2009 42nd Hawaii International Conference on System Sciences最新文献

筛选
英文 中文
Virtual Teams and Creative Performance 虚拟团队和创造性表现
2009 42nd Hawaii International Conference on System Sciences Pub Date : 2009-01-20 DOI: 10.1109/HICSS.2009.1018
L. Martins, C. Shalley, L. Gilson
{"title":"Virtual Teams and Creative Performance","authors":"L. Martins, C. Shalley, L. Gilson","doi":"10.1109/HICSS.2009.1018","DOIUrl":"https://doi.org/10.1109/HICSS.2009.1018","url":null,"abstract":"We developed and tested a model of the effects of demographic differences (i.e., differences in race, sex, age, and nationality) on creativity in dyads having short-term virtual work interactions. Specifically we examined how demographic differences interacted with dyad processes (establishment of rapport, participation equality, and process conflict) and a key input factor (difference in technical experience), to affect the creativity of dyads working virtually. Differences in nationality had a strong negative direct effect, and interacted with differences in technical experience to affect creativity. Differences in age interacted with dyad processes and differences in technical experience to affect creativity. Differences in sex and race did not significantly affect creativity. Implications are discussed for managing creative virtual work.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126261482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Service Composition in Public Networks: Results from a Quasi-Experiment 公共网络中的服务组合:准实验结果
2009 42nd Hawaii International Conference on System Sciences Pub Date : 2009-01-20 DOI: 10.1109/HICSS.2009.385
R. Feenstra, M. Janssen
{"title":"Service Composition in Public Networks: Results from a Quasi-Experiment","authors":"R. Feenstra, M. Janssen","doi":"10.1109/HICSS.2009.385","DOIUrl":"https://doi.org/10.1109/HICSS.2009.385","url":null,"abstract":"New systems can be created by assembling a set of elementary services provided by various stakeholders in a service composition. Service composition is not a trivial endeavor and several composition methods exist. Yet, these methods are hardly adopted by the field, as they need a set of well-defined and well- described services and are not able to deal with incomplete information and unambiguous descriptions. Furthermore, these methods are not able to deal with situations in which stakeholders have different requirements and need to negotiate with each other about the selection and performance of services.In this paper we present a service composition method and evaluate this method using a quasi-experimental design. The method is aimed at dealing with a set of heterogeneous services provided by stakeholders with different and sometimes even opposing requirements. We found that our composition method helps to create an overview of services and their attributes and enables better communication between stakeholders. A recommendation for further research is to integrate semantic and multi-actor composition methods.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126434825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Surviving Attacks and Intrusions: What can we Learn from Fault Models 幸存的攻击和入侵:我们能从故障模型中学到什么
2009 42nd Hawaii International Conference on System Sciences Pub Date : 2009-01-20 DOI: 10.1109/HICSS.2009.928
A. Krings, Z. Ma
{"title":"Surviving Attacks and Intrusions: What can we Learn from Fault Models","authors":"A. Krings, Z. Ma","doi":"10.1109/HICSS.2009.928","DOIUrl":"https://doi.org/10.1109/HICSS.2009.928","url":null,"abstract":"When designing or analyzing applications or infrastructures with high reliability, safety, security, or survivability demands, the fundamental questions are: what is required of the application and can the infrastructure support these requirements. In the design and analysis of fault-tolerant systems, fault models have served us well to describe the theoretical limits. But with the inclusion of malicious acts, the direct application of fault models has exposed limited applicability. However, we can take advantage of the powerful fault models if we defer their direct application from the events that lead to faults, that is, the fault causes, and instead focus on the effects. This way one can avoid questions referring to the meaning of fault models in the context of previously unsuitable faults like Trojan horses or Denial of Service (DoS) attacks. Instead, we can use fault models at the level of abstraction where the application maps on the infrastructure. In this paper fault models are discussed in the context of system survivability and malicious act. It is shown that these models can be used to balance the demands put on the application and the capabilities of the underlying infrastructure. Active and imposed fault descriptions are defined that allow to match the mechanisms that provide survivability to the application with the infrastructure-imposed limitations. By defining a system as a collection of functionalities, individual functionalities and their associated fault descriptions can be analyzed in isolation.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126394438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Groupware for Design: An Interactive System to Facilitate Creative Processes in Team Design Work 设计群件:促进团队设计工作创造性过程的交互系统
2009 42nd Hawaii International Conference on System Sciences Pub Date : 2009-01-20 DOI: 10.1109/HICSS.2009.751
Arjun Venkataswamy, Rajinder Sodhi, Y. Abdildin, B. Bailey
{"title":"Groupware for Design: An Interactive System to Facilitate Creative Processes in Team Design Work","authors":"Arjun Venkataswamy, Rajinder Sodhi, Y. Abdildin, B. Bailey","doi":"10.1109/HICSS.2009.751","DOIUrl":"https://doi.org/10.1109/HICSS.2009.751","url":null,"abstract":"Creativity as modeled using the recluse genius paradigm fails to recognize the necessity and value of the collaborative aspects involved. Enhancing the creative output of teams will become more and more necessary as the complexity of problems increases; this is especially true within the design domain. This paper explores the group processes and accompanying bottlenecks related to design work. Individuals and teams with experience in collocated design settings were studied to extract principles and best practices for group design work. Based on the findings, a set of design implications were extracted and an early prototype of a collaborative system was built to implement those conclusions. The tool attempts to model the highly effective ways that design teams work in a collocated environment while also addressing some of the bottlenecks they face.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121937599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multiple Social Networks Analysis of FLOSS Projects using Sargas 使用Sargas的FLOSS项目的多个社会网络分析
2009 42nd Hawaii International Conference on System Sciences Pub Date : 2009-01-20 DOI: 10.1109/HICSS.2009.831
Samuel Felix de Sousa, Marco Antonio Balieiro, J. Costa, C. D. Souza
{"title":"Multiple Social Networks Analysis of FLOSS Projects using Sargas","authors":"Samuel Felix de Sousa, Marco Antonio Balieiro, J. Costa, C. D. Souza","doi":"10.1109/HICSS.2009.831","DOIUrl":"https://doi.org/10.1109/HICSS.2009.831","url":null,"abstract":"Due to their characteristics and claimed advantages, several researchers have been investigating free and open-source projects. Different aspects are being studied: for instance, what motivates developers to join FLOSS projects, the tools, processes and practices used in FLOSS projects, the evolution of FLOSS communities among other things. Researchers have studied collaboration and coordination of open source software developers using an approach known as social network analysis and have gained important insights about these projects. Most researchers, however, have not focused on the integrated study of these networks and, accordingly, in their interrelationships. This paper describes an approach and tool to combine multiple social networks to study the evolution of open-source projects. Our tool, named Sargas, allows comparison and visualization of different social networks at the same time. Initial results of our analysis can be used to extend the \"onion-model\" of open source participation.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127903385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Information Security: User Precautions, Attacker Efforts, and Enforcement 信息安全:用户预防、攻击者努力和执行
2009 42nd Hawaii International Conference on System Sciences Pub Date : 2009-01-20 DOI: 10.1109/HICSS.2009.771
I. Png, Qiu-Hong Wang
{"title":"Information Security: User Precautions, Attacker Efforts, and Enforcement","authors":"I. Png, Qiu-Hong Wang","doi":"10.1109/HICSS.2009.771","DOIUrl":"https://doi.org/10.1109/HICSS.2009.771","url":null,"abstract":"We analyze the strategic interactions among end-users and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by end-users are strategic substitutes. This explains the inertia among users in taking precautions even in the face of grave potential consequences. Generally, information security can be addressed from two angles - facilitating end-user precautions and enforcement against attackers. We show that, enforcement is more effective as an all-round policy to enhance information security.Facilitating user precautions leads to increased precautions and increased end-user demand, which have conflicting effects on the total harm suffered by end-users. Hence, reduced form estimates of the impact of facilitating precautions may over- or under- estimate the impact, depending on which effect is stronger. Further, in targeted attacks, the outcome of interaction between users and attackers depends on the specific cost functions. Attackers may target low-valuation users as they take fewer precautions.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133915188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Bounding the Size of k-Tuple Covers 限定k-元组覆盖的大小
2009 42nd Hawaii International Conference on System Sciences Pub Date : 2009-01-20 DOI: 10.1109/HICSS.2009.605
W. Bein, S. Latifi, Linda Morales, I. H. Sudborough
{"title":"Bounding the Size of k-Tuple Covers","authors":"W. Bein, S. Latifi, Linda Morales, I. H. Sudborough","doi":"10.1109/HICSS.2009.605","DOIUrl":"https://doi.org/10.1109/HICSS.2009.605","url":null,"abstract":"Suppose there are n applications and n processors. A pair cover is a set S of one-to-one mappings (assignments) of the applications to the processors such that, for every pair (Ai,Aj) of applications and every pair (p,q) of processors, there is an assignment f in S that maps (Ai,Aj) to (p,q). More generally, we consider, for all k/spl ges/1, minimum size k-tuple covers. We improve bounds given earlier in by Latifi, where the application for k-tuple covers was fault tolerance of the multidimensional star network. Let F(n,k) denote the minimum cardinality k-tuple cover for n applications and processors. We give bounds for F(n,k) that are within a small multiplicative factor of optimum.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134299184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Managing on Purpose: A Practitioner's Goal for a Recalcitrant Bank 目的性管理:一个顽固银行的实践者的目标
2009 42nd Hawaii International Conference on System Sciences Pub Date : 2009-01-20 DOI: 10.1109/HICSS.2009.814
B. Frew
{"title":"Managing on Purpose: A Practitioner's Goal for a Recalcitrant Bank","authors":"B. Frew","doi":"10.1109/HICSS.2009.814","DOIUrl":"https://doi.org/10.1109/HICSS.2009.814","url":null,"abstract":"Business Process Management (BPM), as a management discipline, can only deliver value once its principles and practices are effectively integrated into an organization's business operating model. This paper analyses the application and evolution of a holistic model of the BPM management system in a large Australian bank. The model was applied to operationalize the principles and practices of BPM within a prevailing culture of reactive management. The contributions of this paper are to: (1) describe extensions to the popular BPM implementation models; (2) identify a critical organizational change management issue and an unconventional approach to addressing this issue; and (3) propose an alternative engagement model to the 'expert' engagement model employed between the BPM support unit and the business.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134313926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Use of Colored Petri Nets to Model, Analyze, and Evaluate Service Composition and Orchestration 使用彩色Petri网来建模、分析和评估服务组合和编排
2009 42nd Hawaii International Conference on System Sciences Pub Date : 2009-01-20 DOI: 10.1109/HICSS.2009.1003
V. Gehlot, Kranthima Edupuganti
{"title":"Use of Colored Petri Nets to Model, Analyze, and Evaluate Service Composition and Orchestration","authors":"V. Gehlot, Kranthima Edupuganti","doi":"10.1109/HICSS.2009.1003","DOIUrl":"https://doi.org/10.1109/HICSS.2009.1003","url":null,"abstract":"The Concurrency, communications, resource constraints, and quality of service attributes are distinguishing features of web services. Assessment and determination of impact of the nonfunctional aspects such as service granularity, governance, composition, and orchestration is an overarching concern and this exercise should be carried out at the architecture design stage rather than post implementation and deployment. In this paper we illustrate, by means of a simple example, the use of Colored Petri Nets (CPNs) to model service composition and orchestration. We use the associated software tool called CPN Tools to perform the analysis. The results can be used in many ways such as to determine design alternative or to check conformance with existing service level agreements, etc. Colored Petri Nets, being a graphical modeling language suitable for modeling distributed, concurrent, deterministic and nondeterministic systems with synchronous and asynchronous communications, offer a natural choice for this endeavor. Although the example is given in the context of web services, CPNs view of interaction and coordination of systems is abstract and can be applied to different notions of services equally well.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131761487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Understanding Coordination in IT Project-Based Environments: An Examination of Team Cognition and Virtual Team Efficacy 理解IT项目环境中的协调:团队认知和虚拟团队效能的检验
2009 42nd Hawaii International Conference on System Sciences Pub Date : 2009-01-20 DOI: 10.1109/HICSS.2009.993
M. Keith, H. Demirkan, M. Goul
{"title":"Understanding Coordination in IT Project-Based Environments: An Examination of Team Cognition and Virtual Team Efficacy","authors":"M. Keith, H. Demirkan, M. Goul","doi":"10.1109/HICSS.2009.993","DOIUrl":"https://doi.org/10.1109/HICSS.2009.993","url":null,"abstract":"Research has demonstrated how successful coordination can lead to greater organizational performance. In information technology (IT) project-based environments, coordinating the knowledge needed to perform activities is a particularly salient issue. Indeed, research has demonstrated how team cognition, or the awareness team members have about each other's capabilities, is a critical factor for project success. Recently, more advanced technologies have emerged which allow team members to share knowledge effectively in distributed and dynamic environments (e.g. Web 2.0). This study demonstrates how project coordination is a function of both the team cognition each member has as well as their ability to use these technologies in a way that will allow them to harness each others' knowledge. In addition, this relationship is influenced by the nature of the project task environment. A structural model is constructed based on the survey results of 235 project team members to demonstrate the findings.","PeriodicalId":211759,"journal":{"name":"2009 42nd Hawaii International Conference on System Sciences","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131816877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信