This study deals with the intersection of knowledge and action: how knowledge is developed, transformed, interpreted and used to change systems of business process and IT so that stakeholders may make effective decisions and take effective action in their work. The co-design of business and IT systems is a process within which business systems of human activity and IT systems of information processing are mutually constituted. It requires the negotiation of competing technological frames across multiple knowledge domains. Three major challenges hinder effective innovation: (i) a mismatch between goal-driven IS design methods and the need for cross-functional knowledge-sharing, (ii) the distributed and partial knowledge possessed by stakeholders from diverse groups; (iii) the need to maintain interpretive flexibility across cycles of discovery and analysis. This paper develops an analytical framework for integrating knowledge frames across stakeholder groups, to provide a common language for the co- design of business and IT systems.
{"title":"A Framework for the Co-design of Business and IT Systems","authors":"Susan Gasson","doi":"10.1109/HICSS.2008.20","DOIUrl":"https://doi.org/10.1109/HICSS.2008.20","url":null,"abstract":"This study deals with the intersection of knowledge and action: how knowledge is developed, transformed, interpreted and used to change systems of business process and IT so that stakeholders may make effective decisions and take effective action in their work. The co-design of business and IT systems is a process within which business systems of human activity and IT systems of information processing are mutually constituted. It requires the negotiation of competing technological frames across multiple knowledge domains. Three major challenges hinder effective innovation: (i) a mismatch between goal-driven IS design methods and the need for cross-functional knowledge-sharing, (ii) the distributed and partial knowledge possessed by stakeholders from diverse groups; (iii) the need to maintain interpretive flexibility across cycles of discovery and analysis. This paper develops an analytical framework for integrating knowledge frames across stakeholder groups, to provide a common language for the co- design of business and IT systems.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121145678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ever since the boom in global e-business, and the resulting intensification of competition, cross-cultural e-negotiation has increased in popularity. Understanding how national cultures affect negotiation behaviour is becoming more and more critical for businesses. This research will explore how a negotiator's cultural background impacts its behaviour. There are four major findings: firstly, that Eastern and Western businesses have unique negotiation behaviours; secondly, that the negotiation behaviours of both Eastern and Western negotiators are impacted by their counterparts' cultural background; thirdly, that when Easterners negotiate with Westerners, there were more instances of task behaviour and persuasive behaviour, but fewer instances of procedural behaviour and private communication; and finally, that when Westerner negotiates with Easterner, there are more instances of task behaviour but fewer of private communication. In spite of the similarities, however, Western negotiators have more consistent negotiation behaviour than do their Eastern equivalents, regardless of cultural differences between the dyadic negotiators. The following research uses the content analysis method, which is more thorough than the questionnaire in terms of qualitative criteria. The total set of thought units can be analyzed from further viewpoints in the future.
{"title":"What Happened to Cross-Cultural Dyadic E-Negotiation?","authors":"Hsiangchu Lai, Wan-Jung Lin, Juin-Yi Lin","doi":"10.1109/HICSS.2008.499","DOIUrl":"https://doi.org/10.1109/HICSS.2008.499","url":null,"abstract":"Ever since the boom in global e-business, and the resulting intensification of competition, cross-cultural e-negotiation has increased in popularity. Understanding how national cultures affect negotiation behaviour is becoming more and more critical for businesses. This research will explore how a negotiator's cultural background impacts its behaviour. There are four major findings: firstly, that Eastern and Western businesses have unique negotiation behaviours; secondly, that the negotiation behaviours of both Eastern and Western negotiators are impacted by their counterparts' cultural background; thirdly, that when Easterners negotiate with Westerners, there were more instances of task behaviour and persuasive behaviour, but fewer instances of procedural behaviour and private communication; and finally, that when Westerner negotiates with Easterner, there are more instances of task behaviour but fewer of private communication. In spite of the similarities, however, Western negotiators have more consistent negotiation behaviour than do their Eastern equivalents, regardless of cultural differences between the dyadic negotiators. The following research uses the content analysis method, which is more thorough than the questionnaire in terms of qualitative criteria. The total set of thought units can be analyzed from further viewpoints in the future.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121463273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Interorganizational systems (IOS) adoption requires cooperation and collaboration between trading partners and, therefore, is reliant on the nature of their relationships. There has been some research that investigates relationships and how organizations progress from one level to the next level of adoption. However, these studies do not adequately justify the exclusion of other variables and are not theoretically based. This research extends the Kurnia and Johnston (2000) process model of IOS adoption by incorporating the notion of IOS adoption maturity and also modifies it from a supply chain to a dyadic level so better evaluations of progression can be performed. With this model, the dynamics of IOS adoption maturity can be better examined empirically.
{"title":"A Dyadic Model of Interorganizational Systems (IOS) Adoption Maturity","authors":"Mazen Ali, S. Kurnia, R. Johnston","doi":"10.1109/HICSS.2008.18","DOIUrl":"https://doi.org/10.1109/HICSS.2008.18","url":null,"abstract":"Interorganizational systems (IOS) adoption requires cooperation and collaboration between trading partners and, therefore, is reliant on the nature of their relationships. There has been some research that investigates relationships and how organizations progress from one level to the next level of adoption. However, these studies do not adequately justify the exclusion of other variables and are not theoretically based. This research extends the Kurnia and Johnston (2000) process model of IOS adoption by incorporating the notion of IOS adoption maturity and also modifies it from a supply chain to a dyadic level so better evaluations of progression can be performed. With this model, the dynamics of IOS adoption maturity can be better examined empirically.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127525099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adam Newcomer, S. Blumsack, J. Apt, L. Lave, M. G. Morgan
Stabilizing atmospheric carbon dioxide levels at acceptable levels will require a dramatic de-carbonization of the electric generation sector in the U.S. One increasingly discussed way to meet this policy goal is to put an explicit price on carbon emissions, either through a tax or a trading scheme. Increasing demand response has also been discussed as a way to reduce carbon emissions in the U.S. electricity industry. We examine the short-run effectiveness of a policy combining demand response with a carbon tax. Using plant-level operational data, we construct short-run cost curves for three U.S. regional electric systems, and examine the impacts on prices and carbon emissions. In the short run, a carbon tax in the range of $30 - $40 and a price elasticity of demand in the range of -0.1 to -0.2 could reduce carbon emissions in coal-intensive regions by 10% to 25%. With this same set of carbon prices, achieving a 50% reduction in emissions would require a price elasticity of demand in the range of -0.25 to -0.4. Percentage reductions of this magnitude in less carbon-intensive systems are unlikely, even with highly elastic demand and high carbon prices.
{"title":"Electricity Load and Carbon Dioxide Emissions: Effects of a Carbon Price in the Short Term","authors":"Adam Newcomer, S. Blumsack, J. Apt, L. Lave, M. G. Morgan","doi":"10.1109/HICSS.2008.139","DOIUrl":"https://doi.org/10.1109/HICSS.2008.139","url":null,"abstract":"Stabilizing atmospheric carbon dioxide levels at acceptable levels will require a dramatic de-carbonization of the electric generation sector in the U.S. One increasingly discussed way to meet this policy goal is to put an explicit price on carbon emissions, either through a tax or a trading scheme. Increasing demand response has also been discussed as a way to reduce carbon emissions in the U.S. electricity industry. We examine the short-run effectiveness of a policy combining demand response with a carbon tax. Using plant-level operational data, we construct short-run cost curves for three U.S. regional electric systems, and examine the impacts on prices and carbon emissions. In the short run, a carbon tax in the range of $30 - $40 and a price elasticity of demand in the range of -0.1 to -0.2 could reduce carbon emissions in coal-intensive regions by 10% to 25%. With this same set of carbon prices, achieving a 50% reduction in emissions would require a price elasticity of demand in the range of -0.25 to -0.4. Percentage reductions of this magnitude in less carbon-intensive systems are unlikely, even with highly elastic demand and high carbon prices.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129204961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile commerce had been expected to become a major force of e-commerce in the 21st century. However, the rhetoric has far exceeded the reality so far. While academics and practitioners have presented many views about the lack of rapid growth of mobile commerce, we submit that the anticipated mobile commerce take-off hinges on the emergence of a few killer apps. After reviewing the recent history of technologies that have dramatically changed our way of life and work, we propose a set of criteria for identifying and evaluating killer apps. From this vantage point, we argue that mobile payment and banking are the most likely candidates for the killer apps that could bring the expectation of a world of ubiquitous mobile commerce to fruition. Challenges and opportunities associated with this argument are discussed.
{"title":"Are Mobile Payment and Banking the Killer Apps for Mobile Commerce?","authors":"Xianpei Hu, Wenli Li, Qing Hu","doi":"10.1109/HICSS.2008.69","DOIUrl":"https://doi.org/10.1109/HICSS.2008.69","url":null,"abstract":"Mobile commerce had been expected to become a major force of e-commerce in the 21st century. However, the rhetoric has far exceeded the reality so far. While academics and practitioners have presented many views about the lack of rapid growth of mobile commerce, we submit that the anticipated mobile commerce take-off hinges on the emergence of a few killer apps. After reviewing the recent history of technologies that have dramatically changed our way of life and work, we propose a set of criteria for identifying and evaluating killer apps. From this vantage point, we argue that mobile payment and banking are the most likely candidates for the killer apps that could bring the expectation of a world of ubiquitous mobile commerce to fruition. Challenges and opportunities associated with this argument are discussed.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130513317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Operating systems and data protection tools are employing sophisticated password derived encryption key techniques in order to encrypt data. Such techniques impose a significant computational burden on forensic tools that attempt dictionary attacks are requiring cryptographic hash generation functions to be called several thousand times for each password attempted. In order to improve throughput, forensic analysis tools are designed to operate in a distributed manner over a dedicated network of workstations. This paper describes an FPGA-based hardware implementation of the standard CPSK#5 technique published by RSA Laboratories for generating password-derived encryption keys. This is the most computationally demanding step required when performing a dictionary attack on modern password-protected systems. The initial FPGA implementation incorporates four password-derived encryption key generation units operating at a frequency of 150 MHz and is capable of processing over 510 passwords per second. The implementation's performance can be easily improved by incorporating additional key generation units.
{"title":"Using FPGAs to Parallelize Dictionary Attacks for Password Cracking","authors":"Yoginder S. Dandass","doi":"10.1109/HICSS.2008.484","DOIUrl":"https://doi.org/10.1109/HICSS.2008.484","url":null,"abstract":"Operating systems and data protection tools are employing sophisticated password derived encryption key techniques in order to encrypt data. Such techniques impose a significant computational burden on forensic tools that attempt dictionary attacks are requiring cryptographic hash generation functions to be called several thousand times for each password attempted. In order to improve throughput, forensic analysis tools are designed to operate in a distributed manner over a dedicated network of workstations. This paper describes an FPGA-based hardware implementation of the standard CPSK#5 technique published by RSA Laboratories for generating password-derived encryption keys. This is the most computationally demanding step required when performing a dictionary attack on modern password-protected systems. The initial FPGA implementation incorporates four password-derived encryption key generation units operating at a frequency of 150 MHz and is capable of processing over 510 passwords per second. The implementation's performance can be easily improved by incorporating additional key generation units.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116783071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting a selected package may prove disastrous and even more expensive than building the system in house and from scratch. Building a software solution based on a COTS package not only has its risks, but it is also different from a custom development effort, and it needs to follow a rigorous methodology for a successful implementation. Therefore, it is necessary to define how to solve some of the challenges that this type of project presents, and how to balance customer requirements with the features offered by the COTS package. To successfully and efficiently convert a legacy system into a new system based on COTS package, we developed and present a methodology that utilizes a general process flow chart, simplified use cases, and a mapping to the COTS package functionality. We also present the findings of a case study on the applicability and effectiveness of the proposed methodology for the conversion of a legacy laboratory information management system (LIMS).
{"title":"Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS Package","authors":"J. D. Montero, YongSeog Kim, Jeffrey J. Johnson","doi":"10.1109/HICSS.2008.393","DOIUrl":"https://doi.org/10.1109/HICSS.2008.393","url":null,"abstract":"The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting a selected package may prove disastrous and even more expensive than building the system in house and from scratch. Building a software solution based on a COTS package not only has its risks, but it is also different from a custom development effort, and it needs to follow a rigorous methodology for a successful implementation. Therefore, it is necessary to define how to solve some of the challenges that this type of project presents, and how to balance customer requirements with the features offered by the COTS package. To successfully and efficiently convert a legacy system into a new system based on COTS package, we developed and present a methodology that utilizes a general process flow chart, simplified use cases, and a mapping to the COTS package functionality. We also present the findings of a case study on the applicability and effectiveness of the proposed methodology for the conversion of a legacy laboratory information management system (LIMS).","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131193986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Most existing studies of Web site characteristics and their impact on intentions have assumed a linear relationship between them. However, motivational theories suggest that while some characteristics have linear effects, others will act as either hygiene factors or motivator factors and have non-linear effects. Drawing on motivational theory and WebQual constructs, this study looks at different methods of testing for hygiene and motivator factors and proposes a different technique that could clarify misleading results. Linear regression, quadratic regression, and piecewise regression are used in the study. The results show the hygiene effect of trust and suggest that piecewise linear regression may be superior to quadratic regression in this context.
{"title":"An Exploration of the Hygiene and Motivator Aspects of WebQual Constructs in Predicting Website Reuse","authors":"Ben Q. Liu, D. Goodhue","doi":"10.1109/HICSS.2008.54","DOIUrl":"https://doi.org/10.1109/HICSS.2008.54","url":null,"abstract":"Most existing studies of Web site characteristics and their impact on intentions have assumed a linear relationship between them. However, motivational theories suggest that while some characteristics have linear effects, others will act as either hygiene factors or motivator factors and have non-linear effects. Drawing on motivational theory and WebQual constructs, this study looks at different methods of testing for hygiene and motivator factors and proposes a different technique that could clarify misleading results. Linear regression, quadratic regression, and piecewise regression are used in the study. The results show the hygiene effect of trust and suggest that piecewise linear regression may be superior to quadratic regression in this context.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131398624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper expands theoretical and empirical understanding of the interaction between formal boundary spanning mechanism (i.e. individuals formally nominated to span boundaries for knowledge sharing) and informal boundary spanning mechanism (i.e., informal seeking of information via social ties crossing boundaries) in a far-flung operation of a global company. Through a case study of engineering groups at a U.S. based manufacturing plant, we found that both formal and informal boundary spanning mechanisms had a positive effect on the ability of dispersed groups to identify and transfer remotely situated knowledge from other sites. However, we also found that the formal boundary spanning mechanism may have a suppressing effect on the informal boundary spanning mechanism when jointly pursued in certain circumstances. The findings call into question the implicit view of the boundary spanner and virtual team literatures that has largely portrayed the effects of both mechanisms on cross-boundary knowledge transfer as independent or complementary.
{"title":"Formal Boundary Spanning and Informal Boundary Spanning in Cross-Border Knowledge Sharing: A Case Study","authors":"Yongsuk Kim, S. Jarvenpaa","doi":"10.1109/HICSS.2008.172","DOIUrl":"https://doi.org/10.1109/HICSS.2008.172","url":null,"abstract":"The paper expands theoretical and empirical understanding of the interaction between formal boundary spanning mechanism (i.e. individuals formally nominated to span boundaries for knowledge sharing) and informal boundary spanning mechanism (i.e., informal seeking of information via social ties crossing boundaries) in a far-flung operation of a global company. Through a case study of engineering groups at a U.S. based manufacturing plant, we found that both formal and informal boundary spanning mechanisms had a positive effect on the ability of dispersed groups to identify and transfer remotely situated knowledge from other sites. However, we also found that the formal boundary spanning mechanism may have a suppressing effect on the informal boundary spanning mechanism when jointly pursued in certain circumstances. The findings call into question the implicit view of the boundary spanner and virtual team literatures that has largely portrayed the effects of both mechanisms on cross-boundary knowledge transfer as independent or complementary.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132706821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Many peer-to-peer (P2P) networks have been widely used for file sharing. A peer acts both as a content provider and a consumer, and is granted autonomy to decide what content, with whom, and when to share. Is a P2P network an ideal vehicle for information sharing in collaborative learning? This study adopts the theory of planned behavior as a basis to study the sharing behaviors on a P2P network. Due to the lack of empirical data, we built a P2P network platform to conduct an experiment in a collaborative learning setting. Through the analysis we found the intention of sharing is only positively related with subjective norm. Based on this result, we assert that subjective norm, especially the discipline from the instructor, plays a critical role in motivating students to share knowledge on a P2P network for collaborative learning. From this empirical study, a hybrid architecture combining P2P networks with servers could be more favorable for collaborative learning.
{"title":"Can Peer-to-Peer Networks Facilitate Information Sharing in Collaborative Learning?","authors":"Fu-Ren Lin, Sheng-cheng Lin, Ying-fen Wang","doi":"10.1109/HICSS.2008.87","DOIUrl":"https://doi.org/10.1109/HICSS.2008.87","url":null,"abstract":"Many peer-to-peer (P2P) networks have been widely used for file sharing. A peer acts both as a content provider and a consumer, and is granted autonomy to decide what content, with whom, and when to share. Is a P2P network an ideal vehicle for information sharing in collaborative learning? This study adopts the theory of planned behavior as a basis to study the sharing behaviors on a P2P network. Due to the lack of empirical data, we built a P2P network platform to conduct an experiment in a collaborative learning setting. Through the analysis we found the intention of sharing is only positively related with subjective norm. Based on this result, we assert that subjective norm, especially the discipline from the instructor, plays a critical role in motivating students to share knowledge on a P2P network for collaborative learning. From this empirical study, a hybrid architecture combining P2P networks with servers could be more favorable for collaborative learning.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128128016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}