{"title":"Virtual Teams and Creative Performance","authors":"L. Martins, C. Shalley, L. Gilson","doi":"10.1109/HICSS.2009.1018","DOIUrl":"https://doi.org/10.1109/HICSS.2009.1018","url":null,"abstract":"We developed and tested a model of the effects of demographic differences (i.e., differences in race, sex, age, and nationality) on creativity in dyads having short-term virtual work interactions. Specifically we examined how demographic differences interacted with dyad processes (establishment of rapport, participation equality, and process conflict) and a key input factor (difference in technical experience), to affect the creativity of dyads working virtually. Differences in nationality had a strong negative direct effect, and interacted with differences in technical experience to affect creativity. Differences in age interacted with dyad processes and differences in technical experience to affect creativity. Differences in sex and race did not significantly affect creativity. Implications are discussed for managing creative virtual work.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126261482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service Composition in Public Networks: Results from a Quasi-Experiment","authors":"R. Feenstra, M. Janssen","doi":"10.1109/HICSS.2009.385","DOIUrl":"https://doi.org/10.1109/HICSS.2009.385","url":null,"abstract":"New systems can be created by assembling a set of elementary services provided by various stakeholders in a service composition. Service composition is not a trivial endeavor and several composition methods exist. Yet, these methods are hardly adopted by the field, as they need a set of well-defined and well- described services and are not able to deal with incomplete information and unambiguous descriptions. Furthermore, these methods are not able to deal with situations in which stakeholders have different requirements and need to negotiate with each other about the selection and performance of services.In this paper we present a service composition method and evaluate this method using a quasi-experimental design. The method is aimed at dealing with a set of heterogeneous services provided by stakeholders with different and sometimes even opposing requirements. We found that our composition method helps to create an overview of services and their attributes and enables better communication between stakeholders. A recommendation for further research is to integrate semantic and multi-actor composition methods.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126434825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Surviving Attacks and Intrusions: What can we Learn from Fault Models","authors":"A. Krings, Z. Ma","doi":"10.1109/HICSS.2009.928","DOIUrl":"https://doi.org/10.1109/HICSS.2009.928","url":null,"abstract":"When designing or analyzing applications or infrastructures with high reliability, safety, security, or survivability demands, the fundamental questions are: what is required of the application and can the infrastructure support these requirements. In the design and analysis of fault-tolerant systems, fault models have served us well to describe the theoretical limits. But with the inclusion of malicious acts, the direct application of fault models has exposed limited applicability. However, we can take advantage of the powerful fault models if we defer their direct application from the events that lead to faults, that is, the fault causes, and instead focus on the effects. This way one can avoid questions referring to the meaning of fault models in the context of previously unsuitable faults like Trojan horses or Denial of Service (DoS) attacks. Instead, we can use fault models at the level of abstraction where the application maps on the infrastructure. In this paper fault models are discussed in the context of system survivability and malicious act. It is shown that these models can be used to balance the demands put on the application and the capabilities of the underlying infrastructure. Active and imposed fault descriptions are defined that allow to match the mechanisms that provide survivability to the application with the infrastructure-imposed limitations. By defining a system as a collection of functionalities, individual functionalities and their associated fault descriptions can be analyzed in isolation.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126394438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arjun Venkataswamy, Rajinder Sodhi, Y. Abdildin, B. Bailey
{"title":"Groupware for Design: An Interactive System to Facilitate Creative Processes in Team Design Work","authors":"Arjun Venkataswamy, Rajinder Sodhi, Y. Abdildin, B. Bailey","doi":"10.1109/HICSS.2009.751","DOIUrl":"https://doi.org/10.1109/HICSS.2009.751","url":null,"abstract":"Creativity as modeled using the recluse genius paradigm fails to recognize the necessity and value of the collaborative aspects involved. Enhancing the creative output of teams will become more and more necessary as the complexity of problems increases; this is especially true within the design domain. This paper explores the group processes and accompanying bottlenecks related to design work. Individuals and teams with experience in collocated design settings were studied to extract principles and best practices for group design work. Based on the findings, a set of design implications were extracted and an early prototype of a collaborative system was built to implement those conclusions. The tool attempts to model the highly effective ways that design teams work in a collocated environment while also addressing some of the bottlenecks they face.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121937599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samuel Felix de Sousa, Marco Antonio Balieiro, J. Costa, C. D. Souza
{"title":"Multiple Social Networks Analysis of FLOSS Projects using Sargas","authors":"Samuel Felix de Sousa, Marco Antonio Balieiro, J. Costa, C. D. Souza","doi":"10.1109/HICSS.2009.831","DOIUrl":"https://doi.org/10.1109/HICSS.2009.831","url":null,"abstract":"Due to their characteristics and claimed advantages, several researchers have been investigating free and open-source projects. Different aspects are being studied: for instance, what motivates developers to join FLOSS projects, the tools, processes and practices used in FLOSS projects, the evolution of FLOSS communities among other things. Researchers have studied collaboration and coordination of open source software developers using an approach known as social network analysis and have gained important insights about these projects. Most researchers, however, have not focused on the integrated study of these networks and, accordingly, in their interrelationships. This paper describes an approach and tool to combine multiple social networks to study the evolution of open-source projects. Our tool, named Sargas, allows comparison and visualization of different social networks at the same time. Initial results of our analysis can be used to extend the \"onion-model\" of open source participation.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127903385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Security: User Precautions, Attacker Efforts, and Enforcement","authors":"I. Png, Qiu-Hong Wang","doi":"10.1109/HICSS.2009.771","DOIUrl":"https://doi.org/10.1109/HICSS.2009.771","url":null,"abstract":"We analyze the strategic interactions among end-users and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by end-users are strategic substitutes. This explains the inertia among users in taking precautions even in the face of grave potential consequences. Generally, information security can be addressed from two angles - facilitating end-user precautions and enforcement against attackers. We show that, enforcement is more effective as an all-round policy to enhance information security.Facilitating user precautions leads to increased precautions and increased end-user demand, which have conflicting effects on the total harm suffered by end-users. Hence, reduced form estimates of the impact of facilitating precautions may over- or under- estimate the impact, depending on which effect is stronger. Further, in targeted attacks, the outcome of interaction between users and attackers depends on the specific cost functions. Attackers may target low-valuation users as they take fewer precautions.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133915188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Bein, S. Latifi, Linda Morales, I. H. Sudborough
{"title":"Bounding the Size of k-Tuple Covers","authors":"W. Bein, S. Latifi, Linda Morales, I. H. Sudborough","doi":"10.1109/HICSS.2009.605","DOIUrl":"https://doi.org/10.1109/HICSS.2009.605","url":null,"abstract":"Suppose there are n applications and n processors. A pair cover is a set S of one-to-one mappings (assignments) of the applications to the processors such that, for every pair (Ai,Aj) of applications and every pair (p,q) of processors, there is an assignment f in S that maps (Ai,Aj) to (p,q). More generally, we consider, for all k/spl ges/1, minimum size k-tuple covers. We improve bounds given earlier in by Latifi, where the application for k-tuple covers was fault tolerance of the multidimensional star network. Let F(n,k) denote the minimum cardinality k-tuple cover for n applications and processors. We give bounds for F(n,k) that are within a small multiplicative factor of optimum.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134299184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Managing on Purpose: A Practitioner's Goal for a Recalcitrant Bank","authors":"B. Frew","doi":"10.1109/HICSS.2009.814","DOIUrl":"https://doi.org/10.1109/HICSS.2009.814","url":null,"abstract":"Business Process Management (BPM), as a management discipline, can only deliver value once its principles and practices are effectively integrated into an organization's business operating model. This paper analyses the application and evolution of a holistic model of the BPM management system in a large Australian bank. The model was applied to operationalize the principles and practices of BPM within a prevailing culture of reactive management. The contributions of this paper are to: (1) describe extensions to the popular BPM implementation models; (2) identify a critical organizational change management issue and an unconventional approach to addressing this issue; and (3) propose an alternative engagement model to the 'expert' engagement model employed between the BPM support unit and the business.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134313926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use of Colored Petri Nets to Model, Analyze, and Evaluate Service Composition and Orchestration","authors":"V. Gehlot, Kranthima Edupuganti","doi":"10.1109/HICSS.2009.1003","DOIUrl":"https://doi.org/10.1109/HICSS.2009.1003","url":null,"abstract":"The Concurrency, communications, resource constraints, and quality of service attributes are distinguishing features of web services. Assessment and determination of impact of the nonfunctional aspects such as service granularity, governance, composition, and orchestration is an overarching concern and this exercise should be carried out at the architecture design stage rather than post implementation and deployment. In this paper we illustrate, by means of a simple example, the use of Colored Petri Nets (CPNs) to model service composition and orchestration. We use the associated software tool called CPN Tools to perform the analysis. The results can be used in many ways such as to determine design alternative or to check conformance with existing service level agreements, etc. Colored Petri Nets, being a graphical modeling language suitable for modeling distributed, concurrent, deterministic and nondeterministic systems with synchronous and asynchronous communications, offer a natural choice for this endeavor. Although the example is given in the context of web services, CPNs view of interaction and coordination of systems is abstract and can be applied to different notions of services equally well.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131761487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding Coordination in IT Project-Based Environments: An Examination of Team Cognition and Virtual Team Efficacy","authors":"M. Keith, H. Demirkan, M. Goul","doi":"10.1109/HICSS.2009.993","DOIUrl":"https://doi.org/10.1109/HICSS.2009.993","url":null,"abstract":"Research has demonstrated how successful coordination can lead to greater organizational performance. In information technology (IT) project-based environments, coordinating the knowledge needed to perform activities is a particularly salient issue. Indeed, research has demonstrated how team cognition, or the awareness team members have about each other's capabilities, is a critical factor for project success. Recently, more advanced technologies have emerged which allow team members to share knowledge effectively in distributed and dynamic environments (e.g. Web 2.0). This study demonstrates how project coordination is a function of both the team cognition each member has as well as their ability to use these technologies in a way that will allow them to harness each others' knowledge. In addition, this relationship is influenced by the nature of the project task environment. A structural model is constructed based on the survey results of 235 project team members to demonstrate the findings.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131816877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}