HICSS-42

HICSS-41 Highlights

Program

* Keynote Address
* Distinguished Lecture
* Tracks and Minitracks
* Symposia, Workshops,
and Tutorials

* SWT Guidelines

Call for Papers

Author Instructions
     Presentation Guidelines

Minitrack Chair Review Instructions
    Guidelines for Paper   
    Sessions
 Responsibilities

Accommodation and Travel Arrangements

Registration

Contact

Return to HICSS Homepage

 

 




Symposia, Workshops, and Tutorials **
Monday, January 5, 2009

[SWT Matrix]

Morning Sessions
Workshop Persistent Conversation
Tom Erickson and Susan Herring
  ERP Simulation Game Teaching and Research Perspectives
Pierre-Majorique Léger, Jacques Robert, Gilbert Babin, Timothy, Paul Cronan, and David Douglas
Tutorial

Applications of Wireless Sensor Networks
John McEachen, Murali Tummala, Weilian Su, and Edoardo Biagioni

  Information Policy in Academia: What the College Professor Needs to Know about Security, Privacy and Fair Use
Timothy Ellis and William Hafner
Theories in Collaboration
Robert Briggs, Gwen Koflschoten and Gert-Jan deVreede
Afternoon Sessions
Symposium
Service-Dominant Logic and The Market as a Service System
Steve Vargo and Robert Lusch
  Social Network Analysis
Jeffrey Nickerson and Kalle J. Lyytinen
Tutorial
Methods for Theory-Building in the Study of Information Technology Use  [Cancelled]
Lori Kendall and Elizabeth Churchill
  Tablet PCs in Higher Education and Research
Joe Tront and Jane Prey
Full-Day Sessions
Symposium
Global Electronic Government Research and Practice Community
Valerie Gregg, Tomasz Janowski, Marijn Janssen, Bjorn Niehaves, Scott Robertson, and Jochen Scholl
  Cyberinfrastructure for Public Health and Health Services: Research and-Funding Directions
Thomas Horan, Bradford Hesse, and William Chismar
Workshop
Creating and Improving on a National Support Structure for Information Assurance Education
Brian Gouker and Christine Nickell
  Spreadsheets: The Dark Matter of Corporate It
Ray Panko and Dan Port
  Trust and Dependability    [Program]
Phil Laplante, Jeffrey Voas, and Bret Michael
  Rapid Screening Technologies [Program]
Jay Nunamaker, Judee Burgoon, Thomas Meservy, and Matthew Jensen
Tutorial
Complex Adaptive Systems: Emergence, Self-Organization, Tools, Analysis and Case Studies
Stephen Kaisler and Gregy Madey
  Computational Logistics
Stefan Voss and Hans-Jeurgen Sebastian
  Computer Forensics Hardware and Software: Processing Hard Drives, CDs, and Cell Phones
Gary Kessler

Full-day Symposium (Tuesday):
Credibility Assessment and Information Quality in Government and Business [Program]
Jay Nunamaker, Judee Burgoon, Thomas Meservy, and Matthew Jensen.

Half-day Symposium (Tuesday):
The Business Model of Product and Process Assurance
Jairus Hihn, Tim Menzies, Yuko Miyamoto, Haruka Nakao, Dan Port.
 

Morning sessions are from 9am – 12 noon, and afternoon sessions are from 1pm – 4pm. Lunch on Monday is “on your own” between 12 noon and 1:00pm. Please be prompt for the afternoon sessions. Small group discussion is encouraged. A box-lunch will be available for pre-ordering. There are several restaurants on site, within walking distance or tram ride from the conference area of the hotel.

**Papers and reports that result from Symposia and Workshops may be published on the Conference reports webpage.
See http://www.hicss.hawaii.edu/Reports.htm