The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Query languages are usually small, powerful and easy to learn, and that motivated us to investigate their role in modeling user interfaces. We explore annotation of template user interface with queries, especially embedded queries, to achieve partial generation of user interface with the ability to generate user interface with interaction styles such as form fillin and direct manipulation. Our model-driven...
Application stores have played a crucial role in the proliferation of applications for smart phones and other mobile devices. However, web-based mobile applications are challenging the application store model by allowing developers to directly reach the end users. These web-based applications are enhanced by the HTML5 standard, which provides additional capabilities for the use of developers and brings...
This article discusses opportunities for leveraging scale in cases of recurring scenarios of comparable decisions with multiple objectives in well-defined domains. Based on a software component ranking and selection method that uses utility analysis to separate objective information gathering and subjective assessment, we discuss challenges of decision making such as criterion complexity and evaluation...
This is the first HICSS minitrack focusing on different aspects of open data services, including issues related to the publication of the open data sets followed by new service development and their implications. Of special interest are novel applications of available open data in various domains, such as, preventive healthcare and traffic.
Open data promises an increased availability of previously private, mostly governmental, datasets for service development. However, research on the topic is only starting to surface. In this article we propose a research agenda for open data service research. We review earlier relevant literature to extrapolate open data as a phenomenon from the perspective of the information systems field. Based...
The work paradigm of crowd sourcing holds huge potential for organizations by providing access to a large workforce. However, an increase of crowd work entails increasing effort to evaluate the quality of the submissions. As evaluations by experts are inefficient, time-consuming, expensive, and are not guaranteed to be effective, our paper presents a concept for an automated classification process...
The availability of ubiquitous networks and bandwidth enables us to access services online using all kind of devices from anywhere at any time. The cloud infrastructures and interoperability minitrack covers a variety of topics related to cloud infrastructures and interoperability.
In cloud computing, interoperability typically refers to the ability to easily move workloads and data from one cloud provider to another or between private and public clouds. A common tactic for enabling interoperability is the use of open standards, so there is currently a large amount of active work in standards development for the Cloud. This paper explores the role of standards in cloud-computing...
Amongst the casualties of the electronic age has been a number of institutions and the values and services associated with them. One example of such is the postal service and the concept of sealed, private correspondence. The universal postal service was one of the great social developments of the 19th century. Today, while such services continue to exist in almost every country in the world, much...
This paper presents findings on potential frequency-response-related impacts of increased variable renewable wind generation on North America's western interconnection by 2012. The assessment was conducted using commercially available, production-grade dynamic simulation tools and industry-developed system models, which include the amount of wind generation capacity that planners in the interconnection...
Advances in information and communication technologies (ICTs) have created a global environment in which citizens from more developed countries have greater access to mobile broadband Internet services. The research question posed in this study is: Do national policy initiatives, regulatory measures, or governance practices increase a nation's mobile broadband diffusion? There is little research that...
The establishment of interoperability of enterprise IS with the ones of trading partners (e.g. customers, suppliers, business allies) is regarded, based on a variety of theoretical arguments, as an important source of business value associated with efficiency gains and innovation. However, there is a lack of empirical investigation of this business value. This paper presents an empirical study of...
The evolution of information systems from transaction-oriented systems to more collaborative systems has created enormous efficiencies in supply chains and distribution channels. The performance of these supply chains depends critically on the rules for information sharing and governance of the relationships. We study a marketing channel with a single manufacturer and multiple retailers (a two tier...
The recent launch of Google Wallet has brought the issue of technology solutions in mobile payments (m-payments) to the forefront. In deciding whether and when to adopt m-payments, senior managers in banks are concerned about uncertainties regarding future market conditions, technology standards, and consumer and merchant responses, especially their willingness to adopt. This study applies economic...
Outsourcing of software development tasks has become a major issue for large software enterprises over the last decades. Nowadays, small and medium-sized enterprises (SMEs) follow this trend and outsource parts of their software development as well. However, most of the existing literature deals with large enterprises whereas the situation of SMEs is being neglected. Especially sourcing decisions...
Researchers and practitioners of Information Systems Security (ISS) operate semi-disconnected. Standards and frameworks born out of the cumulated best-practice experiences have filled this gap. But without the rigor of the scientific process their validity is in question. To aid in building the required scientific foundation, existing empirical evidence needs to be processed further than the scope...
Organizations are investing substantial resources in technical security measures that aim at preventively protecting their information assets. The way management -- or information security executives -- deals with potential security measures varies individually and depends on personality traits and cognitive factors. Based on the Theory of Planned Behavior, we examine the relationship between the...
Due to its high popularity and rich functionalities, the Portable Document Format (PDF) has become a major vector for malware propagation. To detect malicious PDF files, the first step is to extract and de-obfuscate Java Script codes from the document, for which an effective technique is yet to be created. However, existing static methods cannot de-obfuscate Java Script codes, existing dynamic methods...
During the conduct of Software Assurance on a software development project, data is gathered on both the software being developed, and the development processes being followed. It is from this information that Software Assurance derives insights into the quality of the software itself and the efficacy of the development process. For large software developments such data can be voluminous, making deriving...
With an increase in the amount of daily UAV flights and the number of Digital Video Broadcast Return Channel Satellite (DVBRCS) suites in the Central Command (CENTCOM) Theater of Operations, the demand for a constant access to the operational picture has also increased. Until recently, there have been limited solutions for enlarging the access to DVBRCS video feeds. With the advent of wireless technologies,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.