{"title":"Investigating Social Computing in Competitive Dynamics","authors":"Sandra A. Vannoy, B. Medlin","doi":"10.1109/HICSS.2012.383","DOIUrl":"https://doi.org/10.1109/HICSS.2012.383","url":null,"abstract":"This paper contributes to a program of research linking the fields of information systems and competitive dynamics. Findings suggest that effective collaboration on complex competitive actions is facilitated by unplanned social network configurations that are supported by particular technologies. Furthermore, findings indicate that managers in superior network positions largely control not only the flow of information and knowledge among network participants but also the information technologies by which the social network infrastructure is supported.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133188840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hsin-Lu Chang, Jia-Ren Lin, Kai Wang, Carol W. Hsu, Jeffrey C. F. Tai
{"title":"The Design of the Mobile Service: Fit between Mobility and Customer Variability","authors":"Hsin-Lu Chang, Jia-Ren Lin, Kai Wang, Carol W. Hsu, Jeffrey C. F. Tai","doi":"10.1109/HICSS.2012.559","DOIUrl":"https://doi.org/10.1109/HICSS.2012.559","url":null,"abstract":"In the service economy, as markets change from offering physical products to offering services, organizations across many industries must embrace this transformation to remain competitive. Mobile technology plays an important role in this transformation because of characteristics such as mobility. However, high levels of mobility may not always contribute to service performance. Due to customer variability in service encounters, we argue that different customers may prefer different types of mobility design. In this paper, we identify customer variability that affects the quality of the service encounter and try to determine how these factors moderate the performance impacts of mobility in the design of the mobile service. We propose that a fit must be achieved between mobility design and customer variability, in order to increase mobile service performance. The results of this inquiry can guide service providers in developing more attractive mobile services through mobile technology.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128860943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Android: Static Analysis Using Similarity Distance","authors":"Anthony Desnos","doi":"10.1109/HICSS.2012.114","DOIUrl":"https://doi.org/10.1109/HICSS.2012.114","url":null,"abstract":"As Android applications become increasingly ubiquitous, we need algorithms and tools to protect applications from product tampering and piracy, while facilitating valid product updates. Since it is easy to derive Java source code from Android byte code, Android applications are particularly vulnerable to tampering. This paper presents an algorithm, based on a customized similarity distance, which returns a value between 0 and 1, which can serve as a change indicator. Potential applications of the algorithm include 1) to determine if obfuscators, applied by developers, are protecting their code from piracy, 2) to determine if an Android application is infected with malware, facilitating the automatic extraction of the injected malware, and 3) to identify valid code updates and releases as part of the code release cycle.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134473082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Boundary Objects, Agents, and Organizations: Lessons from E-Document System Development in Thailand","authors":"Radaphat Chongthammakun, S. Jackson","doi":"10.1109/HICSS.2012.133","DOIUrl":"https://doi.org/10.1109/HICSS.2012.133","url":null,"abstract":"Star and Griesemer's concept of boundary objects has become a central analytic framework in the fields of science and technology studies (STS), computer supported cooperative work (CSCW), information science, and organizational studies. Scholars have also begun to extend the original boundary object concept in useful ways: for example, to boundary agents and organizations, emphasizing the active nature of translation or communication between networks, organizations, and social worlds. These insights have for the most part not carried over into scholarship on information technology and organizational reform in the public sector, and still less to DG reform efforts outside of the global north. The present paper develops a suite of boundary concepts - objects, agents, and organizations -- and connects these to core problems in DG scholarship. Our empirical focus is on DG reform efforts in Thailand - in particular, tensions and challenges surrounding ongoing efforts to develop interoperable and government-wide e-Document systems and practices.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131275955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Self-Determination Perspective on IT-Based Citizen Advisory Support","authors":"T. Giesbrecht, Joachim Pfister, G. Schwabe","doi":"10.1109/HICSS.2012.83","DOIUrl":"https://doi.org/10.1109/HICSS.2012.83","url":null,"abstract":"In public advisory services, the individual's satisfaction depends less on extrinsic factors (e.g., monetary rewards) than on their inner needs fulfillment. Currently used IT-systems supporting citizen advisory services neglect these intrinsic needs of their users, hence insufficiently fostering their satisfaction. In this paper, we aim to close this gap by assessing the design requirements needed to develop value-added IT-systems for citizen advisory services. We thus refer to self-determination theory to analyze current literature perspectives on how to design adequate IT-systems fostering users' basic needs. We follow a design science approach and implement these requirements in a software prototype, and evaluate them qualitatively in a user study with real-world advisors and citizens. Our preliminary results show that this approach promises to reveal the design requirements that matter in citizen counseling, signifying an important step toward developing a conceptual IT systems design model.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127068347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the Use of Stories in Patterns of Collaboration","authors":"Tanja Buttler, S. Lukosch","doi":"10.1109/HICSS.2012.273","DOIUrl":"https://doi.org/10.1109/HICSS.2012.273","url":null,"abstract":"Stories are an ancient way to communicate experiences (i.e. direct observations of or participation in events as a basis of knowledge). By looking closely on how experts communicate, we find that they tell stories to convey the challenges and solutions they encountered. Thereby, stories can play a major role in group decision-making, but so far the role of storytelling during group decision-making has not been extensively researched. Based on these grounds we investigate in this article the possible use of stories in group decision-making processes. For that purpose, we conducted a series of interviews with professional facilitators on how they have perceived the use of stories in decision-making processes. We present our analysis of the interviews along the patterns of collaboration and extract a set of propositions for future research.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124149005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IT Strategic Planning in a Pediatric Hospital: Overview of the Process and Outcomes","authors":"M. Jaana, M. Teitelbaum, T. Roffey","doi":"10.1109/HICSS.2012.395","DOIUrl":"https://doi.org/10.1109/HICSS.2012.395","url":null,"abstract":"The role of Information Technology (IT) is increasing in health care, which necessitates applying strategic thinking and analysis when making IT investments. IT strategic planning allows hospitals to analyze their environment and develop an operational plan for IT implementation. This paper presents the framework and methodology used in IT strategic planning at a tertiary care pediatric hospital in Ontario. We describe a five-stage sequential process that captured the Current State of IT, defined the desired Future State, and mapped the work required to achieve the goals. Various tools and approaches were employed including review of existing documentation, internal stakeholders' survey (n=111), 15 internal and external interviews, and 12 workshops. The process was informed by 230 individuals (12% of hospital community). Overall, there was consistency in the themes and concerns raised. Major challenges and lessons learned are highlighted, which would be helpful for hospitals engaging in similar effort in the future.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124207486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Centrality and Contributions to Online Public Good--The Case of Chinese Wikipedia","authors":"Chong Wang, X. Zhang","doi":"10.1109/HICSS.2012.444","DOIUrl":"https://doi.org/10.1109/HICSS.2012.444","url":null,"abstract":"Internet technology enables virtual collaboration and plays an important role in knowledge production. However, collaborative technology will not function without conducive underlying social mechanisms. Previous research mostly investigates individual-level motivations of editors, with only a few exceptions examining the collaboration relationships. In this paper, we take a structural perspective and investigate the impact of positions (centralities) of editors in the collaboration networks on their efforts and effort allocations. To achieve this, we empirically reconstruct the dynamic collaboration network of Chinese Wikipedia for the period between 2002 and 2007. Based on a dynamic view of the network, we compose a panel data set that covers both the contribution behavior and network position characteristics of Wikipedia editors. We strengthen our causal interpretation by leveraging the exogenous block that prevented Wikipedia editors in Mainland China from accessing the website. We find distinctive effort allocation patterns that strongly correlate with network centrality measures. This confirms theoretical predictions derived in recent developments in network economics and social network theories. This research enhances our understanding about how collaboration network structure shapes individuals' behavior in online collaboration platforms.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116914128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Seeing the Real World: Sharing Protected Data in Real Time","authors":"J. James, F. Mabry, Kevin L. Huggins","doi":"10.1109/HICSS.2012.518","DOIUrl":"https://doi.org/10.1109/HICSS.2012.518","url":null,"abstract":"We describe a new capability for \"owners\" of protected data to quickly and securely share real time data among networked decision-support and real-time control devices with whom the \"owners\" of the data have explicitly decided to \"share the data. The service is based upon implementation of a recent formal definition and mathematical result (James et al. 2009) derived from the decades-old Bell-LaPadula information security result (Bell and LaPadula, 1973). The service provides decision makers a means of securely and automatically sharing critical information across security barriers based upon declaration of sharing policies. The declaration and implementation of information sharing policies based upon a need-to-share has been shown to be compatible with information protection policies based upon a need-to-know. Indeed, the implementation of the need-to-share service is based upon extending the mathematical foundations of need-to-know information security systems (the Bell-LaPadula result of 1973).","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116929626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determining the Vulnerabilities of the Power Transmission System","authors":"B. Carreras, D. Newman, I. Dobson","doi":"10.1109/HICSS.2012.208","DOIUrl":"https://doi.org/10.1109/HICSS.2012.208","url":null,"abstract":"Determining the vulnerabilities in power transmission systems requires two distinct steps because most large blackouts have two distinct parts, the triggers/initiating event followed by the cascading failure. Finding the important triggers for large blackouts is the first and standard step. Next, the cascading part of the extreme event (which can be long or short) is critically dependent on the \"state\" of the system, how heavily the lines are loaded, how much generation margin exists, and where the generation exists relative to the load. However, during large cascading events there are some lines whose probability of overloading is higher that the others. Statistical studies of blackouts using the OPA code allow the identification of such lines or groups of line for a given network model, thereby providing a technique for identifying at risk (or critical) clusters. This paper addresses both parts of the vulnerability question.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116933876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}