-------- Original-Nachricht --------
Betreff: [isworld] Call for Papers - 4th Int. Workshop on Modular
Ontologies
Datum: Sun, 11 Oct 2009 13:44:50 -0400
Von: Jie Bao <baojie(a)gmail.com>
Antwort an: Jie Bao <baojie(a)gmail.com>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
( WE APOLOGIZE IF YOU RECEIVE MULTIPLE COPIES OF THIS MESSAGE )
=========================================================
4th Int. Workshop on Modular Ontologies (WoMO)
Toronto, Canada, May 11, 2010
co-located with FOIS, KR, AAMAS, ICAPS, NMR, and DL
--- 1st Call for Papers ---
=========================================================
http://www.informatik.uni-bremen.de/~okutz/womo4
MODULARITY, as studied for many years in software engineering, allows
mechanisms for easy and flexible reuse, generalization, structuring,
maintenance, design patterns, and comprehension. Applied to ontology
engineering, modularity is central not only to reduce the complexity
of understanding ontologies, but also to facilitate ontology
maintenance and ontology reasoning.
Recent research on ontology modularity shows substantial progress in
foundations of modularity, techniques of modularization and modular
development, distributed reasoning and empirical evaluation. These
results provide a foundation for further research and development.
The workshop follows a series of successful events that have been an
excellent venue for practitioners and researchers to discuss latest
work and current problems, and is this time organised as a satellite
workshop of FOIS 2010, as well as being co-located with several other
relevant events, namely KR, AAMAS, ICAPS, NMR, and DL.
TOPICS include, but are not limited to:
- What is Modularity: Kinds of modules and their properties; modules
vs. contexts; design patterns; granularity of representation;
- Logical/Foundational Studies: Conservativity; modular ontology
languages (e.g., DDL, E-Connections, P-DL); reconciling
inconsistencies across modules; formal structuring of modules;
heterogeneity;
- Algorithmic Approaches: distributed reasoning; modularization and
module extraction; (selective) sharing and re-using, linking and
importing; hiding and privacy; evaluation of modularization
approaches; complexity of reasoning; reasoners or implemented systems;
- Applications: Semantic Web; Life Sciences; Bio-Ontologies; Natural
Language Processing; ontologies of space and time; Ambient
Intelligence; collaborative ontology development; etc.
IMPORTANT DATES
Paper Submission: January 29, 2010
Notification: March 1, 2010
Camera ready: March 11, 2010
Workshop day: May 11, 2010
SUBMISSION GUIDELINES:
The workshop welcomes submission of high quality original and
previously unpublished papers.
Contributions should not exceed 13 pages in length and must be
formatted according to IOS Press style (see
http://www.iospress.nl/authco/instruction_crc.html ).
Contributions should be prepared in PDF format and submitted not later
than January 29 2010 through the EasyChair Submission System (see
http://www.informatik.uni-bremen.de/~okutz/womo4 ).
Submitted papers will be peer-reviewed by members of the program
committee. Accepted papers may be extended up to 16 pages and will be
published as chapters in an IOS Press book in the series 'Frontiers in
Artificial Intelligence and Applications'.
The authors of accepted papers are also welcome to submit
substantially extended versions to a planned special issue on
'Modularity in Ontologies' of the international journal 'Applied
Ontology' (IOS Press).
WORKSHOP CO-CHAIRS:
Oliver Kutz (Research Center on Spatial Cognition (SFB/TR 8), Bremen, Germany)
Joana Hois (Research Center on Spatial Cognition (SFB/TR 8), Bremen, Germany)
Jie Bao (Tetherless World Constellation & Department of Computer
Science, Rensselaer Polytechnic Institute, USA)
Bernardo Cuenca Grau (University of Oxford, UK)
PROGRAM COMMITTEE
Mathieu d'Aquin (Knowledge Media Institute, Open University of Milton
Keynes, UK)
Alex Borgida (Department of Computer Science, Rutgers University, USA)
Stefano Borgo (Laboratory for Applied Ontology, CNR, Trento, Italy)
Martin Dzbor (Knowledge Media Institute, Open University of Milton Keynes, UK)
Fred Freitas (Universidade Federal de Pernambuco, Caixa Postal, Brazil)
Silvio Ghilardi (Department of Computer Science, University of Milan, Italy)
John Goodwin (Ordnance Survey, Southampton, UK)
Peter Haase (fluid Operations GmbH, Germany)
Heinrich Herre (Institute for Medical Informatics, Statistics and
Epidemiology, University of Leipzig, Germany)
Pascal Hitzler (Kno.e.sis Center, Wright State University, USA)
Vasant Honovar (Artificial Intelligence Research Laboratory, Iowa
State University, USA)
Roman Kontchakov (School of Computer Science and Information Systems,
Birkbeck College, London, UK)
Carsten Lutz (Department of Computer Science, University of Bremen, Germany)
Till Mossakowski (German Research Center for Artificial Intelligence,
Lab Bremen, Germany)
Alan Rector (University of Manchester, UK)
Anne Schlicht (KR & KM Research Group, University of Mannheim, Germany)
Thomas Schneider (Department of Computer Science, University of Manchester, UK)
Luciano Serafini (Centro Per la Ricerca Scientifica e Tecnologica,
Trento, Italy)
Stefano Spaccapietra (School of Computer and Communication Sciences,
Lausanne, Switzerland)
Heiner Stuckenschmidt (KR & KM Research Group, University of Mannheim, Germany)
Andrei Tamilin (Fondazione Bruno Kessler - IRST, Italy)
Dirk Walther (Department of Computer Science, Universidad Politecnica
de Madrid, Spain)
Frank Wolter (Department of Computer Science, University of Liverpool, UK)
Michael Zakharyaschev (School of Computer Science and Information
Systems, Birkbeck College, London, UK)
Antoine Zimmermann (DERI, National University of Ireland, Galway, Ireland)
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] Innovations in Supply Chain Management for
Information Systems: Novel Approaches - Introducing the latest release
from IGI Global
Datum: Sat, 10 Oct 2009 13:52:10 -0400
Von: John Wang <j.john.wang(a)gmail.com>
Antwort an: John Wang <j.john.wang(a)gmail.com>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
Introducing the latest release from IGI Global:
Innovations in Supply Chain Management for Information Systems: Novel
Approaches
ISBN: 978-1-60566-974-8; 394 pp; October 2009
Published under Information Science Reference, an imprint of IGI Global
http://www.igi-global.com/reference/details.asp?id=35023
Edited by: John Wang, Montclair State University, USA
DESCRIPTION
The intersection of supply chain management and e-business information
systems is a significant topic for the modern business world as
understanding which technologies will most effectively enable innovative
practices is a key management competency.
Innovations in Supply Chain Management for Information Systems: Novel
Approaches presents exemplary research on the interface between these two
fields, useful to academicians and practitioners keen on streamlining
concurrently both information and materials flows across the supply
chains. This advanced publication provides recent examinations as well as
future directions of development.
****************************************
"Any company can benefit from the successful implementation of SCM using
different information systems options, including enterprise resource
planning (ERP) and decision support systems (DSS) that are aimed towards
assisting the different functional areas in a supply chain."
- John Wang, Montclair State University, USA
****************************************
TOPICS COVERED
Buyer-supplier coordination in e-markets
Collecting consumer behavior data with WLAN
Comparisons of IT in supply chains
Cooperative pricing in manufacturer-e-retailer supply chain
Cost estimation in capacitated environments
E-network integration for synchronizing supply chains
Green supply chain management system
Just-in-time supply chains
RFID in supply chains
RFID data management
For more information about Innovations in Supply Chain Management for
Information Systems: Novel Approaches, you can view the title information
sheet at http://www.igi-global.com/downloads/pdf/35023.pdf. To view the
Table of Contents and a complete list of contributors online go to
http://www.igi-global.com/reference/details.asp?ID=35023&v=tableOfContents.
ABOUT THE EDITOR
John Wang is a professor in the Department of Management and Information
Systems at Montclair State University (USA). Having received a scholarship
award, he came to the USA and completed his PhD in operations research
from Temple University. He has published over 100 refereed papers and six
books. He has also developed several computer software programs based on
his research findings.
He is the Editor-in-Chief of International Journal of Applied Management
Science, International Journal of Information Systems and Supply Chain
Management, International Journal of Information and Decision Sciences. He
is also the EIC for the Advances in Information Systems and Supply Chain
Management Book Series. He has served as a guest editor and referee for
many other highly prestigious journals. He has served as track chair
and/or session chairman numerous times on the most prestigious
international and national conferences.
Also, he is an Editorial Advisory Board member of the following
publications: Intelligent Information Technologies: Concepts,
Methodologies, Tools, and Applications, End-User Computing: Concepts,
Methodologies, Tools, and Applications, Global Information Technologies:
Concepts, Methodologies, Tools, and Applications, Information
Communication Technologies: Concepts, Methodologies, Tools, and
Applications, Multimedia Technologies: Concepts, Methodologies, Tools, and
Applications, Information Security and Ethics: Concepts, Methodologies,
Tools, and Applications, Electronic Commerce: Concepts, Methodologies,
Tools, and Applications, Electronic Government: Concepts, Methodologies,
Tools, and Applications, and other IGI Global titles.
Furthermore, he is the editor of Data Warehousing and Mining: Concepts,
Methodologies, Tools, and Applications and the editor Encyclopedia of Data
Warehousing and Mining 1st and 2nd editions. His long-term research goal
is on the synergy of operations research, data mining, and cybernetics.
****************************************
To view the full contents of this publication, check for Innovations in
Supply Chain Management for Information Systems: Novel Approaches in your
institution�s library. If you library does not currently own this title,
please recommend it to your librarian.
****************************************
Become an Author/Editor
As we are constantly seeking to increase the availability of emerging
research, we are most interested in further discussing your goals and
ideas for potential publication. We develop several types of publications,
and provide comprehensive support to assist you in materializing your new
research. We are currently accepting new proposals covering a variety of
topics in the areas of Information Science, Medical Information Science,
Business Science and Engineering Science.
We invite you to please complete our book proposal form at:
http://www.igi-global.com/development/author_info/proposal%20form_distribut…
Please send any questions and your completed proposal via our proposal
form or as an attachment to IGIAcquisition(a)igi-global.com.
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] [NPA] Call for Papers: International Journal of
Network Protocols and Algorithms
Datum: Sat, 10 Oct 2009 20:37:40 +0200
Von: Jaime Lloret_Mauri<jlloret(a)dcom.upv.es>
Antwort an: Jaime Lloret_Mauri<jlloret(a)dcom.upv.es>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
********************* Call for Papers for Vol 1, Issue 2 *********************
Network Protocols and Algorithms
ISSN 1943-3581
http://www.macrothink.org/journal/index.php/npa/
Network Protocols and Algorithms is a free online international journal, peer-reviewed and published by Macrothink Institute. It publishes papers focused on the design, development, manage, optimize or monitoring any type of network protocol, communication system, algorithm for communication and any protocol and algorithm to communicate network devices in a computer network.
The scope of the journal include, but are not limited to, the following topic areas:
- Synchronization Protocols and Algorithms
- Security Protocols and Algorithms
- QoS Protocols and Algorithms
- Ad-Hoc and Sensor Network Protocols and Algorithms
- Content Delivery Networks Protocols and Algorithms
- P2P Protocols and Algorithms
- Cluster-Based Protocols and Algorithms
- Real-Time Protocols and Algorithms
- Wireless Protocols and Algorithms
- MAC Protocols and Algorithms for Wired Networks
- Mobile wireless internet protocols and algorithms
- Delay Tolerant protocols and algorithms
- Mesh network protocols and algorithms
- Protocols and algorithms for Voice over IP delivery
- Cognitive Radio Network Protocols and Algorithms
- Monitoring and management protocols and algorithms
- optical networking protocols and algorithms
- Scalable Network Protocols and Algorithms
- Protocols and algorithms for Green Computing and Resource Allocation
- Routing Protocols and Algorithms
- Tree-based Protocols and Algorithms
- Distributed/Decentralized Algorithms for Networks
- Fault tolerant Protocols and Algorithms
- Protocols and algorithms for Mobile and Dynamic Networks
- Cross-Layer Collaborative Protocols and Algorithms
- Formal methods and cryptographic algorithms for communication
You are welcome to submit a paper or forward this call for papers to any people working in Network Protocols and Algorithms that may be interested in submitting a paper.
The topics suggested by the journal can be discussed in term of concepts, state of the art, standards, implementations, running experiments and applications. Proposals and deployments are also welcome.
Important Dates for the second Issue:
_ Manuscript Due: November 15, 2009
_ Notification: December 13, 2009
_ Final Manuscripts Due: December 23, 2009
_ Tentative Publication: End of December 2009
Submission Information:
Only original and unpublished research papers will be considered in this journal. Manuscripts must be writen in English. All submissions will be reviewed based on technical merit and relevance. Instructions for authors and submissions can be found in http://www.macrothink.org/journal/index.php/npa/about/submissions
Jaime Lloret Mauri
Editor in Chief of the International Journal of Network Protocols and Algorithms
Associate Professor
Department of Communications
Polytechnic University of Valencia
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [computational.science] SBP10: 2nd Call for Papers - 2010
International Conference on Social Computing, Behavioral Modeling, &
Prediction
Datum: Sat, 10 Oct 2009 15:34:01 -0500
Von: Nitin Agarwal <nxagarwal(a)ualr.edu>
Organisation: "ICCSA"
An: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
CALL FOR PAPERS and SAVE THE DATE!
2010 International Conference on Social Computing, Behavioral Modeling, & Prediction (SBP10)
Conference Website: http://sbp.asu.edu
March 29 - April 1, 2010
Natcher Auditorium
National Institutes of Health (NIH) Main Campus
Bethesda, MD
* Pre-conference Tutorial Sessions (TBA) : March 29, 2010
* SBP10 Conference (Single Track) March 30 - 31, 2010
* Post-conference Cross-Disciplinary Workshop: (Tentative), morning, April 1, 2010
Sponsored by
Air Force Office of Scientific Research (AFOSR)
Air Force Research Laboratories
Office of Naval Research
National Institutes of Health
ABOUT SBP
Due to the overwhelming success of its workshops in 2008 and 2009, Social Computing, Behavioral Modeling and Prediction (SBP) has become a high visibility, high-impact, international conference. Detailed information on SBP workshops (SBP08 and SBP09) including proceedings, presentations and invited speakers can be found at http://sbp.asu.edu
Social computing harnesses the power of computational methods to study social behavior and social context. Behavioral modeling refers to representing behavior in the abstract and is a convenient and powerful way to conduct virtual experiments and scenario planning. Both social computing and behavioral modeling are techniques designed to achieve a better understanding of complex behaviors, patterns, and associated outcomes of interest. Moreover, these approaches are inherently interdisciplinary; subsystems and system components exist at multiple levels of analysis (i.e., "cells to societies") and cross disparate disciplines.
Conference Offerings and Opportunities
SBP10 is a highly interdisciplinary conference offering a rare and exciting opportunity for behavioral and social science researchers to come together with computational and computer scientists and other related disciplines in order to:
* Gain fundamental working knowledge in a discipline outside one’s own through half-day pre-conference tutorials (More information will be posted to the conference website as it becomes available).
* Showcase SBP research at paper and poster sessions
* Meet people in complementary disciplines through deliberate exercises aimed at exploring potential research partnerships during the post-conference half day workshop
Because this conference is being held in the Washington, D.C. area there will be a unique opportunity to meet with program staff across a variety of federal agencies including: Air Force Office of Scientific Research (AFOSR), Office of Naval Research (ONR), National Institutes of Health (NIH), National Science Foundation (NSF), and Department of Homeland Security (DHS).
This conference is emphatically interdisciplinary and provides a platform for researchers, practitioners, program staff from federal agencies and graduate students in disciplines such as sociology, behavioral science, psychology, cultural study, health sciences, economics, computer science, engineering, information systems, and operations research to convene in one place. Attendees will walk away with a deeper understanding of social and behavioral computing and evaluation as they inform critical decision and policy making. The program will include invited speakers from government, industry, and academia, as well as research presentations and discussions.
Call for Papers and Posters
Papers or posters are solicited on research issues, theories, and applications. Topics of interests include, but are not limited to,
* Military and security applications of SBP
o Group formation and evolution in the political context
o Technology and flash crowds
o Networks and political influence
o Information diffusion
o Group representation and profiling
* Health applications of SBP
o Social network analysis to understand health behavior
o Modeling of health policy and decision making
o Modeling of behavioral aspects of infectious disease spread
o Intervention design and modeling for behavioral health
* Basic research on sociocultural and behavioral processes using SBP
o Group interaction and collaboration
o Group formation and evolution
o Group representation and profiling
o Cultural patterns and representation
o Social conventions and social contexts
o Influence process and recognition
o Public opinion representation
o Viral marketing and information diffusion
o Psycho-cultural situation awareness
* Methodological issues in SBP
o Verification and validation
o Sensitivity analysis
o Matching technique or method to research questions
o Metrics and evaluation
o Methodological innovation
o Model federation and integration
o Limitations of and barriers to SBP
o Research gaps and opportunities
Important Dates
Paper/full text poster Due: Friday, November 6, 2009
Notification of acceptance: November 27, 2009
Camera-Ready: December 11, 2009
Format and Submission
Papers (maximum 8 pages) should be submitted in PDF format. Full text of posters should also be submitted. Format instructions and a Word template from Springer can be found at the conference website http://sbp.asu.edu
SBP10 Conference Proceedings will be published by Springer
Papers should be submitted at http://www.easychair.org/conferences/?conf=sbp10
Questions and inquiries are welcome. Please send them to sbpconf10(a)gmail.com
SBP Conference Committees
SBP10 Conference Organizing Committee - Conference Co-Chairs
Patricia L. Mabry, Ph.D.
Conference Chair
Senior Advisor
Program Lead, Systems Science Initiatives
Office of Behavioral and Social Sciences Research
National Institutes of Health
http://obssr.od.nih.gov/about_obssr/staff/patricia_mabry_bio.aspx
Ed Wegman, Ph.D.
Co-Chair
Professor of Information Technology and Applied Statistics
Chair, Data Sciences Program, School of Computational Sciences
Director of the Center for Computational Statistics
George Mason University
http://www.galaxy.gmu.edu/stats/faculty/wegman.html
Yasmin Said, Ph.D.
Co-Chair
Ruth L. Kirschstein National Fellow
Co-Director of the Center for Computational Data Sciences
George Mason University
SBP10 Program Committee Chairs
Sun-Ki Chai, Ph.D.
Department of Sociology
University of Hawaii at Manoa
Honolulu, HI
http://www2.hawaii.edu/~sunki/
John Salerno, Ph.D.
AFRL/RIEA
Air Force Research Laboratory
Rome, NY
SBP Steering Committee
This committee selects conference chairs and assures consistency and quality of the conference across years.
Huan Liu, Ph.D.
Chair
Professor, Computer Science and Engineering
Arizona State University,
Tempe, AZ
http://www.public.asu.edu/~huanliu/
John Salerno, Ph.D.
Chair
Principal Computer Engineer
Air Force Research Laboratory
Rome, NY
Sun-Ki Chai, Ph.D.
Associate Professor, Department of Sociology
University of Hawaii at Manoa
Honolulu, HI
http://www2.hawaii.edu/~sunki/
SBP Advisory Committee
Rebecca Goolsby, Ph.D.
Office of Naval Research
Terrance Lyons, Ph.D.
Air Force Office of Scientific Research
Patricia L. Mabry, Ph.D.
Office of Behavioral and Social Sciences Research
National Institutes of Health
For Further Information about SBP10
Additional information will be posted to the conference website http://sbp.asu.edu as it becomes available.
-------- Original-Nachricht --------
Betreff: [isworld] Latest edition of IRMJ, V. 22, N. 4
Datum: Fri, 9 Oct 2009 09:59:34 -0400
Von: Edward J. Szewczak <szewczak(a)canisius.edu>
Antwort an: Edward J. Szewczak <szewczak(a)canisius.edu>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
The contents of the latest issue of:
Information Resources Management Journal (IRMJ)
Official Publication of the Information Resources Management Association
Volume 22, Issue 4, October-December 2009
Published: Quarterly in Print and Electronically
ISSN: 1040-1628; EISSN: 1533-7979
Published by IGI Publishing, Hershey-New York, USA
www.igi-global.com/irmj
PAPER ONE
A Technology Commitment Model of Post-Adoption Behavior
Y. Ken Wang, University of Pittsburgh at Bradford, USA
Pratim Datta, Kent State University, USA
Every year, individuals and organizations end up adopting (licensing) many
competing software products. Yet, over time, much of the adopted software
remains unused because users forgo the use of one software product for
another adopted alternative. Although much research in the IS field has
examined initial IS adoption, less is known about such post-adoption
behavior. This article argues that a sense of �technology commitment� to
one technology over other adopted alternatives is key to sustained
post-adoption use intentions. By forwarding a technology commitment model,
this article investigates the antecedents of technology commitment and its
consequent effects on IS continuance. In the model, the article also
examines how technological inertia moderates IS continuance intentions.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34693
PAPER TWO
An Empirical Assessment of Technology Adoption as a Choice between
Alternatives
Ernst Bekkering, Northeastern State University, USA
Allen C. Johnston, University of Alabama Birmingham, USA
Merrill Warkentin, Mississippi State University, USA
Mark B. Schmidt, St. Cloud State University, USA
Technology adoption by individuals has traditionally been regarded by
information systems researchers as a choice between adoption and
non-adoption of a single technology. With the current diversity of
technology alternatives, the adoption decision may be more accurately
specified as a choice between competing alternative technologies. The
research question may no longer be simply whether technology is adopted,
but rather which technology is adopted. The authors illustrate this with a
simplified model of choice between two competing technologies, where the
second technology is an enhanced version of the first. The authors�
theoretical model is based on expectancy theory (ET).
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34694
PAPER THREE
Mandatory Usage of Mobile IS by Unsophisticated Users: Welfare and
Compatibility with Work
Yong-Young Kim, Temple University, USA
Hee-Dong Yang, Ewha Womans University, Korea
JoongHo Ahn, Seoul National University, Korea
This study investigates the factors that influence the user�s (postal
workers�) welfare in using personal digital assistants (PDAs) that were
implemented by mandate in the Korea Postal Services (KPS). The authors
propose to expand perspective towards users� welfare that becomes
vulnerable when information systems (IS) are implemented by mandate and
suggest user satisfaction with IS as the appropriate measure of success.
The authors are especially interested in the mandatory introduction and
implementation of IS in organizations where users of such information
systems are unsophisticated with limited educational background or IS
experience and whose job is relatively simple and labor-intensive.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34695
PAPER FOUR
>From Tough Negotiation to Complex Integration: Implications of Adversarial
and Collaborative Relationships on Electronic Procurement Systems
Tadhg Nagle, National University of Ireland, Galway, Ireland
Patrick Finnegan, University College Cork, Ireland
Jeremy Hayes, University College Cork, Ireland
For many organizations e-procurement has become a necessity. Nevertheless,
while e-procurement has generated considerable hype, the phenomenon is
generally under-researched despite the fundamental impact that
e-Procurement has on the nature of inter-organizational relationships.
This paper explores the effects that business-to-business relationships
have on e-procurement systems, using a field study of six companies. The
study classifies business-to-business (B2B) relationships as being
adversarial and collaborative, and the authors examine the effects of both
relationships on the electronically supported transaction phases of the
procurement lifecycle.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34696
****************************************************
For full copies of the above articles, check for this issue of the
Information Resources Management Journal (IRMJ) in your institution's
library. This journal is also included in the IGI Global aggregated
�InfoSci-Journals� database: www.infosci-journals.com.
*****************************************************
CALL FOR PAPERS
Mission of IRMJ:
The primary mission of Information Resources Management Journal (IRMJ) is
to be instrumental in the improvement and development of the theory and
practice of information resources management, appealing to both practicing
managers and academics. Also, it educates organizations on how they may
benefit from their information resources and discusses the tools utilized
to gather, process, disseminate, and manage these valuable resources. The
journal publishes original material concerned with all aspects of
information resources management, managerial and organizational
applications, as well as implications of information technology.
Coverage of IRMJ:
Topics should be drawn from, but not limited to, the following areas, with
major emphasis on the managerial and organizational aspects of information
resource and technology management:
Application of IT to operation
Artificial intelligence and expert systems technologies and issues
Distance learning technologies and issues
Distributed software development
E-collaboration
Electronic commerce technologies and issues
Electronic government
Emerging technologies management
End user computing issues
Enterprise resource planning
Executive information systems
IT outsourcing
IT/E-business in small businesses
Knowledge management
MIS re-engineering management
Mobile commerce
Multimedia computing technologies and issues
Object oriented technologies and issues
Systems development and CASE
Telecommunications and networking technologies
Virtual organizations
Virtual teams
Web services and technologies
Interested authors should consult the journal's manuscript submission
guidelines at http://www.igi-global.com/irmj
All inquiries and submissions should be sent to irmj(a)igi-global.com.
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] International Journal of Healthcare Information
Systems and Informatics (IJHISI) - Volume 4(4)
Datum: Fri, 9 Oct 2009 03:22:12 -0400
Von: Patrick C. K. Hung <patrick.hung(a)uoit.ca>
Antwort an: Patrick C. K. Hung <patrick.hung(a)uoit.ca>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
International Journal of Healthcare Information Systems and Informatics
(IJHISI)
Official Publication of the Information Resources Management Association
Volume 4, Issue 4, October-December 2009
Published: Quarterly in Print and Electronically
ISSN: 1555-3396; EISSN: 1555-340X
Published by IGI Publishing, Hershey-New York, USA
www.igi-global.com/ijhisi
Editor-in-Chief: Joseph Tan, Wayne State University, USA
PAPER ONE
Internet as a Source of Health Information and its Perceived Influence on
Personal Empowerment
Guy Paré, HEC Montréal, Canada
Jean-Nicolas Malek, HEC Montréal, Canada
Claude Sicotte, University of Montreal, Canada
Marc Lemire, University of Montreal, Canada
The primary aim of this study is twofold. The authors identify the factors
that influence members of the general public to conduct Internet searches
for health information and explore the influence such Internet use has on
three types of personal empowerment. In the summer of 2007 the authors
conducted a household sample survey of a population of Canadian adults. A
total of 261 self-administered questionnaires are returned to the
researchers. This study is one of the first to relate Internet use to
various forms of personal empowerment.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=35000
PAPER TWO
A Classification Analysis of the Success of Open Source Health Information
Technology Projects
Evangelos Katsamakas, Fordham University, USA
Balaji Janamanchi, Texas A&M International University, USA
Wullianallur Raghupathi, Fordham University, USA
Wei Gao, Fordham University, USA
As the number of open source software (OSS) projects in healthcare grows
rapidly, researchers are faced with the challenge of understanding and
explaining the success of the open source phenomenon. This article
proposes a research framework that examines the roles of project
sponsorship, license type, development status, and technological
complements in the success of open source health information technology
(HIT) projects and develops a systematic method for classifying projects
based on their success potential. The authors discuss application
implications and future research directions.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=35001
PAPER THREE
An Exploratory Study of Patient Acceptance of Walk-In Telemedicine
Services for Minor Conditions
Christina I. Serrano, University of Georgia, USA
Elena Karahanna, University of Georgia, USA
Though healthcare costs continue to soar, the healthcare industry lags
other service industries in applying information technology to improve
customer (i.e. patient) service, improve access to healthcare services,
and reduce costs. One particular area of concern is overuse and
overcrowding of emergency departments for nonurgent care. Telemedicine is
one potentially important application of information technology in this
realm. This study examines the antecedents of patient acceptance of
walk-in telemedicine services for minor ailments. Drawing upon theoretical
models in the healthcare and technology acceptance literatures and based
on salient beliefs elicited during interviews with twenty-nine potential
adopters, the authors develop a conceptual model of antecedents of patient
acceptance of walk-in telemedicine services for minor conditions. The
authors discuss the study�s implications for research and practice, as
well as offer suggestions for future empirical studies.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=35002
PAPER FOUR
Information Technology Prescription for Small, Medium, and Large
Hospitals: An Exploratory study of Acute Care Hospitals in Texas
Stacy Bourgeois, University of North Carolina, Wilmington, USA
Edmund Prater, University of Texas at Arlington, USA
Craig Slinkman, University of Texas at Arlington, USA
Hospitals invest in information technology to lower costs and to improve
quality of care; however, it is unclear whether these expectations for
information technology are being met. This study explores information
technology (IT) in a hospital environment and investigates its
relationship to mortality, patient safety, and financial performance
across small, medium, and large hospitals. Breaking down IT into
functional, technical, and integration components permits the assessment
of different types of technologies� impact on financial and operational
outcomes.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=35003
PAPER FIVE
Space-Time Cluster Analysis: Application of Healthcare Service Data in
Epidemiological Studies
Joseph M. Woodside, Cleveland State University, USA
Iftikhar U. Sikder, Cleveland State University, USA
Spatial epidemiological approach to healthcare studies provides
significant insight in evaluating health intervention and decision making.
This article illustrates a space-time cluster analysis using Kulldorff�s
Scan Statistics (1999), local indicators of spatial autocorrelation, and
local G-statistics involving routine clinical service data as part of a
limited data set collected by a Northeast Ohio healthcare organization
(Kaiser Foundation Health Plan of Ohio) over a period 1994�2006. The
objective is to find excess space and space - time variations of lung
cancer and to identify potential monitoring and healthcare management
capabilities. The authors compare the results with earlier research
(Tyczynski, & Berkel, 2005).
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=35004
*****************************************************
For full copies of the above articles, check for this issue of the
International Journal of Health Information Systems and Informatics
(IJHISI) in your institution's library. This journal is also included in
the IGI Global aggregated �InfoSci-Journals� database:
www.infosci-journals.com.
*****************************************************
CALL FOR PAPERS
Mission of IJHISI:
The mission of the International Journal of Healthcare Information Systems
and Informatics (IJHISI) is to be a prime source for both academic
researchers and practitioners to advance the knowledge and practice in the
interdisciplinary areas of health care information technology and
management research. IJHISI addresses the innovative concepts and
critical issues in the emerging field of health information systems and
informatics.
Coverage of IJHISI:
This journal spans a wide scope of applications and issues surrounding the
organization, classification, evaluation, and adoption of advanced
information and communication technology in topics that include (but are
not limited to) the following:
Clinical decision support design, development, and implementation
E-health
Healthcare
Impact of HISI on public and social policy
IT applications and measurements in health organizations and practices
IT security and privacy issues
Management of emerging healthcare technologies
Medical informatics
M-health
Role of informatics specialists
Telemedicine
Virtual health technologies
Interested authors should consult the journal's manuscript submission
guidelines at www.igi-global.com/ijhisi
All inquiries and submissions should be sent to:
Editor-in-Chief: Joseph Tan at an9188(a)wayne.edu
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] International Journal of Technology and Human
Interaction 5(4), TOC
Datum: Fri, 9 Oct 2009 08:13:15 +0100
Von: Bernd Carsten Stahl <bstahl(a)dmu.ac.uk>
Antwort an: Bernd Carsten Stahl <bstahl(a)dmu.ac.uk>
Organisation: DMU
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
CC: <COMPUTER-ETHICS(a)JISCMAIL.AC.UK>, <UKAIS-NOTICES(a)JISCMAIL.AC.UK>
The contents of the latest issue of:
International Journal of Technology and Human Interaction (IJTHI)
Official Publication of the Information Resources Management Association
Volume 5, Issue 4, October-December 2009
Published: Quarterly in Print and Electronically
ISSN: 1548-3908 EISSN: 1548-3916
Published by IGI Publishing, Hershey-New York, USA
www.igi-global.com/ijthi
Editor-in-Chief: Bernd Carsten Stahl, DeMontfort University, UK
PAPER ONE
Counter-Surveillance Strategies Adopted By Child Pornographers
Marie Eneman, University of Gothenburg, Sweden
On one side, it is argued that ICTs provide a perceived anonymity for people
downloading and distributing child abusive material, also labelled child
pornography. While, on the other side the technology offers powerful
surveillance mechanisms to monitor these activities and thus constitutes a
powerful tool for law enforcement. This article explores how offenders
manage the risk of surveillance when downloading, distributing, and
exchanging child abusive material. Critical research with a focus on
panopticon is used as a theoretical framework, and the data is drawn from
interviews with offenders, convicted of child pornography. The ultimate
motivation for researching this topic is to contribute to the development of
effective child protection strategies.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34981
PAPER TWO
A Multi-Facet Analysis of Factors Affecting the Adoption of Multimedia
Messaging Service (MMS)
Judy Chuan-Chuan Lin, Soochow University, China
Chin-Lung Hsu, Da-Yeh University, China
Mobile applications such as multimedia messaging service (MMS) promises a
new way to share rich content of information that enhances its users
personal connectivity experiences as well as productivity; however, the
adoption of MMS seems to be unexpectedly slow (Bonte, 2008). As mobile
phones become ever smarter (or complex) in functions, understanding the
adoption behaviors of complex mobile services such as MMS becomes utterly
important to both practitioners and academic. This paper introduces a
multi-facet model for MMS adoption by integrating the well-known behavioral
models such as TAM and TPB with other factors including intrinsic
motivation, personal innovativeness and critical mass.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34982
PAPER THREE
Usability in the Context of e-Learning: A Framework Augmenting Traditional
Usability Constructs with Instructional Design and Motivation to Learn
Panagiotis Zaharias, Consultant, Greece
The issue of e-learning quality remains prominent on end users (the
learners) agenda. It is no surprise that many non-motivated adult learners
abandon prematurely their e-learning experiences. This is attributed in a
great extent to the poor design and usability of e-learning applications.
This paper proposes a usability framework that addresses the user as a
learner and extends the current e-learning usability practice by focusing on
the affective dimension of learning, a frequently neglected issue in
e-learning developments. Usability and instructional design constructs as
well as Kellers ARCS Model are employed within the framework proposed in
this work upon, which new usability evaluation methods are based. This
framework integrates Web usability and instructional design parameters, and
the author proposes motivation to learn as a new type of usability dimension
in designing and evaluating e-learning applications.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34983
PAPER FOUR
The Benefits of (Automated) Dialogue
Robert Hurling, Unilever Research, UK
Marco De Boni, Unilever Research, UK
Alannah Richardson, Unilever Research, UK
In this article, the authors compare user evaluation of a text based
dialogue system with a simple pick list for the same task. The authors match
the systems in terms of key factors, such as design for usability and take
into account individual differences between participants that influenced
perception, such as locus of control, experience, and personality.
Participants ratings are dependent on their personality, locus of control,
and level of physical activity. This study also demonstrates the benefits of
including automated dialogue in a system designed to help people find
solutions for their exercise barriers.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34984
PAPER FIVE
In-Vehicle Avatars to Elicit Social Response and Change Driving Behaviour
Andry Rakotonirainy, QUT CARRS-Q, Australia
Frank Feller, QUT CARRS-Q, Australia
Narelle Haworth, QUT CARRS-Q, Australia
Social and psychological theories have provided a plethora of evidence
showing that the physical difficulty to express appropriate social
interactions between drivers expresses itself in aggression, selfish driving
and anti-social behavior. Therefore there is a need to improve interactions
between drivers and allow clearer collective decision making between them.
Personal characteristics and the driving situations play strong roles in
drivers aggression. The authors approach is centered around the driving
situation as opposed to focusing on personality characteristics. This
article examines aggression and manipulates contextual variables such as
drivers eye contact exchanges. The authors present a new unobtrusive
in-vehicle system that aims at communicating drivers intentions, elicit
social responses and increasing mutual awareness. In addition, the authors
use a driving simulator to design a case control experiment in which eye
gaze movements are conveyed with an avatar. Participants are asked to drive
through different types of intersections. An avatar representing the head of
the other driver is displayed, and the authors analyze driver behavior.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34985
******************************************************************
For full copies of the above articles, check for this issue of the
International Journal of Technology and Human Interaction (IJTHI) in your
institution's library. This journal is also included in the IGI Global
aggregated "InfoSci-Journals" database: <www.infosci-journals.com>.
******************************************************************
CALL FOR PAPERS
Mission of IJTHI:
The International Journal of Technology and Human Interaction (IJTHI)
provides a platform for leading research that addresses issues of human and
technology interaction. The research that the journal intends to publish
should therefore be interdisciplinary and include aspects from a wide
variety of disciplines. These disciplines range from more technical ones
such as computer science, engineering, or information systems to
non-technical descriptions of technology and human interaction from the
point of view of sociology or philosophy. Apart from aiming to be
interdisciplinary the journal will also aspire to provide a publication
outlet for research questions and approaches that are novel and may find it
difficult to be published in established journals following a rigid and
exclusive structure. It is open to all research paradigms, be they empirical
or conceptual, but requires that they be accessible and reflected. We also
encourage the submission of high quality syntheses across research in
different specialties that are interesting and comprehensible to all members
of the IS community and related disciplines.
Coverage of IJTHI:
Possible topics include (but are not limited to):
Anthropological consequences of technology use
Ethical aspects of particular technologies (e.g. e-teaching, ERP, etc.)
Experiential learning though the use of technology in organizations
HCI design for trust development
Influence of gender on the adoption and use of technology
Interaction and conversion between technologies and their impact on society
Intersection of humanities and sciences and its impact on technology use
Normative questions of the development and use of technology
Perceptions and conceptualizations of technology
Phenomenology of e-government
Philosophy of technology
Questions of computer or information ethics
Relationship of theory and practice with regards to technology
Responsibility of artificial agents
Shaping of e-commerce through law and culture
Social impact of specific technologies (e.g. biometrics, SCM, PGP, etc.)
Social shaping of technology and human interaction research
Technological risks and their human basis
Technology assessment of software / hardware development
Value of intellectual capital in knowledge management
and all other related issues related to the interaction of technology and
humans, either individually or socially.
Interested authors should consult the journal's manuscript submission
guidelines at www.igi-global.com/ijthi.
All inquiries and submissions should be sent to:
Editor-in-Chief: Dr. Bernd Carsten Stahl at editor(a)ijthi.net
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] Information systems faculty position at the Smith
School, University of Maryland
Datum: Thu, 8 Oct 2009 11:42:38 -0400
Von: Henry C. Lucas, Jr. <hlucas(a)rhsmith.umd.edu>
Antwort an: Henry C. Lucas, Jr. <hlucas(a)rhsmith.umd.edu>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
ROBERT H SMITH SCHOOL OF BUSINESS
University of Maryland
Faculty Position in Information Systems
The Decision, Operations & Information Technologies (DO&IT) Department
invites applications for a faculty position in Information Systems at
assistant/associate/full professor ranks. We are seeking candidates with
a strong commitment to high-quality research and, for candidates at the
Associate or Full Professor rank, a commensurate record of research
publications. The DO&IT faculty at the University of Maryland
(http://www.rhsmith.umd.edu/doit/) is a vibrant group actively engaged in
theoretical and applied research spanning information systems, operations
management, management science, and statistics. The Robert H. Smith
School of Business has nationally ranked MBA and undergraduate programs,
as well as a strong doctoral program.
The ideal candidate will have a PhD in Information Systems or related
fields. He/she is expected to teach information systems courses to
undergraduate, MBA and PhD students. We are interested in candidates in
all areas of research, especially those working in health care or
technology policy and management.
Applicants should send a vita, research and teaching statements, and three
letters of reference to:
IS Search Committee Chair
Department of Decision, Operations & Information Technologies
Robert H. Smith School of Business
University of Maryland, College Park, MD 20742.
Email: issearch(a)rhsmith.umd.edu
Electronic application via email is required. To assure full
consideration, complete applications should be received by November 29,
2009.
The University of Maryland, College Park, actively subscribes to a policy
of equal employment opportunity, and will not discriminate against any
employee or applicant, because of race, age, sex, color, physical or
mental handicap, national origin or political affiliation. Minorities and
women are encouraged to apply.
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
--
Univ.Prof. Dr. Gustaf Neumann
Institute of Information Systems and New Media
WU Vienna
Augasse 2-6, A-1090 Vienna, AUSTRIA
-------- Original-Nachricht --------
Betreff: [isworld] Invitation to Special Issue of Information Sciences
Datum: Thu, 8 Oct 2009 11:44:00 -0400
Von: Dariusz Krol <dariusz.krol(a)pwr.wroc.pl>
Antwort an: Dariusz Krol <dariusz.krol(a)pwr.wroc.pl>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
Dear members of AISWorld,
I am writing to invite you to submit an article to Special Issue
"Nature-Inspired Collective Intelligence in Theory and Practice" of
Information Sciences (Elsevier).
The aim of the Special Issue is to highlight an ongoing research on
different methodological and technological approaches of nature-inspired
theory and collective intelligence together with their applications on
various domains. Relevant topics include but not limited to:
� Nature-inspired methods for Bioinformatics Tools and Computational
Biology
� Intelligent Decision Making Systems
� Bio-inspired Computing Models
� Cellular and Organic Grids, Agent Colonies
� Computational Neuroscience
� Natural Team Formation
� Nature-inspired Performance Evaluation
� Self-adaptation, self-maintaining, and self-healing
� Social Collective and Swarm Intelligence
Tentative Schedule
Submission of full papers: 31 Oct 2009
First decision notification: 31 Dec 2009
Submission revised papers: 15 Feb 2010
Final decision notification: 10 June 2010
Final materials to Elsevier: 30 June 2010
Estimated publication date: Second half of 2010
Submission Instructions
All papers will be rigorously refereed by 2 peer reviewers of the Journal.
Submission of a manuscript to this special issue implies that no similar
paper is already accepted or will be submitted to any other conference or
journal. Authors should consult the "Guide for Authors", which is
available online at
http://www.elsevier.com/wps/find/journaldescription.cws_home/505730/authori…
for information about preparation of their manuscripts. Manuscripts should
be submitted via the Elsevier Editorial System
http://ees.elsevier.com/ins/. Please choose �Special issue: NICI� when you
reach the Article Type step. First time users need register themselves as
Author.
More details you can find here:
http://www.elsevierscitech.com/pdfs/ins_cfp_nature_inspired_collective_inte…
Please do not hesitate to contact me if you have any queries. I look
forward to receiving your positive response
Best regards
Dariusz Król
Guest Editor
Wroclaw University of Technology, Poland
http://www.ii.pwr.wroc.pl/~krol/eng_index.html
________________________________________
Dariusz Krol, Ph.D.
Assistant Professor
Institute of Informatics
Wroclaw University of Technology, Poland
http://www.ii.pwr.wroc.pl/~krol/eng_index.html
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
--
Univ.Prof. Dr. Gustaf Neumann
Institute of Information Systems and New Media
WU Vienna
Augasse 2-6, A-1090 Vienna, AUSTRIA