首页 > 最新文献

Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)最新文献

英文 中文
Development and Validation of Scales to Measure the Strategic Potential  of IT-Enabled Resources: A Resource-Based Approach 开发和验证衡量信息技术支持资源战略潜力的尺度:基于资源的方法
Saggi Nevo, M. Wade
This paper describes the development of reliable and valid scales for assessing the strategic potential of IT-enabled resources. Following to the resource-based view of the firm (RBV), the strategic potential of organizational resources may be assessed by four resource attributes - value, rarity, inimitability, and non-substitutability. The RBV contends that these four attributes provide a link between organizational resources and performance, at the level of the firm. While resource attributes are a central and critical element of resource-based logic, they have not been systematically operationalized. This paper presents a set of measures with satisfactory psychometric properties that can be adapted by researchers and managers to assess the strategic potential of multiple types of IT-enabled resources. The measures are tested using survey data from 150 customer service managers who recently implemented an information technology. The attribute measures were able to explain 54% of the variance in firm performance.
本文描述了用于评估it支持资源的战略潜力的可靠和有效尺度的开发。根据企业资源基础观(RBV),组织资源的战略潜力可以通过四个资源属性来评估——价值、稀有、不可模仿和不可替代性。RBV认为,在公司层面上,这四个属性提供了组织资源和绩效之间的联系。虽然资源属性是基于资源的逻辑的核心和关键要素,但它们还没有被系统地操作。本文提出了一套具有令人满意的心理测量特性的措施,研究人员和管理人员可以采用这些措施来评估多种类型的it支持资源的战略潜力。这些措施是通过对150名最近实施信息技术的客户服务经理的调查数据进行测试的。属性测量能够解释54%的公司绩效差异。
{"title":"Development and Validation of Scales to Measure the Strategic Potential  of IT-Enabled Resources: A Resource-Based Approach","authors":"Saggi Nevo, M. Wade","doi":"10.1109/HICSS.2008.122","DOIUrl":"https://doi.org/10.1109/HICSS.2008.122","url":null,"abstract":"This paper describes the development of reliable and valid scales for assessing the strategic potential of IT-enabled resources. Following to the resource-based view of the firm (RBV), the strategic potential of organizational resources may be assessed by four resource attributes - value, rarity, inimitability, and non-substitutability. The RBV contends that these four attributes provide a link between organizational resources and performance, at the level of the firm. While resource attributes are a central and critical element of resource-based logic, they have not been systematically operationalized. This paper presents a set of measures with satisfactory psychometric properties that can be adapted by researchers and managers to assess the strategic potential of multiple types of IT-enabled resources. The measures are tested using survey data from 150 customer service managers who recently implemented an information technology. The attribute measures were able to explain 54% of the variance in firm performance.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116422648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Development of a Virtual Emergency Operations Center for Disaster Management  Research, Training, and Discovery 用于灾害管理研究、培训和发现的虚拟应急行动中心的设计和开发
I. Becerra-Fernandez, G. Madey, M. Prietula, D. Rodríguez, R. Valerdi, Timothy Wright
This paper describes the implementation plans and research activities of Project Ensayo, which is developing a virtual emergency operations center (vEOC) based on one of the Nation's premier EOC 's, that of Miami-Dade County. The goal of the EOC is to coordinate for 'community continuity', in other words help communities remain resilient in the face of disaster events. Organizations of this sort suffer from the lack of normal conditions that permit organizational learning in the traditional sense. The development of the Ensayo vEOC will support a portfolio of research projects including topics related to sensor data, knowledge and social networking modeling, decision-making, software approaches to commitment-based collaboration and coordination, time-critical negotiations under emergencies, and cyber-infrastructure resources.
本文描述了enayo项目的实施计划和研究活动,该项目正在开发一个虚拟应急行动中心(vEOC),该中心基于美国最重要的应急行动中心之一迈阿密-戴德县的应急行动中心。EOC的目标是协调“社区连续性”,换句话说,帮助社区在面对灾害事件时保持弹性。这类组织缺乏传统意义上的组织学习的正常条件。enayo vEOC的开发将支持一系列研究项目,包括与传感器数据、知识和社会网络建模、决策、基于承诺的协作和协调的软件方法、紧急情况下的时间关键谈判以及网络基础设施资源相关的主题。
{"title":"Design and Development of a Virtual Emergency Operations Center for Disaster Management  Research, Training, and Discovery","authors":"I. Becerra-Fernandez, G. Madey, M. Prietula, D. Rodríguez, R. Valerdi, Timothy Wright","doi":"10.1109/HICSS.2008.115","DOIUrl":"https://doi.org/10.1109/HICSS.2008.115","url":null,"abstract":"This paper describes the implementation plans and research activities of Project Ensayo, which is developing a virtual emergency operations center (vEOC) based on one of the Nation's premier EOC 's, that of Miami-Dade County. The goal of the EOC is to coordinate for 'community continuity', in other words help communities remain resilient in the face of disaster events. Organizations of this sort suffer from the lack of normal conditions that permit organizational learning in the traditional sense. The development of the Ensayo vEOC will support a portfolio of research projects including topics related to sensor data, knowledge and social networking modeling, decision-making, software approaches to commitment-based collaboration and coordination, time-critical negotiations under emergencies, and cyber-infrastructure resources.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122306333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Frameworks for Securing Limited-Device Applications 保护有限设备应用程序的框架
T. Lindquist, A. Ramamurthy, Ramon Anguamea
In this paper, we compare the features available for developing secure distributed applications for limited devices, such as smart phones. We limit our scope to examine frameworks for Java. This work is part of a continuing project which is considering capabilities and performance for application development on these platforms. The paper considers performance as it relates to various approaches to securing applications. The paper addresses two separate concerns. First is protecting access to resources by an executing application. The facilities for defining, limiting and controlling applications during their development, installation and execution are described. Second, we discuss approaches available for securing communication among application components running on servers or limited devices.
在本文中,我们比较了可用于为有限设备(如智能手机)开发安全分布式应用程序的功能。我们将范围限制为检查Java框架。这项工作是一个正在进行的项目的一部分,该项目正在考虑在这些平台上开发应用程序的能力和性能。本文考虑性能,因为它涉及到保护应用程序的各种方法。这篇论文解决了两个不同的问题。首先是保护正在执行的应用程序对资源的访问。描述了在开发、安装和执行过程中定义、限制和控制应用程序的工具。其次,我们讨论可用于保护运行在服务器或有限设备上的应用程序组件之间通信的方法。
{"title":"Frameworks for Securing Limited-Device Applications","authors":"T. Lindquist, A. Ramamurthy, Ramon Anguamea","doi":"10.1109/HICSS.2008.175","DOIUrl":"https://doi.org/10.1109/HICSS.2008.175","url":null,"abstract":"In this paper, we compare the features available for developing secure distributed applications for limited devices, such as smart phones. We limit our scope to examine frameworks for Java. This work is part of a continuing project which is considering capabilities and performance for application development on these platforms. The paper considers performance as it relates to various approaches to securing applications. The paper addresses two separate concerns. First is protecting access to resources by an executing application. The facilities for defining, limiting and controlling applications during their development, installation and execution are described. Second, we discuss approaches available for securing communication among application components running on servers or limited devices.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122021371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital Usage Behavior: A Sense Making Perspective 数字使用行为:一个有意义的视角
James B. Freedman, J. C. Henderson
The proliferation of information technology has led to a concern about the ability of the digitally underserved to cope with life's challenges and opportunities. Although there has been recognition that the digital divide is more than technology access, there is an implicit belief that solving the access problem will also solve other aspects of the digital divide. We make the argument that variance in use involves cognition and is different than variance in access. We also argue that the context in which information technology is used makes a difference. We add to the digital divide research by proposing a model of digital sense making. The model helps explain the divide as a function of how information available through technology affects the ability to cope. We then test the model with empirical evidence derived from a study of 151 military families that had universal Internet access for a period of more than one year. We find that use of the Internet to scan, interpret and act is correlated with increased ability to cope.
信息技术的扩散引发了人们对数字服务不足的人应对生活挑战和机遇的能力的担忧。虽然人们已经认识到数字鸿沟不仅仅是技术获取问题,但有一种隐含的信念,即解决了获取问题也将解决数字鸿沟的其他方面。我们认为,使用上的差异涉及到认知,与获取上的差异是不同的。我们还认为,使用信息技术的环境也会产生影响。我们通过提出一个数字意义构建模型来增加对数字鸿沟的研究。该模型有助于解释这种差异,因为通过技术获得的信息如何影响应对能力。然后,我们用对151个拥有普遍互联网接入超过一年的军人家庭的研究得出的经验证据来检验该模型。我们发现,使用互联网扫描、解释和行动与应对能力的提高有关。
{"title":"Digital Usage Behavior: A Sense Making Perspective","authors":"James B. Freedman, J. C. Henderson","doi":"10.1109/HICSS.2008.123","DOIUrl":"https://doi.org/10.1109/HICSS.2008.123","url":null,"abstract":"The proliferation of information technology has led to a concern about the ability of the digitally underserved to cope with life's challenges and opportunities. Although there has been recognition that the digital divide is more than technology access, there is an implicit belief that solving the access problem will also solve other aspects of the digital divide. We make the argument that variance in use involves cognition and is different than variance in access. We also argue that the context in which information technology is used makes a difference. We add to the digital divide research by proposing a model of digital sense making. The model helps explain the divide as a function of how information available through technology affects the ability to cope. We then test the model with empirical evidence derived from a study of 151 military families that had universal Internet access for a period of more than one year. We find that use of the Internet to scan, interpret and act is correlated with increased ability to cope.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117025338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Genetic Algorithm for the Two Machine Flow Shop Problem 双机流车间问题的遗传算法
K. Adusumilli, Doina Bein, W. Bein
In scheduling, the two machine flow shop problem F2parSigma Ci is to find a schedule that minimizes the sum of finishing times of an arbitrary number of jobs that need to be executed on two machines, such that each job must complete processing on machine 1 before starting on machine 2. Finding such a schedule is NP-hard [6]. We propose a heuristic for approximating the solution for the F2parSigma Ci problem using a genetic algorithm. We calibrate the algorithm using optimal results obtained by a branch-and-bound technique. Genetic algorithms simulate the survival of the fittest among individuals over consecutive generations for solving a problem. Prior work has shown that genetic algorithms generally do not perform well for shop problems [21]. However, the fact that in the case of two machines the search space can be restricted to permutations makes the construction of effective genetic operators more feasible.
在调度中,两机流程车间问题F2parSigma Ci是找到一个调度,该调度使任意数量的需要在两台机器上执行的作业的完成时间总和最小,使得每个作业必须在机器1上完成加工后才能开始在机器2上运行。找到这样一个时间表是NP-hard[6]。我们提出了一种启发式的近似解的F2parSigma Ci问题使用遗传算法。我们使用分支定界技术得到的最优结果来校准算法。遗传算法模拟个体在连续几代中的适者生存来解决问题。先前的工作表明,遗传算法通常不能很好地解决商店问题。然而,在两台机器的情况下,搜索空间可以被限制为排列,这使得构造有效的遗传算子更加可行。
{"title":"A Genetic Algorithm for the Two Machine Flow Shop Problem","authors":"K. Adusumilli, Doina Bein, W. Bein","doi":"10.1109/HICSS.2008.21","DOIUrl":"https://doi.org/10.1109/HICSS.2008.21","url":null,"abstract":"In scheduling, the two machine flow shop problem F2parSigma Ci is to find a schedule that minimizes the sum of finishing times of an arbitrary number of jobs that need to be executed on two machines, such that each job must complete processing on machine 1 before starting on machine 2. Finding such a schedule is NP-hard [6]. We propose a heuristic for approximating the solution for the F2parSigma Ci problem using a genetic algorithm. We calibrate the algorithm using optimal results obtained by a branch-and-bound technique. Genetic algorithms simulate the survival of the fittest among individuals over consecutive generations for solving a problem. Prior work has shown that genetic algorithms generally do not perform well for shop problems [21]. However, the fact that in the case of two machines the search space can be restricted to permutations makes the construction of effective genetic operators more feasible.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128306950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Understanding the Roles of Knowledge Sharing and Trust in Online Learning Communities 理解知识共享和信任在在线学习社区中的作用
Brian Thoms, Nathan Garrett, Jesus Canelon Herrera, Terry Ryan
This paper builds on action and design research aimed at enhancing scholarly community and conversation in a graduate school setting. In this paper we focus on knowledge sharing (KS) and trust as important factors for building a sustainable online learning community (OLC). Guided by theories of social learning and social networking, we survey graduate students to assess their perceptions of KS and trust in communities of practice (CoPs). These results are compared against posttest results measuring community building and knowledge sharing in a stakeholder-defined OLC. Results indicate that although students' initial assessment of KS and trust in CoPs were low, users perceived high levels of value from a stakeholder-defined OLC. Our research offers a proof-of-concept that stakeholder-defined OLCs provide students with the opportunity to develop knowledge networks, while also providing for individual autonomy over their content. Our results also indicate an intriguing alternative to traditional course management systems (CMS).
本文建立在旨在加强研究生院学术社区和对话的行动和设计研究的基础上。在本文中,我们关注知识共享(KS)和信任作为构建可持续在线学习社区(OLC)的重要因素。在社会学习和社会网络理论的指导下,我们对研究生进行了调查,以评估他们对实践社区(cop)的感知和信任。将这些结果与在利益相关者定义的OLC中测量社区建设和知识共享的后测结果进行比较。结果表明,尽管学生对KS和对cop的信任的初步评估较低,但用户从利益相关者定义的OLC中感知到高水平的价值。我们的研究提供了一个概念证明,即利益相关者定义的在线学习中心为学生提供了发展知识网络的机会,同时也为他们的内容提供了个人自主权。我们的研究结果还表明了传统课程管理系统(CMS)的一个有趣的替代方案。
{"title":"Understanding the Roles of Knowledge Sharing and Trust in Online Learning Communities","authors":"Brian Thoms, Nathan Garrett, Jesus Canelon Herrera, Terry Ryan","doi":"10.1109/HICSS.2008.481","DOIUrl":"https://doi.org/10.1109/HICSS.2008.481","url":null,"abstract":"This paper builds on action and design research aimed at enhancing scholarly community and conversation in a graduate school setting. In this paper we focus on knowledge sharing (KS) and trust as important factors for building a sustainable online learning community (OLC). Guided by theories of social learning and social networking, we survey graduate students to assess their perceptions of KS and trust in communities of practice (CoPs). These results are compared against posttest results measuring community building and knowledge sharing in a stakeholder-defined OLC. Results indicate that although students' initial assessment of KS and trust in CoPs were low, users perceived high levels of value from a stakeholder-defined OLC. Our research offers a proof-of-concept that stakeholder-defined OLCs provide students with the opportunity to develop knowledge networks, while also providing for individual autonomy over their content. Our results also indicate an intriguing alternative to traditional course management systems (CMS).","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128694356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Information Security Cultures of Four Professions: A Comparative Study 四种职业的信息安全文化比较研究
Sriraman Ramachandran, Srinivasan V. Rao, T. Goles
Differences in cultures across professions have been reported in the professional culture literature. An understanding of such differences is important to understand the effects of culture. We extend this argument to the area of information security. We argue that it is necessary to examine the information security cultures of various professions to identify differences that may exist, so that they may be taken into account in formulating initiatives to enhance information security. In this article, we provide a comparative description of the security cultures of four professions - information systems, accounting, marketing and human resources - based on semi- structured interviews of respondents from each of the professions. Our results confirm the existence of differences in security cultures across professions. In particular, they indicate that there are differences in beliefs about what constitutes information security, who is responsible for it, and the likelihood of their compliance with security under performance pressure.
职业文化文献中已经报道了不同职业之间的文化差异。理解这些差异对于理解文化的影响是很重要的。我们将这一论点扩展到信息安全领域。我们认为有必要研究不同行业的资讯保安文化,找出可能存在的差异,以便在制定加强资讯保安的措施时考虑到这些差异。在这篇文章中,我们提供了四个专业的安全文化的比较描述-信息系统,会计,市场营销和人力资源-基于半结构化访谈的受访者从每个专业。我们的研究结果证实了不同职业的安全文化存在差异。特别是,他们指出,对于什么构成信息安全,谁负责信息安全,以及在业绩压力下遵守安全的可能性,存在不同的信念。
{"title":"Information Security Cultures of Four Professions: A Comparative Study","authors":"Sriraman Ramachandran, Srinivasan V. Rao, T. Goles","doi":"10.1109/HICSS.2008.201","DOIUrl":"https://doi.org/10.1109/HICSS.2008.201","url":null,"abstract":"Differences in cultures across professions have been reported in the professional culture literature. An understanding of such differences is important to understand the effects of culture. We extend this argument to the area of information security. We argue that it is necessary to examine the information security cultures of various professions to identify differences that may exist, so that they may be taken into account in formulating initiatives to enhance information security. In this article, we provide a comparative description of the security cultures of four professions - information systems, accounting, marketing and human resources - based on semi- structured interviews of respondents from each of the professions. Our results confirm the existence of differences in security cultures across professions. In particular, they indicate that there are differences in beliefs about what constitutes information security, who is responsible for it, and the likelihood of their compliance with security under performance pressure.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128338471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Web Accessibility for the Blind: Corporate Social Responsibility  or Litigation Avoidance? 盲人无障碍网页:企业社会责任还是诉讼规避?
Jonathan Frank
On September 5, 2006, a legal precedent was set for web accessibility. Federal judge Marilyn Patel sustained discrimination claims by the National Federation for the Blind against Target Corporation. She established that retailers must make their websites accessible to the blind under the Americans with Disabilities Act. Past research has indicated that eCommerce retailers have largely ignored W3C guidelines for making their sites accessible. This study examines web accessibility motivation under the lens of Corporate Social Responsibility (CSR). A model is developed linking accessibility behavior to a retailer's propensity to engage in CSR activities, the types of products and services sold, complexity of visual web content, and perceived threat of litigation resulting from an inaccessible site. Based on the model recommendations are suggested for future research. Thirty-two websites of the largest online retailers with a physical presence were analyzed using IBM's aDesigner accessibility tool for the three years before and one year since the commencement of the Target litigation. Results suggest that accessibility of sites has showed significant improvement since the Target case began.
2006年9月5日,为网页无障碍设置了一个法律先例。联邦法官玛丽莲·帕特尔支持全国盲人联合会对塔吉特公司的歧视指控。她规定零售商必须根据《美国残疾人法案》让盲人可以访问他们的网站。过去的研究表明,电子商务零售商在很大程度上忽略了W3C关于网站可访问性的指导方针。本研究在企业社会责任(CSR)的视角下考察网页可访问性动机。建立了一个模型,将可访问性行为与零售商参与企业社会责任活动的倾向、所销售的产品和服务的类型、可视化web内容的复杂性以及由于不可访问的网站而产生的诉讼威胁联系起来。在此基础上,对今后的研究提出了建议。使用IBM的addesigner可访问性工具,对Target诉讼开始前三年和开始后一年的32个最大的在线零售商的实体网站进行了分析。结果表明,自Target案例开始以来,网站的可访问性有了显著改善。
{"title":"Web Accessibility for the Blind: Corporate Social Responsibility  or Litigation Avoidance?","authors":"Jonathan Frank","doi":"10.1109/HICSS.2008.497","DOIUrl":"https://doi.org/10.1109/HICSS.2008.497","url":null,"abstract":"On September 5, 2006, a legal precedent was set for web accessibility. Federal judge Marilyn Patel sustained discrimination claims by the National Federation for the Blind against Target Corporation. She established that retailers must make their websites accessible to the blind under the Americans with Disabilities Act. Past research has indicated that eCommerce retailers have largely ignored W3C guidelines for making their sites accessible. This study examines web accessibility motivation under the lens of Corporate Social Responsibility (CSR). A model is developed linking accessibility behavior to a retailer's propensity to engage in CSR activities, the types of products and services sold, complexity of visual web content, and perceived threat of litigation resulting from an inaccessible site. Based on the model recommendations are suggested for future research. Thirty-two websites of the largest online retailers with a physical presence were analyzed using IBM's aDesigner accessibility tool for the three years before and one year since the commencement of the Target litigation. Results suggest that accessibility of sites has showed significant improvement since the Target case began.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128346396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Tools for Rules: Technology Transfer and Electronic Rulemaking 规则工具:技术转让和电子规则制定
Stuart W. Shulman, Namhee Kwon, E. Hovy, Emily Huisman
Large-scale, email public comment campaigns in the United States necessitate the creation of new, specially tailored power tools for language. We call these applications "tools for rules". This paper introduces the rule writers' workbench, a system developed specifically for dealing with the influx of public comments. We describe the context in which these tools were developed and report on our first round of usability testing. Our major finding is that a particular tool ('DURIAN' or duplicate removal In large collection) performs a critical function in the era of burgeoning email campaigns. We provide a glimpse into the real world testbed provided by over 540,000 emails submitted to the Fish & Wildlife Service on the proposed listing of the polar bear as "threatened" under the Endangered Species Act. Finally, we conclude with observations about the likely political considerations as tools like DURIAN become more commonplace on the desktop of regulatory rule writers.
在美国,大规模的电子邮件公众评论活动需要创造新的、专门为语言量身定制的强大工具。我们称这些应用程序为“规则工具”。本文介绍了规则编写者工作台,这是一个专门为处理大量公众意见而开发的系统。我们描述了开发这些工具的环境,并报告了我们的第一轮可用性测试。我们的主要发现是,一个特定的工具(“榴莲”或重复删除在大集合)在蓬勃发展的电子邮件活动时代发挥了关键作用。我们通过向鱼类和野生动物管理局提交的54万多封关于根据《濒危物种法》将北极熊列为“受威胁”的电子邮件,提供了对现实世界测试平台的一瞥。最后,我们总结了可能的政治考虑,因为像榴莲这样的工具在监管规则制定者的桌面上变得越来越普遍。
{"title":"Tools for Rules: Technology Transfer and Electronic Rulemaking","authors":"Stuart W. Shulman, Namhee Kwon, E. Hovy, Emily Huisman","doi":"10.1109/HICSS.2008.454","DOIUrl":"https://doi.org/10.1109/HICSS.2008.454","url":null,"abstract":"Large-scale, email public comment campaigns in the United States necessitate the creation of new, specially tailored power tools for language. We call these applications \"tools for rules\". This paper introduces the rule writers' workbench, a system developed specifically for dealing with the influx of public comments. We describe the context in which these tools were developed and report on our first round of usability testing. Our major finding is that a particular tool ('DURIAN' or duplicate removal In large collection) performs a critical function in the era of burgeoning email campaigns. We provide a glimpse into the real world testbed provided by over 540,000 emails submitted to the Fish & Wildlife Service on the proposed listing of the polar bear as \"threatened\" under the Endangered Species Act. Finally, we conclude with observations about the likely political considerations as tools like DURIAN become more commonplace on the desktop of regulatory rule writers.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129833541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Harry Potter and the Meat-Filled Freezer: A Case Study of Spontaneous Usage  of Visualization Tools 哈利波特和装满肉的冰箱:可视化工具自发使用的案例研究
F. Viégas, M. Wattenberg, Matt McKeon, F. V. Ham, Jesse Kriss
This paper is a report on early user activity in Many Eyes, a public web site where users may upload data, create visualizations, and carry on discussions. Since the site launched, users have uploaded data and created graphics on everything from DNA microarray data to co-occurrences of names in the New Testament to personal gift-giving networks. Our results show that in addition to traditional data analysis, Many Eyes is used for goals ranging from journalism and advocacy to personal expression and social interaction. We propose several implications of this usage for visualization designers and contend that these findings suggest a role for visualization as an expressive medium.
本文是关于Many Eyes早期用户活动的报告,Many Eyes是一个公共网站,用户可以在这里上传数据、创建可视化并进行讨论。自从该网站上线以来,用户上传了数据并制作了图表,涵盖了从DNA微阵列数据到《新约》中名字的同时出现,再到个人送礼网络等各种内容。我们的研究结果表明,除了传统的数据分析,许多眼睛被用于从新闻和宣传到个人表达和社会互动的目标。我们提出了可视化设计师使用这种方法的几个含义,并认为这些发现表明可视化作为一种表达媒介的作用。
{"title":"Harry Potter and the Meat-Filled Freezer: A Case Study of Spontaneous Usage  of Visualization Tools","authors":"F. Viégas, M. Wattenberg, Matt McKeon, F. V. Ham, Jesse Kriss","doi":"10.1109/HICSS.2008.188","DOIUrl":"https://doi.org/10.1109/HICSS.2008.188","url":null,"abstract":"This paper is a report on early user activity in Many Eyes, a public web site where users may upload data, create visualizations, and carry on discussions. Since the site launched, users have uploaded data and created graphics on everything from DNA microarray data to co-occurrences of names in the New Testament to personal gift-giving networks. Our results show that in addition to traditional data analysis, Many Eyes is used for goals ranging from journalism and advocacy to personal expression and social interaction. We propose several implications of this usage for visualization designers and contend that these findings suggest a role for visualization as an expressive medium.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129902637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
期刊
Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1