This paper describes the development of reliable and valid scales for assessing the strategic potential of IT-enabled resources. Following to the resource-based view of the firm (RBV), the strategic potential of organizational resources may be assessed by four resource attributes - value, rarity, inimitability, and non-substitutability. The RBV contends that these four attributes provide a link between organizational resources and performance, at the level of the firm. While resource attributes are a central and critical element of resource-based logic, they have not been systematically operationalized. This paper presents a set of measures with satisfactory psychometric properties that can be adapted by researchers and managers to assess the strategic potential of multiple types of IT-enabled resources. The measures are tested using survey data from 150 customer service managers who recently implemented an information technology. The attribute measures were able to explain 54% of the variance in firm performance.
{"title":"Development and Validation of Scales to Measure the Strategic Potential of IT-Enabled Resources: A Resource-Based Approach","authors":"Saggi Nevo, M. Wade","doi":"10.1109/HICSS.2008.122","DOIUrl":"https://doi.org/10.1109/HICSS.2008.122","url":null,"abstract":"This paper describes the development of reliable and valid scales for assessing the strategic potential of IT-enabled resources. Following to the resource-based view of the firm (RBV), the strategic potential of organizational resources may be assessed by four resource attributes - value, rarity, inimitability, and non-substitutability. The RBV contends that these four attributes provide a link between organizational resources and performance, at the level of the firm. While resource attributes are a central and critical element of resource-based logic, they have not been systematically operationalized. This paper presents a set of measures with satisfactory psychometric properties that can be adapted by researchers and managers to assess the strategic potential of multiple types of IT-enabled resources. The measures are tested using survey data from 150 customer service managers who recently implemented an information technology. The attribute measures were able to explain 54% of the variance in firm performance.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116422648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Becerra-Fernandez, G. Madey, M. Prietula, D. Rodríguez, R. Valerdi, Timothy Wright
This paper describes the implementation plans and research activities of Project Ensayo, which is developing a virtual emergency operations center (vEOC) based on one of the Nation's premier EOC 's, that of Miami-Dade County. The goal of the EOC is to coordinate for 'community continuity', in other words help communities remain resilient in the face of disaster events. Organizations of this sort suffer from the lack of normal conditions that permit organizational learning in the traditional sense. The development of the Ensayo vEOC will support a portfolio of research projects including topics related to sensor data, knowledge and social networking modeling, decision-making, software approaches to commitment-based collaboration and coordination, time-critical negotiations under emergencies, and cyber-infrastructure resources.
{"title":"Design and Development of a Virtual Emergency Operations Center for Disaster Management Research, Training, and Discovery","authors":"I. Becerra-Fernandez, G. Madey, M. Prietula, D. Rodríguez, R. Valerdi, Timothy Wright","doi":"10.1109/HICSS.2008.115","DOIUrl":"https://doi.org/10.1109/HICSS.2008.115","url":null,"abstract":"This paper describes the implementation plans and research activities of Project Ensayo, which is developing a virtual emergency operations center (vEOC) based on one of the Nation's premier EOC 's, that of Miami-Dade County. The goal of the EOC is to coordinate for 'community continuity', in other words help communities remain resilient in the face of disaster events. Organizations of this sort suffer from the lack of normal conditions that permit organizational learning in the traditional sense. The development of the Ensayo vEOC will support a portfolio of research projects including topics related to sensor data, knowledge and social networking modeling, decision-making, software approaches to commitment-based collaboration and coordination, time-critical negotiations under emergencies, and cyber-infrastructure resources.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122306333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we compare the features available for developing secure distributed applications for limited devices, such as smart phones. We limit our scope to examine frameworks for Java. This work is part of a continuing project which is considering capabilities and performance for application development on these platforms. The paper considers performance as it relates to various approaches to securing applications. The paper addresses two separate concerns. First is protecting access to resources by an executing application. The facilities for defining, limiting and controlling applications during their development, installation and execution are described. Second, we discuss approaches available for securing communication among application components running on servers or limited devices.
{"title":"Frameworks for Securing Limited-Device Applications","authors":"T. Lindquist, A. Ramamurthy, Ramon Anguamea","doi":"10.1109/HICSS.2008.175","DOIUrl":"https://doi.org/10.1109/HICSS.2008.175","url":null,"abstract":"In this paper, we compare the features available for developing secure distributed applications for limited devices, such as smart phones. We limit our scope to examine frameworks for Java. This work is part of a continuing project which is considering capabilities and performance for application development on these platforms. The paper considers performance as it relates to various approaches to securing applications. The paper addresses two separate concerns. First is protecting access to resources by an executing application. The facilities for defining, limiting and controlling applications during their development, installation and execution are described. Second, we discuss approaches available for securing communication among application components running on servers or limited devices.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122021371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The proliferation of information technology has led to a concern about the ability of the digitally underserved to cope with life's challenges and opportunities. Although there has been recognition that the digital divide is more than technology access, there is an implicit belief that solving the access problem will also solve other aspects of the digital divide. We make the argument that variance in use involves cognition and is different than variance in access. We also argue that the context in which information technology is used makes a difference. We add to the digital divide research by proposing a model of digital sense making. The model helps explain the divide as a function of how information available through technology affects the ability to cope. We then test the model with empirical evidence derived from a study of 151 military families that had universal Internet access for a period of more than one year. We find that use of the Internet to scan, interpret and act is correlated with increased ability to cope.
{"title":"Digital Usage Behavior: A Sense Making Perspective","authors":"James B. Freedman, J. C. Henderson","doi":"10.1109/HICSS.2008.123","DOIUrl":"https://doi.org/10.1109/HICSS.2008.123","url":null,"abstract":"The proliferation of information technology has led to a concern about the ability of the digitally underserved to cope with life's challenges and opportunities. Although there has been recognition that the digital divide is more than technology access, there is an implicit belief that solving the access problem will also solve other aspects of the digital divide. We make the argument that variance in use involves cognition and is different than variance in access. We also argue that the context in which information technology is used makes a difference. We add to the digital divide research by proposing a model of digital sense making. The model helps explain the divide as a function of how information available through technology affects the ability to cope. We then test the model with empirical evidence derived from a study of 151 military families that had universal Internet access for a period of more than one year. We find that use of the Internet to scan, interpret and act is correlated with increased ability to cope.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117025338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In scheduling, the two machine flow shop problem F2parSigma Ci is to find a schedule that minimizes the sum of finishing times of an arbitrary number of jobs that need to be executed on two machines, such that each job must complete processing on machine 1 before starting on machine 2. Finding such a schedule is NP-hard [6]. We propose a heuristic for approximating the solution for the F2parSigma Ci problem using a genetic algorithm. We calibrate the algorithm using optimal results obtained by a branch-and-bound technique. Genetic algorithms simulate the survival of the fittest among individuals over consecutive generations for solving a problem. Prior work has shown that genetic algorithms generally do not perform well for shop problems [21]. However, the fact that in the case of two machines the search space can be restricted to permutations makes the construction of effective genetic operators more feasible.
{"title":"A Genetic Algorithm for the Two Machine Flow Shop Problem","authors":"K. Adusumilli, Doina Bein, W. Bein","doi":"10.1109/HICSS.2008.21","DOIUrl":"https://doi.org/10.1109/HICSS.2008.21","url":null,"abstract":"In scheduling, the two machine flow shop problem F2parSigma Ci is to find a schedule that minimizes the sum of finishing times of an arbitrary number of jobs that need to be executed on two machines, such that each job must complete processing on machine 1 before starting on machine 2. Finding such a schedule is NP-hard [6]. We propose a heuristic for approximating the solution for the F2parSigma Ci problem using a genetic algorithm. We calibrate the algorithm using optimal results obtained by a branch-and-bound technique. Genetic algorithms simulate the survival of the fittest among individuals over consecutive generations for solving a problem. Prior work has shown that genetic algorithms generally do not perform well for shop problems [21]. However, the fact that in the case of two machines the search space can be restricted to permutations makes the construction of effective genetic operators more feasible.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128306950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Brian Thoms, Nathan Garrett, Jesus Canelon Herrera, Terry Ryan
This paper builds on action and design research aimed at enhancing scholarly community and conversation in a graduate school setting. In this paper we focus on knowledge sharing (KS) and trust as important factors for building a sustainable online learning community (OLC). Guided by theories of social learning and social networking, we survey graduate students to assess their perceptions of KS and trust in communities of practice (CoPs). These results are compared against posttest results measuring community building and knowledge sharing in a stakeholder-defined OLC. Results indicate that although students' initial assessment of KS and trust in CoPs were low, users perceived high levels of value from a stakeholder-defined OLC. Our research offers a proof-of-concept that stakeholder-defined OLCs provide students with the opportunity to develop knowledge networks, while also providing for individual autonomy over their content. Our results also indicate an intriguing alternative to traditional course management systems (CMS).
{"title":"Understanding the Roles of Knowledge Sharing and Trust in Online Learning Communities","authors":"Brian Thoms, Nathan Garrett, Jesus Canelon Herrera, Terry Ryan","doi":"10.1109/HICSS.2008.481","DOIUrl":"https://doi.org/10.1109/HICSS.2008.481","url":null,"abstract":"This paper builds on action and design research aimed at enhancing scholarly community and conversation in a graduate school setting. In this paper we focus on knowledge sharing (KS) and trust as important factors for building a sustainable online learning community (OLC). Guided by theories of social learning and social networking, we survey graduate students to assess their perceptions of KS and trust in communities of practice (CoPs). These results are compared against posttest results measuring community building and knowledge sharing in a stakeholder-defined OLC. Results indicate that although students' initial assessment of KS and trust in CoPs were low, users perceived high levels of value from a stakeholder-defined OLC. Our research offers a proof-of-concept that stakeholder-defined OLCs provide students with the opportunity to develop knowledge networks, while also providing for individual autonomy over their content. Our results also indicate an intriguing alternative to traditional course management systems (CMS).","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128694356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sriraman Ramachandran, Srinivasan V. Rao, T. Goles
Differences in cultures across professions have been reported in the professional culture literature. An understanding of such differences is important to understand the effects of culture. We extend this argument to the area of information security. We argue that it is necessary to examine the information security cultures of various professions to identify differences that may exist, so that they may be taken into account in formulating initiatives to enhance information security. In this article, we provide a comparative description of the security cultures of four professions - information systems, accounting, marketing and human resources - based on semi- structured interviews of respondents from each of the professions. Our results confirm the existence of differences in security cultures across professions. In particular, they indicate that there are differences in beliefs about what constitutes information security, who is responsible for it, and the likelihood of their compliance with security under performance pressure.
{"title":"Information Security Cultures of Four Professions: A Comparative Study","authors":"Sriraman Ramachandran, Srinivasan V. Rao, T. Goles","doi":"10.1109/HICSS.2008.201","DOIUrl":"https://doi.org/10.1109/HICSS.2008.201","url":null,"abstract":"Differences in cultures across professions have been reported in the professional culture literature. An understanding of such differences is important to understand the effects of culture. We extend this argument to the area of information security. We argue that it is necessary to examine the information security cultures of various professions to identify differences that may exist, so that they may be taken into account in formulating initiatives to enhance information security. In this article, we provide a comparative description of the security cultures of four professions - information systems, accounting, marketing and human resources - based on semi- structured interviews of respondents from each of the professions. Our results confirm the existence of differences in security cultures across professions. In particular, they indicate that there are differences in beliefs about what constitutes information security, who is responsible for it, and the likelihood of their compliance with security under performance pressure.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128338471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
On September 5, 2006, a legal precedent was set for web accessibility. Federal judge Marilyn Patel sustained discrimination claims by the National Federation for the Blind against Target Corporation. She established that retailers must make their websites accessible to the blind under the Americans with Disabilities Act. Past research has indicated that eCommerce retailers have largely ignored W3C guidelines for making their sites accessible. This study examines web accessibility motivation under the lens of Corporate Social Responsibility (CSR). A model is developed linking accessibility behavior to a retailer's propensity to engage in CSR activities, the types of products and services sold, complexity of visual web content, and perceived threat of litigation resulting from an inaccessible site. Based on the model recommendations are suggested for future research. Thirty-two websites of the largest online retailers with a physical presence were analyzed using IBM's aDesigner accessibility tool for the three years before and one year since the commencement of the Target litigation. Results suggest that accessibility of sites has showed significant improvement since the Target case began.
{"title":"Web Accessibility for the Blind: Corporate Social Responsibility or Litigation Avoidance?","authors":"Jonathan Frank","doi":"10.1109/HICSS.2008.497","DOIUrl":"https://doi.org/10.1109/HICSS.2008.497","url":null,"abstract":"On September 5, 2006, a legal precedent was set for web accessibility. Federal judge Marilyn Patel sustained discrimination claims by the National Federation for the Blind against Target Corporation. She established that retailers must make their websites accessible to the blind under the Americans with Disabilities Act. Past research has indicated that eCommerce retailers have largely ignored W3C guidelines for making their sites accessible. This study examines web accessibility motivation under the lens of Corporate Social Responsibility (CSR). A model is developed linking accessibility behavior to a retailer's propensity to engage in CSR activities, the types of products and services sold, complexity of visual web content, and perceived threat of litigation resulting from an inaccessible site. Based on the model recommendations are suggested for future research. Thirty-two websites of the largest online retailers with a physical presence were analyzed using IBM's aDesigner accessibility tool for the three years before and one year since the commencement of the Target litigation. Results suggest that accessibility of sites has showed significant improvement since the Target case began.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128346396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stuart W. Shulman, Namhee Kwon, E. Hovy, Emily Huisman
Large-scale, email public comment campaigns in the United States necessitate the creation of new, specially tailored power tools for language. We call these applications "tools for rules". This paper introduces the rule writers' workbench, a system developed specifically for dealing with the influx of public comments. We describe the context in which these tools were developed and report on our first round of usability testing. Our major finding is that a particular tool ('DURIAN' or duplicate removal In large collection) performs a critical function in the era of burgeoning email campaigns. We provide a glimpse into the real world testbed provided by over 540,000 emails submitted to the Fish & Wildlife Service on the proposed listing of the polar bear as "threatened" under the Endangered Species Act. Finally, we conclude with observations about the likely political considerations as tools like DURIAN become more commonplace on the desktop of regulatory rule writers.
{"title":"Tools for Rules: Technology Transfer and Electronic Rulemaking","authors":"Stuart W. Shulman, Namhee Kwon, E. Hovy, Emily Huisman","doi":"10.1109/HICSS.2008.454","DOIUrl":"https://doi.org/10.1109/HICSS.2008.454","url":null,"abstract":"Large-scale, email public comment campaigns in the United States necessitate the creation of new, specially tailored power tools for language. We call these applications \"tools for rules\". This paper introduces the rule writers' workbench, a system developed specifically for dealing with the influx of public comments. We describe the context in which these tools were developed and report on our first round of usability testing. Our major finding is that a particular tool ('DURIAN' or duplicate removal In large collection) performs a critical function in the era of burgeoning email campaigns. We provide a glimpse into the real world testbed provided by over 540,000 emails submitted to the Fish & Wildlife Service on the proposed listing of the polar bear as \"threatened\" under the Endangered Species Act. Finally, we conclude with observations about the likely political considerations as tools like DURIAN become more commonplace on the desktop of regulatory rule writers.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129833541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Viégas, M. Wattenberg, Matt McKeon, F. V. Ham, Jesse Kriss
This paper is a report on early user activity in Many Eyes, a public web site where users may upload data, create visualizations, and carry on discussions. Since the site launched, users have uploaded data and created graphics on everything from DNA microarray data to co-occurrences of names in the New Testament to personal gift-giving networks. Our results show that in addition to traditional data analysis, Many Eyes is used for goals ranging from journalism and advocacy to personal expression and social interaction. We propose several implications of this usage for visualization designers and contend that these findings suggest a role for visualization as an expressive medium.
{"title":"Harry Potter and the Meat-Filled Freezer: A Case Study of Spontaneous Usage of Visualization Tools","authors":"F. Viégas, M. Wattenberg, Matt McKeon, F. V. Ham, Jesse Kriss","doi":"10.1109/HICSS.2008.188","DOIUrl":"https://doi.org/10.1109/HICSS.2008.188","url":null,"abstract":"This paper is a report on early user activity in Many Eyes, a public web site where users may upload data, create visualizations, and carry on discussions. Since the site launched, users have uploaded data and created graphics on everything from DNA microarray data to co-occurrences of names in the New Testament to personal gift-giving networks. Our results show that in addition to traditional data analysis, Many Eyes is used for goals ranging from journalism and advocacy to personal expression and social interaction. We propose several implications of this usage for visualization designers and contend that these findings suggest a role for visualization as an expressive medium.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129902637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}