|
|
Symposia, Workshops, and Tutorials **
Monday, January 5, 2009
[SWT Matrix]
Morning Sessions |
| Workshop |
Persistent Conversation
Tom Erickson and Susan Herring |
| |
ERP Simulation Game Teaching and Research Perspectives
Pierre-Majorique Léger, Jacques Robert, Gilbert Babin, Timothy, Paul Cronan, and David Douglas |
Tutorial |
Applications of Wireless Sensor Networks
John McEachen, Murali Tummala,
Weilian Su, and Edoardo Biagioni |
| |
Information Policy in Academia: What the College Professor Needs to Know about Security, Privacy and Fair Use
Timothy Ellis and William Hafner |
|
Theories in Collaboration
Robert Briggs, Gwen Koflschoten and Gert-Jan deVreede |
Afternoon Sessions |
Symposium |
Service-Dominant Logic and The Market as a Service System
Steve Vargo and Robert Lusch |
| |
Social Network Analysis
Jeffrey Nickerson and Kalle J. Lyytinen |
Tutorial |
Methods for Theory-Building in the Study of Information Technology Use
[Cancelled]
Lori Kendall and Elizabeth Churchill |
| |
Tablet PCs in Higher Education and Research
Joe Tront and Jane Prey |
Full-Day Sessions |
Symposium |
Global Electronic Government Research and Practice Community
Valerie Gregg, Tomasz Janowski, Marijn Janssen, Bjorn Niehaves, Scott Robertson, and Jochen Scholl |
| |
Cyberinfrastructure for Public Health and Health Services: Research and-Funding Directions
Thomas Horan, Bradford Hesse, and William Chismar |
Workshop |
Creating and Improving on a National Support Structure for Information Assurance Education
Brian Gouker and Christine Nickell |
| |
Spreadsheets: The Dark Matter of Corporate It
Ray Panko and Dan Port |
| |
Trust and Dependability
[Program]
Phil Laplante, Jeffrey Voas, and Bret Michael |
| |
Rapid Screening Technologies
[Program]
Jay Nunamaker, Judee Burgoon, Thomas Meservy, and Matthew Jensen |
Tutorial |
Complex Adaptive Systems: Emergence, Self-Organization, Tools, Analysis and Case Studies
Stephen Kaisler and Gregy Madey |
| |
Computational Logistics
Stefan Voss and Hans-Jeurgen Sebastian |
| |
Computer Forensics Hardware and Software: Processing Hard Drives, CDs, and Cell Phones
Gary Kessler |
Full-day Symposium
(Tuesday):
Credibility Assessment and Information Quality in Government and Business
[Program]
Jay Nunamaker, Judee Burgoon, Thomas Meservy, and Matthew Jensen.
Half-day Symposium
(Tuesday):
The Business Model of Product and Process Assurance
Jairus Hihn, Tim Menzies, Yuko Miyamoto, Haruka Nakao, Dan Port.
Morning sessions are from 9am – 12 noon, and afternoon sessions are
from 1pm – 4pm. Lunch on Monday is “on your own” between 12 noon and
1:00pm. Please be prompt for the afternoon sessions. Small group
discussion is encouraged. A box-lunch will be available for
pre-ordering. There are several restaurants on site, within walking
distance or tram ride from the conference area of the hotel.
**Papers and reports that result from Symposia and Workshops may be published on the Conference reports webpage.
See http://www.hicss.hawaii.edu/Reports.htm
|