|
Tutorial:
Applications of Wireless Sensor Networks
John McEachen, Murali Tummala,
Weilan Siu, and Edoardo Biagioni
|
Workshop:
Persistent Conversation
Tom Erickson and Susan Herring
|
Tutorial:
Information Policy in Academia: What the College Professor
Needs to Know about Security, Privacy and Fair Use
Timothy Ellis and William Hafner
|
Tutorial:
Theories in Collaboration
Robert Briggs, Gwen Koflschoten and
Gert-Jan deVreede
|
Workshop: ERP Simulation Game Teaching and Research
Perspectives
Pierre-Majorique
Léger, Jacques Robert, Gilbert Babin, Timothy Paul Cronan, and David Douglas
|
|
|
|
|
|
Tutorial: Complex Adaptive Systems: Emergence, Self-Organization, Tools, Analysis and Case Studies
Stephen Kaisler and Gregy Madey
|
Tutorial:
Computational Logistics
Stefan Voss and Hans-Jeurgen
Sebastian
|
Tutorial: Computer Forensics Hardware and Software: Processing Hard
Drives, CDs, and Cell Phones
Gary Kessler
|
Symposium: Global Electronic Government Research and Practice Community
Valerie Gregg, Tomasz Janowski,
Marijn Janssen, Bjorn Niehaves, Scott Robertson, and Jochen Scholl
|
Workshop: Creating and Improving on a National Support Structure for
Information Assurance Education
Brian Gouker and Christine Nickell
|
Workshop:
Spreadsheets: The Dark Matter of IT
Ray Panko and Dan Port
|
Workshop: Trust
and Dependability
Phil Laplanta, Jeffrey Voas, and
Bret Michael
|
Symposium: Cyberinfrastructure for Public Health and Health Services:
Research and-Funding Directions
Thomas Horan, Bradford Hesse, and
William Chismar
|
Workshop: Rapid
Screening Technologies
Jay Nunamaker, Judee Burgoon,
Thomas Meservy, and Matthew Jensen
|