{"title":"Increasing Availability by Sacrificing Data Integrity - A Problem Statement","authors":"M. Jandl, A. Szep, R. Smeikal, K. M. Göschka","doi":"10.1109/HICSS.2005.312","DOIUrl":"https://doi.org/10.1109/HICSS.2005.312","url":null,"abstract":"Distributed software systems are the basis for innovative applications (e.g. pervasive computing, telecommunication services, and control engineering). The key for achieving scalable and maintainable distributed systems is dependability, because otherwise the complexity of distribution would leave the system uncontrollable. Hence, our approach aims at a concept for optimizing dependability. We present a research project and contribute with reasons motivating the relevance of our objective by showing real-life application scenarios and by analyzing relevant related work. Further, we contribute with our solution approach and the key idea: Similar to other approaches we use replication as means to provide transparent fault-tolerance and persistence, but we are especially focused on increasing availability by relaxing data integrity using a mixture of asynchronous and synchronous replication techniques.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127014720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Awareness of IT Control Frameworks in an Australian State Government: A Qualitative Case Study","authors":"C. Warland, Gail Ridley","doi":"10.1109/HICSS.2005.116","DOIUrl":"https://doi.org/10.1109/HICSS.2005.116","url":null,"abstract":"IT control frameworks set out best practices for IT actions, processes and monitoring within organisations, and are believed to lead to more effective IT governance. It is difficult to assess the adoption, awareness and perception of the value of the frameworks in the Australian public sector, due to the limited academic literature available. The exploratory research reported in this paper evaluated the awareness and understanding of IT control frameworks in three public sector agencies within an Australian state government, adopting a flexible definition of IT control frameworks. Comparison was made between the level of awareness and the outcomes of recent internal and external IT audits for the agencies, where available. Qualitative data were gathered from internal documentation and nine interviews, seeking IT and business-oriented perspectives. No use of formalised IT control frameworks was found, although informal approaches were noted. Awareness and understanding of IT control frameworks in the agencies appeared limited. The agencies investigated will lack motivation to derive value from utilising IT control frameworks without increased awareness of their purpose. Further research is warranted in this area, including the investigation of effective mechanisms for raising awareness of the potential of the frameworks.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127022308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Rules of Virtual Groups","authors":"J. Walther, Ulla K. Bunz, Natalya N. Bazarova","doi":"10.1109/HICSS.2005.617","DOIUrl":"https://doi.org/10.1109/HICSS.2005.617","url":null,"abstract":"Concerns about virtual groups include how members develop trust and liking for partners. Previous studies have explored behavioral variables leading to subjectively-experienced trust and/or liking, or trusting behaviors that are associated with group productivity. Drawing on practices described elsewhere and deriving principles from social information processing theory of computer-mediated communication, this research identified a set of communication rules for virtual groups. A quasi-experimental procedure promoted variance in rule following behavior, allowing assessment of rules in an inter-university course. Six rules were assessed through self-reported measures, and results reveal correlations between each rule and trust and liking. Less consistent are the relationships between rule-following and actual performance. Results suggest that either a powerful set of rules has been identified, or that rule-following per se reduces uncertainty and enhances trust in distributed work teams.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127027863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ambivalence and the Bivariate Nature of Attitudes in Information Systems Research","authors":"E. Walden, Glenn J. Browne, Jeff T. Larsen","doi":"10.1109/HICSS.2005.73","DOIUrl":"https://doi.org/10.1109/HICSS.2005.73","url":null,"abstract":"People using information technologies experience both joy and frustration, and thus develop both positive and negative attitudes toward systems. Many researchers in information systems have studied user attitudes toward technology, and such attitudes have in fact been one of the most frequently studied phenomena in the IS field. User attitudes have generally been measured utilizing bipolar scales, on which the low end represents strong negative attitudes and the high end represents strong positive attitudes. However, psychologists have long recognized that the positive and negative dimensions of attitudes can be separated, and attitudes are thus bivariate. In the present research, we investigate whether the positive and negative aspects of user attitudes are separable using constructs from the Technology Acceptance Model, one of the most frequently tested models in information systems research. Our results demonstrate that users can experience both positive and negative attitudes toward a system, and that the positive and negative attitudes are independent. Implications for information systems theory and measurement are discussed.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"707 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123837050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Wang, S. Basagni, E. Melachrinoudis, C. Petrioli
{"title":"Exploiting Sink Mobility for Maximizing Sensor Networks Lifetime","authors":"Z. Wang, S. Basagni, E. Melachrinoudis, C. Petrioli","doi":"10.1109/HICSS.2005.259","DOIUrl":"https://doi.org/10.1109/HICSS.2005.259","url":null,"abstract":"This paper explores the idea of exploiting the mobility of data collection points (sinks) for the purpose of increasing the lifetime of a wireless sensor network with energy-constrained nodes. We give a novel linear programming formulation for the joint problems of determining the movement of the sink and the sojourn time at different points in the network that induce the maximum network lifetime. Differently from previous solutions, our objective function maximizes the overall network lifetime (here defined as the time till the first node \"dies\" because of energy depletion) rather than minimizing the energy consumption at the nodes. For wireless sensor networks with up to 256 nodes our model produces sink movement patterns and sojourn times leading to a network lifetime up to almost five times that obtained with a static sink. Simulation results are performed to determine the distribution of the residual energy at the nodes over time. These results confirm that energy consumption varies with the current sink location, being the nodes more drained those in the proximity of the sink. Furthermore, the proposed solution for computing the sink movement results in a fair balancing of the energy depletion among the network nodes.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123144084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML)","authors":"A. Matheus","doi":"10.1109/HICSS.2005.300","DOIUrl":"https://doi.org/10.1109/HICSS.2005.300","url":null,"abstract":"Web Services, as the new building blocks of today's Internet provide the power to access distributed and heterogeneous information objects, which is the base for more advanced use like in electronic commerce. But, the access to these information objects is not always unrestricted. The owner of the information objects may control access due to different reasons. This paper introduces a novel approach for declaring information object related access restrictions, based on a valid XML encoding. The paper shows, how the access restrictions can be declared using XACML and Xpath. Based on the specified 'fine grained' policies, multiple policies can be applicable. If these policies declare positive and negative permissions for the same subject, policy inconsistencies exist. The paper also focuses on specifying the ground of policy inconsistencies and how to solve them.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123337732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technology Management in a Knowledge Based Economy","authors":"G. V. D. Pijl, P. Ribbers, M. Smits","doi":"10.1109/HICSS.2005.581","DOIUrl":"https://doi.org/10.1109/HICSS.2005.581","url":null,"abstract":"In the first paper Anne Quaadgras builds and analyzes the emerging radio frequency ID (RFID) ecosystem based on announcements of alliances among firms, and analyzes propositions with respect to the behavior of large, multiline technology firms around this innovative, technology based platform. The RFID network is used to empirically show that absorptive capacity, and exploration vs. exploitation theories may start to explain the behavior of large firms. Quaadgras shows that a propensity to form alliances in general makes it more likely that large established firms will join the RFID ecosystem, and that more exploratory firms join earlier. Greater availability of slack resources also leads to the formation of more alliances (greater degree centrality) in the network. The ecosystem perspective and these results may affect alliance decisions have implications for alliance decisions of firms entering into high cost technological innovations.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123360993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interorganizational Control with IT","authors":"John Tillquist","doi":"10.1109/HICSS.2005.337","DOIUrl":"https://doi.org/10.1109/HICSS.2005.337","url":null,"abstract":"The role of interorganizational information technologies (IT) in the external control of organizations is examined. At the beginning of the case study, an insurance firm is mired in government regulation and hostile relations with independent repair shops. Interorganizational IT was used to gain control over the activities and direction of the repair shops, easing tensions and streamlining the market. The design of the system allowed the insurance company to appear socially conscientious, shifting away from a reputation as a cost center. The reason why these changes were able to come about is explained by the shifting dependencies along the value chain brought about by strategic deployment of the new IT.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123377316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning from Project Experiences Using a Legacy-Based Approach","authors":"L. Cooper, A. Majchrzak, Samer Faraj","doi":"10.1109/HICSS.2005.386","DOIUrl":"https://doi.org/10.1109/HICSS.2005.386","url":null,"abstract":"As project teams become used more widely, the question of how to capitalize on the knowledge learned in these teams remains an open issue. Using previous research on transactive memory systems, an approach to promoting post-project learning was developed. This Legacy Session concept was tested on four in-tact project teams. The results from those pilot sessions were used to evaluate the feasibility of the approach and develop recommendations for future research.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116237782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. S. Pedro, F. Burstein, J. Wassertheil, Nitin Arora, L. Churilov, A. Zaslavsky
{"title":"On Development and Evaluation of Prototype Mobile Decision Support for Hospital Triage","authors":"J. S. Pedro, F. Burstein, J. Wassertheil, Nitin Arora, L. Churilov, A. Zaslavsky","doi":"10.1109/HICSS.2005.464","DOIUrl":"https://doi.org/10.1109/HICSS.2005.464","url":null,"abstract":"Ambiguous triage scenarios in hospital emergency departments are often difficult to assess without decision support. Subjective assessments of such scenarios can either lead to under-triaging or over-triaging for which true conditions of patients are often not addressed within the required time. In this paper, we propose a decision support model that can guide a clinician when identifying the urgency of medical intervention when patient presents with ambiguous triage case. Our model is a heuristic approach that selects the best triage category, identifies corresponding discriminating attribute of the patient, and allows clinician to attach a level of confidence in the decision. We implemented this model as a mobile decision support system, called iTriage. Results of an initial evaluation of iTriage using fourteen paper-based adult triage scenarios showed that our model produced robust decisions for urgent scenarios. For non-urgent scenarios, the proposed model provided guidance especially when the scenarios were ambiguously stated.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114756938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}