{"title":"Intermediaries in E-Inclusion: A Literature Review","authors":"M. Sorrentino, Bjoern Niehaves","doi":"10.1109/HICSS.2010.239","DOIUrl":"https://doi.org/10.1109/HICSS.2010.239","url":null,"abstract":"The development of socially-aware eGovernment policies requires the implementation of multiple delivery channels to give the different user categories the choice of which service access alternatives (physical and electronic) to use each time. The paper claims that new intermediaries play a potentially significant role in inclusive eGovernment strategies, in both the developed and the developing countries. A selective review of the disparate literature highlights the need for a better understanding of the role of these actors and their impacts on the qualities of the citizens' and public-sector relationships. Our exploratory research suggests the usefulness of placing the intermediaries in an institutional framework and proposes an agenda for future research.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130247084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Moos, D. Beimborn, Heinz-Theo Wagner, Tim Weitzel
{"title":"Suggestions for Measuring Organizational Innovativeness: A Review","authors":"B. Moos, D. Beimborn, Heinz-Theo Wagner, Tim Weitzel","doi":"10.1109/HICSS.2010.354","DOIUrl":"https://doi.org/10.1109/HICSS.2010.354","url":null,"abstract":"Innovativeness has emerged as a firm's key nonfinancial goal and as an important measure of organizational performance. But, the different measurement models used in empirical research impede the emergence of a consistent perspective on drivers and consequences of innovativeness. We reviewed 12 major journals from various disciplines and found 56 articles that provide measurement models for innovativeness. Based on reviewing and comparing these measurement models, we derive suggestions for a more comprehensive measure of innovativeness for future research.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131510991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ville Heikkilä, Anas Jadallah, K. Rautiainen, G. Ruhe
{"title":"Rigorous Support for Flexible Planning of Product Releases - A Stakeholder-Centric Approach and Its Initial Evaluation","authors":"Ville Heikkilä, Anas Jadallah, K. Rautiainen, G. Ruhe","doi":"10.1109/HICSS.2010.323","DOIUrl":"https://doi.org/10.1109/HICSS.2010.323","url":null,"abstract":"This paper addresses the problem of product release planning in iterative product development. We propose a method which combines decision, process, and tool support. The method, which is called SCERP, facilitates the active involvement of stakeholders in the different stages of the planning process. SCERP is flexible in the number of stakeholders involved, in the number of releases, in the number and definition of planning criteria, and in the selection of the best plan out of a set of optimized alternatives. A proof-of-concept of the method is given by a case study of release planning for a tool called Agilefant, which is developed with a process partially based on Scrum. The benefits of the method as demonstrated by the case study are: (i) better decisions by the product manager by relying on more objective information, (ii) more transparency of release decisions, and (iii) efficient tool support accompanying the whole process.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132970701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Green IT Practices of Nokia, Samsung, Sony, and Sony Ericsson: Content Analysis Approach","authors":"Yulia Wati, C. Koo","doi":"10.1109/HICSS.2010.480","DOIUrl":"https://doi.org/10.1109/HICSS.2010.480","url":null,"abstract":"The challenge of responding to the environmental issues has changed many aspects of the ways businesses operate, and this is particularly true of electronics companies. \"Going green\" in the IT industry is proving a major challenge, as significant shifts in thinking are needed to secure the benefits associated with being green. Using a content analysis method, we have investigated and expanded the concept of Green IT, as implemented by four major electronic companies. By analyzing these companies' environmental reports, we have established a set of theoretical concepts of Green IT, driven by companies' practical implementations. We proposed nine propositions outlining the theoretical implications. Additionally, our analysis demonstrated that the principal focus of electronic companies is green disposal practices, followed by energy efficiency efforts. We also concluded that regulations and policies coupled with heightened awareness and environmental responsibility on the part of the company can encourage Green IT innovation. This paper also provides a discussion of the results and of the contributions made by this research.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131011582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A MultiExpert Approach for Bayesian Network Structural Learning","authors":"F. Colace, M. D. Santo, M. Vento","doi":"10.1109/HICSS.2010.23","DOIUrl":"https://doi.org/10.1109/HICSS.2010.23","url":null,"abstract":"The determination of a Bayesian network structure, especially in the case of wide domains, can be often complex, time consuming and imprecise. Therefore the interest of scientific community in learning Bayesian network structure from data is increasing: many techniques or disciplines, as data mining, text categorization, ontology building, can take advantage from structural learning. In literature there are many structural learning algorithms but none of them provides good results in every case or dataset. This paper introduces a method for structural learning of Bayesian networks based on a Multi-Expert approach. The proposed method combines the outputs of five well known structural learning algorithms according to a majority vote combining rule. This approach shows a performance that is better than any single algorithm. This paper shows an experimental validation of the proposed algorithm on a set of \"de facto\" standard networks, measuring performance both in terms of the network topological reconstruction and of the correct orientation of the obtained arcs. The first results seem to be promising.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131223567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Initial Case Study on \"the Good, the Bad and the Ugly\" Aspects of a New MSc Program in Computer Forensics and E-Discovery","authors":"W. Glisson, R. Welland","doi":"10.1109/HICSS.2010.234","DOIUrl":"https://doi.org/10.1109/HICSS.2010.234","url":null,"abstract":"There are a number of critical factors that will affect the success of new MSc programs in Digital / Computer Forensics and E-Discovery. This paper presents the idea that there are essential, basic criteria that need to be identified, defined and addressed from a student's perspective when examining an MSc program in Digital / Computer Forensics and E-Discovery. This paper makes two contributions. The criteria presented in this paper can be used to help assess an existing MSc program from a student's perspective and it can also be used as a guide to the development of new MSc programs.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"520 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132161655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Lesieutre, Michael Schlindwein, Edward E. Beglin
{"title":"DC Optimal Power Flow Proxy Limits","authors":"B. Lesieutre, Michael Schlindwein, Edward E. Beglin","doi":"10.1109/HICSS.2010.130","DOIUrl":"https://doi.org/10.1109/HICSS.2010.130","url":null,"abstract":"Proxy limits are used to represent voltage constraints from an AC power flow as line flow constraints in a DC power flow. When a DC power flow is used to settle markets, the use of proxy limits can introduce errors in LMPs, dispatch, or both. This paper describes a method to obtain the optimal set of proxy limits for known voltage constraints. We discuss the general properties of these proxy limits.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134647578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grounded Theory and Information Systems: Are We Missing the Point?","authors":"Hans P. Lehmann","doi":"10.1109/HICSS.2010.216","DOIUrl":"https://doi.org/10.1109/HICSS.2010.216","url":null,"abstract":"Theories indigenous to the information systems discipline are scarce. The Grounded Theory Method (GTM) specifically aims to create theory in domains where none are. But although its use in information systems research increased over the last two decades, the number of grounded theories created did not. This could be because either GTM is not \"right\" for the information systems discipline or that it is not \"done right\". The paper investigates both options and concludes firstly that the method is \"right\": it is a general method, capable of accepting any kind of data and works well with information systems, which are defined as actor networks of technology and people. There is, however, reason to suspect that GTM is not \"done right\". What GTM's core tenets are and how to apply them seems often misunderstood. Two core tenets are defined: (a) the specific rigour of its data collection and analysis; and (b) the maxim of only using concepts as the unit of analysis for developing grounded theory. In conclusion, GTM's paradigmatic position (or, more accurately, its lack of one) is discussed.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131273523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of the 3D Multi User Virtual Environment of Second Life to Emergency Evacuation Simulation","authors":"J. Molka-Danielsen, M. Chabada","doi":"10.1109/HICSS.2010.448","DOIUrl":"https://doi.org/10.1109/HICSS.2010.448","url":null,"abstract":"Virtual reality technologies have been used to simulate evacuation and training exercises. Sometimes it is chosen to simulate the entire environment. However, openly accessible 3D multi user virtual environments (MUVE) such as Second Life offer new opportunity for emergency evacuation simulation and training exercises. Our article presents lessons learned from the development of a model in a university building and trials conducted in evacuation simulation within Second Life. While human behavior differs from reality in simulated environments, we find that training exercises in Second Life did have real value.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127372797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Insights for an Old Problem: Explaining Software Piracy through Neutralization Theory","authors":"M. Siponen, Anthony Vance, R. Willison","doi":"10.1109/HICSS.2010.287","DOIUrl":"https://doi.org/10.1109/HICSS.2010.287","url":null,"abstract":"Software piracy continues to be a major economic concern for organizations. Given the widespread nature of the problem, software piracy has received attention from IS scholars. Previous research indicates that neutralization - a form of rationalization - can help to explain software piracy intentions. However, a knowledge gap exists in our understanding about which techniques of neutralization contributes most to software piracy intentions. To address this gap, we advance a model that explains the effects of neutralization techniques on software piracy intentions. For greater explanatory power, we also include formal sanctions, shame, and moral beliefs in our model. Empirical results (n=183) show that neutralization techniques \"appeal to higher loyalties\" and \"condemnation of the condemners\" strongly predict software piracy intentions. In addition, shame and moral beliefs are also strong predictors. These findings suggest that anti-piracy efforts should involve educational interventions aimed at addressing these two neutralization techniques, rather than relying on formal sanctions.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133763423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}