首页 > 最新文献

36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the最新文献

英文 中文
Economics of technology standards: implications for offline movie piracy in a global context 技术标准经济学:全球背景下对线下电影盗版的影响
R. Chellappa, S. Shivendu
Reduced sizes of music files due to compression technologies has allowed for piracy to become a rampant problem on the Internet even in the absence of significant bandwidth. However given the large sizes of video files, movies are still largely pirated by duplicating DVDs, VCDs and other physical media. Conventionally DVD formats have differed across various regions in the world albeit for controlling theatrical releases of movies. This paper formulates an analytical model to study the implication of varying technology standards of DVD players across different regions on the piracy of movies. This research identifies conditions under which consumers engage in global and regional piracy. Our findings show that maintaining separate technology standards across regions is effective in not only thwarting global piracy but it also allows movie studios to create variable quality movies and engage in discriminatory pricing. While consumers may still engage in local piracy, the overall profits to the firm under variable technology standards are shown to be higher then when a common DVD standard is adopted across all regions. The paper concludes with recommendations for research and practice.
由于压缩技术的应用,音乐文件的体积减小了,这使得盗版成为互联网上一个猖獗的问题,即使在没有大量带宽的情况下也是如此。然而,考虑到视频文件的大小,电影仍然主要是通过复制dvd、vcd和其他物理媒体来盗版的。传统的DVD格式在世界各地有所不同,尽管是为了控制电影的影院发行。本文建立了一个分析模型,研究不同地区DVD播放机技术标准的差异对电影盗版的影响。这项研究确定了消费者参与全球和地区盗版的条件。我们的研究结果表明,在不同地区保持不同的技术标准不仅可以有效地打击全球盗版,而且还允许电影制片厂制作不同质量的电影,并进行歧视性定价。虽然消费者可能仍然会参与本地盗版,但在可变技术标准下,公司的总体利润比在所有地区采用通用DVD标准时更高。最后,对研究和实践提出了建议。
{"title":"Economics of technology standards: implications for offline movie piracy in a global context","authors":"R. Chellappa, S. Shivendu","doi":"10.1109/HICSS.2003.1174453","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174453","url":null,"abstract":"Reduced sizes of music files due to compression technologies has allowed for piracy to become a rampant problem on the Internet even in the absence of significant bandwidth. However given the large sizes of video files, movies are still largely pirated by duplicating DVDs, VCDs and other physical media. Conventionally DVD formats have differed across various regions in the world albeit for controlling theatrical releases of movies. This paper formulates an analytical model to study the implication of varying technology standards of DVD players across different regions on the piracy of movies. This research identifies conditions under which consumers engage in global and regional piracy. Our findings show that maintaining separate technology standards across regions is effective in not only thwarting global piracy but it also allows movie studios to create variable quality movies and engage in discriminatory pricing. While consumers may still engage in local piracy, the overall profits to the firm under variable technology standards are shown to be higher then when a common DVD standard is adopted across all regions. The paper concludes with recommendations for research and practice.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116401984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Personalization through mask marketing 通过面具营销实现个性化
Moritz Strasser, A. Zugenmaier
Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are exploited to generate a profile of interests of the users. Marketing measures like advertisements in form of banners or product presentation are tailored according to these profiles. This kind of customizing suffers from insufficient information about the current interests of the users: the profiles are only a collection of past actions of the users. Additionally, sometimes personalization is seen an invasion of privacy and often unsolicited advertisements unrelated to the users' real interests are cited as an example of the nuisances of 1-to-1 marketing. This shows the dilemma that 1-to-1 marketing faces: The users feel they already offer too much information about themselves. Currently, users solve this dilemma by disabling all technical means that enable user profiling, e.g. by disabling cookies in their Web browsers, using anonymity services, and providing fake identities to Web sites. We propose an approach based on peer-to-peer networks to allow marketing to a specific target group while preserving the privacy of users, we call it mask-marketing. In this concept a user assumes the identity of a mask representing his or her intentions. E.g., a user buying a Christmas present will use the "Christmas shopping" identity, afterwards the same user may use an "engineering" mask for an information search relating to his work. The users are able to present their preferences and intentions without these being attributable to their true identity. The masks, which are technically realized by sharing cookies, are distributed and updated using a peer-to-peer networking approach. This permits use of a mask by several different users. All actions performed by different users under the identity of one mask contribute to the profile of this mask. Creation and distribution don't require a central service. This is an advantage since the sensitive profile data is not concentrated in a central entity in the network, which could be viewed by privacy sensitive users with suspicion.
定制营销,即所谓的1对1营销,通常被视为电子商务的灵丹妙药。用户配置文件,例如记录用户访问的每个站点的点击流,被用来生成用户兴趣的配置文件。营销措施,如横幅广告或产品展示形式,是根据这些配置文件量身定制的。这种自定义的缺点是缺乏关于用户当前兴趣的信息:配置文件只是用户过去行为的集合。此外,个性化有时被视为侵犯隐私,与用户实际兴趣无关的未经请求的广告经常被视为1对1营销的一个令人讨厌的例子。这显示了1对1营销面临的困境:用户觉得他们已经提供了太多关于自己的信息。目前,用户通过禁用所有启用用户分析的技术手段来解决这个困境,例如,通过禁用Web浏览器中的cookie,使用匿名服务,以及向Web站点提供虚假身份。我们提出了一种基于点对点网络的方法,允许对特定目标群体进行营销,同时保护用户的隐私,我们称之为“面具营销”。在这个概念中,用户假设一个面具的身份代表他或她的意图。例如,购买圣诞礼物的用户将使用“圣诞购物”身份,随后同一用户可以使用“工程”掩码进行与其工作相关的信息搜索。用户可以展示他们的偏好和意图,而无需将这些归因于他们的真实身份。掩码在技术上是通过共享cookie实现的,使用点对点网络方法进行分发和更新。这允许多个不同的用户使用一个掩码。不同用户在同一掩码下所做的所有动作都将生成该掩码的配置文件。创建和分发不需要中央服务。这是一个优势,因为敏感的个人资料数据不会集中在网络中的中心实体中,这可能会被隐私敏感的用户怀疑地查看。
{"title":"Personalization through mask marketing","authors":"Moritz Strasser, A. Zugenmaier","doi":"10.1109/HICSS.2003.1174582","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174582","url":null,"abstract":"Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are exploited to generate a profile of interests of the users. Marketing measures like advertisements in form of banners or product presentation are tailored according to these profiles. This kind of customizing suffers from insufficient information about the current interests of the users: the profiles are only a collection of past actions of the users. Additionally, sometimes personalization is seen an invasion of privacy and often unsolicited advertisements unrelated to the users' real interests are cited as an example of the nuisances of 1-to-1 marketing. This shows the dilemma that 1-to-1 marketing faces: The users feel they already offer too much information about themselves. Currently, users solve this dilemma by disabling all technical means that enable user profiling, e.g. by disabling cookies in their Web browsers, using anonymity services, and providing fake identities to Web sites. We propose an approach based on peer-to-peer networks to allow marketing to a specific target group while preserving the privacy of users, we call it mask-marketing. In this concept a user assumes the identity of a mask representing his or her intentions. E.g., a user buying a Christmas present will use the \"Christmas shopping\" identity, afterwards the same user may use an \"engineering\" mask for an information search relating to his work. The users are able to present their preferences and intentions without these being attributable to their true identity. The masks, which are technically realized by sharing cookies, are distributed and updated using a peer-to-peer networking approach. This permits use of a mask by several different users. All actions performed by different users under the identity of one mask contribute to the profile of this mask. Creation and distribution don't require a central service. This is an advantage since the sensitive profile data is not concentrated in a central entity in the network, which could be viewed by privacy sensitive users with suspicion.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116618692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Individual differences in private banking: empirical evidence from Finland 私人银行的个体差异:来自芬兰的经验证据
Heikki Karjaluoto, T. Koivumäki, J. Salo
The financial industry can nowadays be viewed as a battlefield where the players are keenly planning new ways to achieve competitive advantage. Besides increasing competition and change, the current trend in private banking has been the consumer movement from traditional branch banking to stand-alone, online banking. This paper examines the uptake of online banking by the use of a survey (1167 responses) conducted during the summer of 2000 in Finland. The main results of the study indicate that while the diffusion of electronic delivery channels has been rapid, the management of digital customer relationships has become of key importance. By comparing different types of bank customers and by evaluating their perceptions of technology and delivery channels, it can be argued that nonusers of online banking might be most loyal segment whereas online banking users can be considered more likely to change their banks.
如今,金融行业可以被视为一个战场,参与者们都在敏锐地规划新的方法来获得竞争优势。除了日益激烈的竞争和变化之外,目前私人银行业务的趋势是消费者从传统的分行银行转向独立的网上银行。本文通过使用2000年夏天在芬兰进行的一项调查(1167份回复)来研究网上银行的使用情况。研究的主要结果表明,随着电子交付渠道的迅速普及,数字化客户关系的管理变得至关重要。通过比较不同类型的银行客户并评估他们对技术和交付渠道的看法,可以认为非网上银行用户可能是最忠诚的部分,而网上银行用户可以被认为更有可能改变他们的银行。
{"title":"Individual differences in private banking: empirical evidence from Finland","authors":"Heikki Karjaluoto, T. Koivumäki, J. Salo","doi":"10.1109/HICSS.2003.1174449","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174449","url":null,"abstract":"The financial industry can nowadays be viewed as a battlefield where the players are keenly planning new ways to achieve competitive advantage. Besides increasing competition and change, the current trend in private banking has been the consumer movement from traditional branch banking to stand-alone, online banking. This paper examines the uptake of online banking by the use of a survey (1167 responses) conducted during the summer of 2000 in Finland. The main results of the study indicate that while the diffusion of electronic delivery channels has been rapid, the management of digital customer relationships has become of key importance. By comparing different types of bank customers and by evaluating their perceptions of technology and delivery channels, it can be argued that nonusers of online banking might be most loyal segment whereas online banking users can be considered more likely to change their banks.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123878833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Introduction to minitrack: computational issues in bioinformatics 微型轨道导论:生物信息学中的计算问题
Hesham H. Ali
With a strong foundation in Computational Biology and Computational Chemistry, Bioinformatics is fast emerging as one of the most exciting scientific disciplines in the twenty-first century. A true multidisciplinary field of study, Bioinformatics deals with the development and use of mathematical and computational methods to assist in modeling and solving problems in biosciences. Employing algorithmic approaches are expected to be essential to the development and advancement of many fields in biosciences. This, in part, is due to the recent explosion of biological data, which requires an associated increase in the scale and sophistication of the automated systems and tools that enable researchers to take advantage of its availability. Additionally, there are a large number of research projects and applications that demands automated computational support. The need for Bioinformatics reflects the radical changes that the biological sciences have undergone recently. As more important biological elements are studied and their roles in complex biological systems are discovered, it is apparent that integrating computational research and experimental work will be crucial in exploring and understanding these discoveries. Although the Bioinformatics Minitrack focuses on the computational issues in Bioinformatics, its main goal is to provide a venue for researchers from all related fields to present new integrated approaches to address real Bioinformatics problems. This is apparent in all five papers that comprise the minitrack. Each paper presents a new concept, tool or technique that is motivated by an important problem related to Bioinformatics. The first two papers in the minitrack deal with issues related to whole genomes. In the first paper, “Comparative Genome Anotation for Mapping, Prediction and discovery of Genes,” by Kappen and Salbaum, the analysis of specific chromosomes in two genomes, the human genome and the muse genome, leads to fully assemble a large contiguous sequence that contains fourteen genes. While the paper leaning toward the bioscience aspect of Bioinformatics, the second paper employs computational techniques to deal with alignment problems at the genome level. In the paper, titled, “A Prototype for Multiple Whole Genome Alignment,” by
在计算生物学和计算化学的坚实基础上,生物信息学正迅速成为21世纪最令人兴奋的科学学科之一。生物信息学是一个真正的多学科研究领域,涉及数学和计算方法的发展和使用,以协助建模和解决生物科学中的问题。采用算法方法对生物科学许多领域的发展和进步至关重要。这在一定程度上是由于最近生物数据的爆炸式增长,这需要相应的自动化系统和工具的规模和复杂性的增加,使研究人员能够利用其可用性。此外,还有大量的研究项目和应用需要自动计算支持。对生物信息学的需求反映了生物科学最近发生的根本变化。随着越来越多重要的生物元素的研究及其在复杂生物系统中的作用被发现,很明显,将计算研究和实验工作结合起来对于探索和理解这些发现至关重要。尽管生物信息学迷你论坛关注的是生物信息学中的计算问题,但其主要目标是为所有相关领域的研究人员提供一个场所,以展示解决实际生物信息学问题的新综合方法。这在构成迷你轨道的所有五篇论文中都很明显。每篇论文都提出了一个新的概念,工具或技术,这是由一个与生物信息学相关的重要问题所激发的。《迷你期刊》的前两篇论文涉及与全基因组相关的问题。在第一篇论文《基因定位、预测和发现的比较基因组注释》中,Kappen和Salbaum对两个基因组(人类基因组和缪斯基因组)中的特定染色体进行了分析,从而完全组装了一个包含14个基因的大型连续序列。虽然这篇论文倾向于生物信息学的生物科学方面,但第二篇论文采用计算技术来处理基因组水平的比对问题。在这篇题为《多个全基因组排列的原型》的论文中
{"title":"Introduction to minitrack: computational issues in bioinformatics","authors":"Hesham H. Ali","doi":"10.1109/HICSS.2003.1174801","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174801","url":null,"abstract":"With a strong foundation in Computational Biology and Computational Chemistry, Bioinformatics is fast emerging as one of the most exciting scientific disciplines in the twenty-first century. A true multidisciplinary field of study, Bioinformatics deals with the development and use of mathematical and computational methods to assist in modeling and solving problems in biosciences. Employing algorithmic approaches are expected to be essential to the development and advancement of many fields in biosciences. This, in part, is due to the recent explosion of biological data, which requires an associated increase in the scale and sophistication of the automated systems and tools that enable researchers to take advantage of its availability. Additionally, there are a large number of research projects and applications that demands automated computational support. The need for Bioinformatics reflects the radical changes that the biological sciences have undergone recently. As more important biological elements are studied and their roles in complex biological systems are discovered, it is apparent that integrating computational research and experimental work will be crucial in exploring and understanding these discoveries. Although the Bioinformatics Minitrack focuses on the computational issues in Bioinformatics, its main goal is to provide a venue for researchers from all related fields to present new integrated approaches to address real Bioinformatics problems. This is apparent in all five papers that comprise the minitrack. Each paper presents a new concept, tool or technique that is motivated by an important problem related to Bioinformatics. The first two papers in the minitrack deal with issues related to whole genomes. In the first paper, “Comparative Genome Anotation for Mapping, Prediction and discovery of Genes,” by Kappen and Salbaum, the analysis of specific chromosomes in two genomes, the human genome and the muse genome, leads to fully assemble a large contiguous sequence that contains fourteen genes. While the paper leaning toward the bioscience aspect of Bioinformatics, the second paper employs computational techniques to deal with alignment problems at the genome level. In the paper, titled, “A Prototype for Multiple Whole Genome Alignment,” by","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121719771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Peer-to-peer (P2P) computing 点对点(P2P)计算
D. Schoder, K. Fischbach
Reduced to a common denominator the term peer-to-peer (P2P) refers to technology which enables two or more peers to collaborate spontaneously in a network of equals (peers) by using appropriate information and communication systems without the necessity for central coordination. P2P applications include file sharing, grid computing, web services, P2P groupware and instant messaging. Napster and Gnutella or the AOL Instant Messenger are famous examples, each with millions of users. Operating largely independent of central coordination,
点对点(P2P)是一种技术,它使两个或多个对等点能够在对等网络(对等点)中通过使用适当的信息和通信系统自发协作,而不需要中央协调。P2P应用包括文件共享、网格计算、网络服务、P2P群件和即时通讯。Napster和Gnutella或AOL Instant Messenger都是著名的例子,它们都拥有数百万用户。基本上独立于中央协调运作,
{"title":"Peer-to-peer (P2P) computing","authors":"D. Schoder, K. Fischbach","doi":"10.1109/HICSS.2003.1174578","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174578","url":null,"abstract":"Reduced to a common denominator the term peer-to-peer (P2P) refers to technology which enables two or more peers to collaborate spontaneously in a network of equals (peers) by using appropriate information and communication systems without the necessity for central coordination. P2P applications include file sharing, grid computing, web services, P2P groupware and instant messaging. Napster and Gnutella or the AOL Instant Messenger are famous examples, each with millions of users. Operating largely independent of central coordination,","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124644044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Project management minitrack focus: leveraging information technology 项目管理重点:利用信息技术
H. Thamhain
Perspective. Project management is one of the most critical processes for implementing multidisciplinary ventures and leveraging company resources, ranging from new product developments to production setups, service rollouts and organizational mergers. At the same time, advances in information technology had a profound impact on project management as an enabling tool, affecting project management capabilities, scope and leadership style enormously. IT-based project management tools and techniques range from software for project planning/tracking to web-based project support systems. These new technologies provide a contemporary framework for multi-functional linkages and communications, essential for successfully integrating today’s complex projects. However, the increased level of data access, processing and interconnectivity, also creates vast challenges involving a wide spectrum of management and organizational issues. In addition there have been substantial developments in the application of project management to IT and software development projects. Many of these IT based project management tools are linked to project execution, others are designed to support scope definition and control, team management, and global integration.
视角。项目管理是实施多学科风险投资和利用公司资源的最关键的过程之一,从新产品开发到生产设置,服务推出和组织合并。与此同时,信息技术的进步作为一种使能工具对项目管理产生了深远的影响,极大地影响了项目管理的能力、范围和领导风格。基于it的项目管理工具和技术范围从项目计划/跟踪软件到基于web的项目支持系统。这些新技术为多功能联系和通信提供了当代框架,对于成功整合当今复杂的项目至关重要。然而,数据访问、处理和互联互通水平的提高也带来了涉及广泛管理和组织问题的巨大挑战。此外,在将项目管理应用于IT和软件开发项目方面也有了实质性的发展。这些基于IT的项目管理工具中的许多都与项目执行相关联,其他的被设计用于支持范围定义和控制、团队管理和全局集成。
{"title":"Project management minitrack focus: leveraging information technology","authors":"H. Thamhain","doi":"10.1109/HICSS.2003.1174636","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174636","url":null,"abstract":"Perspective. Project management is one of the most critical processes for implementing multidisciplinary ventures and leveraging company resources, ranging from new product developments to production setups, service rollouts and organizational mergers. At the same time, advances in information technology had a profound impact on project management as an enabling tool, affecting project management capabilities, scope and leadership style enormously. IT-based project management tools and techniques range from software for project planning/tracking to web-based project support systems. These new technologies provide a contemporary framework for multi-functional linkages and communications, essential for successfully integrating today’s complex projects. However, the increased level of data access, processing and interconnectivity, also creates vast challenges involving a wide spectrum of management and organizational issues. In addition there have been substantial developments in the application of project management to IT and software development projects. Many of these IT based project management tools are linked to project execution, others are designed to support scope definition and control, team management, and global integration.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125018220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rationalizing, probing, understanding: the evolution of the systems adoption field 理性化、探索性、理解性:制度采用领域的演变
S. Ramanathan, J. Rose
Previous surveys of the interorganizational systems (IOS) adoption field have developed taxonomic schemes to improve general understanding of the field. This paper instead studies the historical development of the field and describes its evolution in a stage model. In the rationalizing stage researchers tried to discover and communicate reasons for some apparently successful adoptions of IOS. However it soon became clear that IOS adoption was relatively limited and in the probing stage the focus changed to investigating the failure of the promised seamless integration. No unified coherent theoretical account emerged from these studies, so in the understanding stage researchers widened the focus of study to try to develop a richer account of the many complex influences on IOS adoption. The three stages are associated with different objectives, assumptions, theoretical backgrounds and research approaches.
以前对组织间系统(IOS)采用领域的调查已经制定了分类方案,以提高对该领域的一般理解。相反,本文研究了该领域的历史发展,并以阶段模型描述了其演变。在合理化阶段,研究人员试图发现并传达一些明显成功采用IOS的原因。然而,很快我们就发现IOS的采用相对有限,在探索阶段,我们的重点转向了调查承诺的无缝整合的失败。这些研究没有形成统一连贯的理论解释,因此在理解阶段,研究人员扩大了研究的重点,试图对IOS采用的许多复杂影响进行更丰富的解释。这三个阶段具有不同的目标、假设、理论背景和研究方法。
{"title":"Rationalizing, probing, understanding: the evolution of the systems adoption field","authors":"S. Ramanathan, J. Rose","doi":"10.1109/HICSS.2003.1174732","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174732","url":null,"abstract":"Previous surveys of the interorganizational systems (IOS) adoption field have developed taxonomic schemes to improve general understanding of the field. This paper instead studies the historical development of the field and describes its evolution in a stage model. In the rationalizing stage researchers tried to discover and communicate reasons for some apparently successful adoptions of IOS. However it soon became clear that IOS adoption was relatively limited and in the probing stage the focus changed to investigating the failure of the promised seamless integration. No unified coherent theoretical account emerged from these studies, so in the understanding stage researchers widened the focus of study to try to develop a richer account of the many complex influences on IOS adoption. The three stages are associated with different objectives, assumptions, theoretical backgrounds and research approaches.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128970341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reaching for the site: meta tag litigation and access to Internet-based information 到达网站:元标签诉讼和访问基于互联网的信息
B. D. Vuyst, Katia Bodard
The Internet is often described as a free and open communication space, accessible to all and allowing access to any and all. The question put in this paper is, generally, how freely accessible this space is, and in how far there may be restraints imposed by intellectual property owners, in particular in and in the context of the area of searching and the use of search engines. Conflicts arise especially on the use of meta tags in search engines. Meta tags are indeed important tools in searching for sites and names on the Internet. Hence, they may acquire an economic and financial value. As a counterpoint to that valorization, however, they may be abused to distort competition and to impinge on intellectual property rights of those mentioned in the meta tags. The emerging meta tag litigation in different countries, including the U.S. and several European countries among which Germany, Italy, Denmark and Belgium, is used in this paper, after a jurisprudential analysis, as a qualitative proxy for indicating, from a legal policy viewpoint, limits on free searching and reaching of Web sites, in particular as regards the restraints that may properly be imposed by intellectual property owners on meta tagging of names that are protected by their trademark rights, or by search engines to reduce spamming.
互联网通常被描述为一个自由和开放的通信空间,所有人都可以访问,并允许任何人访问。本文提出的问题是,一般来说,这个空间的自由程度如何,以及知识产权所有者施加的限制在多大程度上,特别是在搜索和使用搜索引擎的领域。特别是在搜索引擎中使用元标签时,冲突会出现。元标签确实是在互联网上搜索站点和名称的重要工具。因此,它们可能获得经济和金融价值。然而,与这种增值相对应的是,它们可能被滥用来扭曲竞争,并侵犯元标签中提到的知识产权。本文通过法理分析,将美国和德国、意大利、丹麦、比利时等欧洲国家兴起的元标签诉讼作为定性代理,从法律政策的角度表明对网站自由搜索和触及的限制。特别是知识产权拥有人对受其商标权保护的名称的元标签施加的适当限制,或由搜索引擎施加的限制,以减少垃圾信息。
{"title":"Reaching for the site: meta tag litigation and access to Internet-based information","authors":"B. D. Vuyst, Katia Bodard","doi":"10.1109/HICSS.2003.1174454","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174454","url":null,"abstract":"The Internet is often described as a free and open communication space, accessible to all and allowing access to any and all. The question put in this paper is, generally, how freely accessible this space is, and in how far there may be restraints imposed by intellectual property owners, in particular in and in the context of the area of searching and the use of search engines. Conflicts arise especially on the use of meta tags in search engines. Meta tags are indeed important tools in searching for sites and names on the Internet. Hence, they may acquire an economic and financial value. As a counterpoint to that valorization, however, they may be abused to distort competition and to impinge on intellectual property rights of those mentioned in the meta tags. The emerging meta tag litigation in different countries, including the U.S. and several European countries among which Germany, Italy, Denmark and Belgium, is used in this paper, after a jurisprudential analysis, as a qualitative proxy for indicating, from a legal policy viewpoint, limits on free searching and reaching of Web sites, in particular as regards the restraints that may properly be imposed by intellectual property owners on meta tagging of names that are protected by their trademark rights, or by search engines to reduce spamming.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123246741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A model for evaluating potential WBE innovations [Web-based education] 评估潜在WBE创新的模型[基于网络的教育]
David Jones, Kieren Jamieson, D. Clark
Due to the constantly evolving nature of Web-based education (WBE) it is often difficult for educators to understand the issues, challenges, impact, and effort required to introduce WBE innovations. This lack of knowledge can contribute to the limited adoption and less than successful implementation of WBE innovations. This paper draws on an aspect of innovation diffusion theory to propose a model through which educators can evaluate potential WBE innovations. It is proposed that this model can aid educators increase their awareness of potential implementation issues, estimate the likelihood of reinvention, and predict the amount and type of effort required to achieve successful implementation of specific WBE innovations. The worth of the model is demonstrated by drawing on past experience.
由于基于web的教育(WBE)不断发展的本质,教育者通常很难理解引入WBE创新所需的问题、挑战、影响和努力。这种知识的缺乏可能导致WBE创新的有限采用和不太成功的实施。本文借鉴创新扩散理论的一个方面,提出了一个模型,通过该模型,教育者可以评估潜在的WBE创新。该模型可以帮助教育工作者提高他们对潜在实施问题的认识,估计重新发明的可能性,并预测成功实施特定WBE创新所需的工作量和类型。借鉴过去的经验证明了这种模式的价值。
{"title":"A model for evaluating potential WBE innovations [Web-based education]","authors":"David Jones, Kieren Jamieson, D. Clark","doi":"10.1109/HICSS.2003.1174340","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174340","url":null,"abstract":"Due to the constantly evolving nature of Web-based education (WBE) it is often difficult for educators to understand the issues, challenges, impact, and effort required to introduce WBE innovations. This lack of knowledge can contribute to the limited adoption and less than successful implementation of WBE innovations. This paper draws on an aspect of innovation diffusion theory to propose a model through which educators can evaluate potential WBE innovations. It is proposed that this model can aid educators increase their awareness of potential implementation issues, estimate the likelihood of reinvention, and predict the amount and type of effort required to achieve successful implementation of specific WBE innovations. The worth of the model is demonstrated by drawing on past experience.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129419497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Whoops... did I use the wrong concept to predict e-commerce trust? Modeling the risk-related effects of trust versus distrust concepts 哎呀……我是否使用了错误的概念来预测电子商务信任?对信任与不信任概念的风险相关影响进行建模
Harrison McKnight, Chuck Kacmar, V. Choudhury
Significant work has been initiated on trust in e-commerce settings, but little research has addressed distrust. Because of its connection to the insecurities that are found in risky situations, disposition to distrust is particularly suited to addressing issues of high risk, while disposition to trust is better suited for low risk issues. High risk issues include: a) perceptions that the Web is risky; and b) a willingness to depend on a specific unknown Web vendor in light of that risk. This theoretical position serves as the basis of a model of what causes consumers to initially decide to trust/distrust the Web and to explore and trust a Web site. The model includes three dispositions to trust constructs and one disposition to distrust construct. As proposed, the study found that disposition to trust predicted the low risk Web constructs, while disposition to distrust predicted the high risk Web constructs. This suggests that disposition to distrust has greater potential for predicting high-risk outcome constructs in e-commerce. This article contributes by showing how various aspects of disposition to trust/distrust affect consumer Web perceptions in different ways, depending on their level of risk. For e-commerce research, the findings of this article suggest that perhaps scholars have been studying a less effective factor for addressing risk - disposition to trust - instead of what may be a more effective factor - disposition to distrust.
在电子商务环境中的信任方面已经开展了大量工作,但很少有研究解决不信任问题。由于它与风险情境中的不安全感有关,不信任倾向特别适合处理高风险问题,而信任倾向更适合处理低风险问题。高风险问题包括:a)认为网络是有风险的;b)考虑到该风险,是否愿意依赖某个特定的未知Web供应商。这一理论立场可以作为一个模型的基础,说明是什么导致消费者最初决定信任/不信任Web,以及探索和信任Web站点。该模型包括三个信任倾向和一个不信任倾向。研究发现,信任倾向可以预测低风险的网络结构,而不信任倾向可以预测高风险的网络结构。这表明不信任倾向在预测电子商务中的高风险结果构建方面具有更大的潜力。本文通过展示信任/不信任倾向的各个方面如何以不同的方式影响消费者的Web感知,这取决于他们的风险水平。对于电子商务研究,本文的发现表明,也许学者们一直在研究解决风险的一个不太有效的因素——信任倾向——而不是一个可能更有效的因素——不信任倾向。
{"title":"Whoops... did I use the wrong concept to predict e-commerce trust? Modeling the risk-related effects of trust versus distrust concepts","authors":"Harrison McKnight, Chuck Kacmar, V. Choudhury","doi":"10.1109/HICSS.2003.1174393","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174393","url":null,"abstract":"Significant work has been initiated on trust in e-commerce settings, but little research has addressed distrust. Because of its connection to the insecurities that are found in risky situations, disposition to distrust is particularly suited to addressing issues of high risk, while disposition to trust is better suited for low risk issues. High risk issues include: a) perceptions that the Web is risky; and b) a willingness to depend on a specific unknown Web vendor in light of that risk. This theoretical position serves as the basis of a model of what causes consumers to initially decide to trust/distrust the Web and to explore and trust a Web site. The model includes three dispositions to trust constructs and one disposition to distrust construct. As proposed, the study found that disposition to trust predicted the low risk Web constructs, while disposition to distrust predicted the high risk Web constructs. This suggests that disposition to distrust has greater potential for predicting high-risk outcome constructs in e-commerce. This article contributes by showing how various aspects of disposition to trust/distrust affect consumer Web perceptions in different ways, depending on their level of risk. For e-commerce research, the findings of this article suggest that perhaps scholars have been studying a less effective factor for addressing risk - disposition to trust - instead of what may be a more effective factor - disposition to distrust.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128474956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
期刊
36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1