposition to distrust.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128474956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信