-
1
-
-
70449695856
-
Communicating Across State and County Lines: The Piedmont Regional Voice over Internet Protocol Project
-
Retrieved February 22, 2009, from
-
Bulman, P. (2008). Communicating Across State and County Lines: The Piedmont Regional Voice over Internet Protocol Project. NIJ Journal, 261. Retrieved February 22, 2009, from http://www.ojp.usdoj.gov/nij/journals/261/ piedmont-voip.htm.
-
(2008)
NIJ Journal
, vol.261
-
-
Bulman, P.1
-
2
-
-
70449689920
-
-
Bureau of Justice Statistics Law Enforcement Statistics, August 8, Retrieved May 9, 2008, from
-
Bureau of Justice Statistics Law Enforcement Statistics. (2007, August 8). . Retrieved May 9, 2008, from http://www.ojp.usdoj.gov/bjs/lawenf.htm.
-
(2007)
-
-
-
3
-
-
70449678057
-
-
Carter, D. L., & United States. (2004). Law Enforcement Intelligence a Guide for State, Local, and Tribal Law Enforcement Agencies. Washington, D.C.: U.S. Dept. of Justice, Office of Community Oriented Policing Services.
-
Carter, D. L., & United States. (2004). Law Enforcement Intelligence a Guide for State, Local, and Tribal Law Enforcement Agencies. Washington, D.C.: U.S. Dept. of Justice, Office of Community Oriented Policing Services.
-
-
-
-
5
-
-
34548411714
-
Evaluating the boundary conditions of the technology acceptance model: An exploratory investigation
-
doi: 10.1145/1275511.1275515
-
Chan, H. C., & Teo, H. (2007). Evaluating the boundary conditions of the technology acceptance model: An exploratory investigation. ACM Trans. Comput.-Hum. Interact., 14(2), 9. doi: 10.1145/1275511.1275515.
-
(2007)
ACM Trans. Comput.-Hum. Interact
, vol.14
, Issue.2
, pp. 9
-
-
Chan, H.C.1
Teo, H.2
-
6
-
-
85150771046
-
-
National Science Foundation. Retrieved February 4, 2008, from
-
Chau, M., Atababhsh, H., Zeng, D., & Chen, H. (2002). Building an Infrastructure for Law Enforcement Information Sharing and Collaboration: Design Issues and Challenges. National Science Foundation. Retrieved February 4, 2008, from http://dlist.sir.arizona.edu/473/01/chau4.pdf.
-
(2002)
Building an Infrastructure for Law Enforcement Information Sharing and Collaboration: Design Issues and Challenges
-
-
Chau, M.1
Atababhsh, H.2
Zeng, D.3
Chen, H.4
-
7
-
-
0442298972
-
COPLINK: Managing law enforcement data and knowledge
-
Chen, H., Zeng, D., Atabakhsh, H., Wyzga, W., & Schroeder, J. (2003). COPLINK: managing law enforcement data and knowledge. Communications of the ACM, 46(1), 28-34.
-
(2003)
Communications of the ACM
, vol.46
, Issue.1
, pp. 28-34
-
-
Chen, H.1
Zeng, D.2
Atabakhsh, H.3
Wyzga, W.4
Schroeder, J.5
-
8
-
-
70449680126
-
-
Clark, J. (2008, September 18). Remarks by Director John Clark at the Operation Orange Crush Press Conference. USMarshals.gov. Government Agency. Retrieved November 27, 2008, from http://www.usmarshals.gov/news/chron/2008/ 091808.htm.
-
Clark, J. (2008, September 18). Remarks by Director John Clark at the Operation Orange Crush Press Conference. USMarshals.gov. Government Agency. Retrieved November 27, 2008, from http://www.usmarshals.gov/news/chron/2008/ 091808.htm.
-
-
-
-
9
-
-
70049083026
-
Assessing capability for justice information sharing
-
Philadelphia, Pennsylvania: Digital Government Society of North America. Retrieved September 18, 2008, from
-
Cresswell, A. M., Pardo, T. A., & Hassan, S. (2007). Assessing capability for justice information sharing. In Proceedings of the 8th annual international conference on Digital government research: bridging disciplines & domains (pp. 122-130). Philadelphia, Pennsylvania: Digital Government Society of North America. Retrieved September 18, 2008, from http://portal.acm.org/citation.cfm?id=1248460.1248479&coll=ACM&dl= ACM&CFID=3249028&CFTOKEN=78511360
-
(2007)
Proceedings of the 8th annual international conference on Digital government research: Bridging disciplines & domains
, pp. 122-130
-
-
Cresswell, A.M.1
Pardo, T.A.2
Hassan, S.3
-
10
-
-
0442322891
-
Information Sharing in and Across Government Agencies: The Role and Influence of Scientist, Politician, and Bureaucrat Subcultures
-
doi: 10.1177/0894439303259889
-
Drake, D., Steckler, N. A., & Koch, M. J. (2004). Information Sharing in and Across Government Agencies: The Role and Influence of Scientist, Politician, and Bureaucrat Subcultures. Social Science Computer Review, 22(1), 67-84. doi: 10.1177/0894439303259889.
-
(2004)
Social Science Computer Review
, vol.22
, Issue.1
, pp. 67-84
-
-
Drake, D.1
Steckler, N.A.2
Koch, M.J.3
-
11
-
-
70449678055
-
-
Federal Assistance from Department of Justice, FY 2008, summary. (n.d.). . Retrieved February 22, 2009, from http://www.usaspending.gov/faads/faads.php? datype=T&detail=-1&database=faads&fiscal-year=2008&maj-agency- cat=15.
-
Federal Assistance from Department of Justice, FY 2008, summary. (n.d.). . Retrieved February 22, 2009, from http://www.usaspending.gov/faads/faads.php? datype=T&detail=-1&database=faads&fiscal-year=2008&maj-agency- cat=15.
-
-
-
-
12
-
-
45149092231
-
State of standards in the information systems security area
-
August, doi:10.1016/j.csi.2008.03. 001
-
Eduardo Fernández-Medina and Mariemma I. Yagüe, "State of standards in the information systems security area," Computer Standards & Interfaces 30, no. 6 (August 2008): 339-340, doi:10.1016/j.csi.2008.03. 001.
-
(2008)
Computer Standards & Interfaces
, vol.30
, Issue.6
, pp. 339-340
-
-
Fernández-Medina, E.1
Yagüe, M.I.2
-
14
-
-
34248672574
-
Occupational culture as determinant of knowledge sharing and performance in police investigations
-
doi: 10.1016/j.ijsl.2007.03.003
-
Glomseth, R., Gottschalk, P., & Solli-Saether, H. (2007). Occupational culture as determinant of knowledge sharing and performance in police investigations. International Journal of the Sociology of Law, 35(2), 96-107. doi: 10.1016/j.ijsl.2007.03.003.
-
(2007)
International Journal of the Sociology of Law
, vol.35
, Issue.2
, pp. 96-107
-
-
Glomseth, R.1
Gottschalk, P.2
Solli-Saether, H.3
-
15
-
-
33744776618
-
Kinship in the Shadow of the Corporation: The Interbuilder Network in Clyde River Shipbuilding, 17111990
-
Ingram, P., & Lifschitz, A. (2006). Kinship in the Shadow of the Corporation: The Interbuilder Network in Clyde River Shipbuilding, 17111990. American Sociological Review, 71, 334-352.
-
(2006)
American Sociological Review
, vol.71
, pp. 334-352
-
-
Ingram, P.1
Lifschitz, A.2
-
16
-
-
70449678056
-
-
ISAC White Paper. (2004). Vetting and trust for communication among ISACs and government entities. Retrieved October 23, 2008, from http://www. isaccouncil.org/pub/Vetting-and-Trust-013104.pdf.
-
ISAC White Paper. (2004). Vetting and trust for communication among ISACs and government entities. Retrieved October 23, 2008, from http://www. isaccouncil.org/pub/Vetting-and-Trust-013104.pdf.
-
-
-
-
17
-
-
34247661091
-
The Bosnian Police and Police Integrity: A Continuing Story
-
doi: 10.1177/1477370805056057
-
Ivkovic, S. K., & Shelley, T. O. (2005). The Bosnian Police and Police Integrity: A Continuing Story. European Journal of Criminology, 2(4), 428-464. doi: 10.1177/1477370805056057.
-
(2005)
European Journal of Criminology
, vol.2
, Issue.4
, pp. 428-464
-
-
Ivkovic, S.K.1
Shelley, T.O.2
-
18
-
-
70449678054
-
A case study of G2G information sharing in the Chinese context
-
Philadelphia, Pennsylvania: Digital Government Society of North America. Retrieved September 18, 2008, from
-
Jing, F., & Pengzhu, Z. (2007). A case study of G2G information sharing in the Chinese context. In Proceedings of the 8th annual international conference on Digital government research: bridging disciplines & domains (pp. 234-235). Philadelphia, Pennsylvania: Digital Government Society of North America. Retrieved September 18, 2008, from http://portal.acm.org/citation.cfm? id=1248460.1248496&coll=ACM&dl=ACM&CFID=3249028&CFTOKEN=78511360
-
(2007)
Proceedings of the 8th annual international conference on Digital government research: Bridging disciplines & domains
, pp. 234-235
-
-
Jing, F.1
Pengzhu, Z.2
-
19
-
-
33746575004
-
A generalized model for network survivability
-
Atlanta, Georgia, USA: ACM. doi: 10.1145/948542.948552
-
Koroma, J., Li, W., & Kazakos, D. (2003). A generalized model for network survivability. In Proceedings of the 2003 conference on Diversity in computing (pp. 47-51). Atlanta, Georgia, USA: ACM. doi: 10.1145/948542.948552.
-
(2003)
Proceedings of the 2003 conference on Diversity in computing
, pp. 47-51
-
-
Koroma, J.1
Li, W.2
Kazakos, D.3
-
20
-
-
0348042908
-
The development of initial trust in an online company by new customers
-
Koufaris, M., & Hampton-Sosa, W. (2004). The development of initial trust in an online company by new customers. Inf. Manage., 41(3), 377-397.
-
(2004)
Inf. Manage
, vol.41
, Issue.3
, pp. 377-397
-
-
Koufaris, M.1
Hampton-Sosa, W.2
-
21
-
-
38049100294
-
-
Kulik, C. T., Bainbridge, H. T. J., & Cregan, C. (2008). KNOWN BY THE COMPANY WE KEEP: STIGMA-BY-ASSOCIATION EFFECTS IN THE WORKPLACE. Academy of Management Review, 33(1), 216-230. doi: Article.
-
Kulik, C. T., Bainbridge, H. T. J., & Cregan, C. (2008). KNOWN BY THE COMPANY WE KEEP: STIGMA-BY-ASSOCIATION EFFECTS IN THE WORKPLACE. Academy of Management Review, 33(1), 216-230. doi: Article.
-
-
-
-
22
-
-
0031125237
-
Exploring the research in information technology implementation
-
Lai, V. S., & Mahapatra, R. K. (1997). Exploring the research in information technology implementation. Inf. Manage., 32(4), 187-201.
-
(1997)
Inf. Manage
, vol.32
, Issue.4
, pp. 187-201
-
-
Lai, V.S.1
Mahapatra, R.K.2
-
23
-
-
68949114579
-
Business to business interoperability: A current review of XML data integration standards
-
doi:10.1016/j.csi.2008.12.006
-
Lampathaki, F., Mouzakitisa, S., Gionisa, G., Charalabidisa, Y., and Askounisa, D. (2008). "Business to business interoperability: A current review of XML data integration standards," Computer Standards & Interfaces, doi:10.1016/j.csi.2008.12.006.
-
(2008)
Computer Standards & Interfaces
-
-
Lampathaki, F.1
Mouzakitisa, S.2
Gionisa, G.3
Charalabidisa, Y.4
Askounisa, D.5
-
25
-
-
70449692916
-
Cyber crime and challenges for crime investigation in the information era. In Intelligence and Security Informatics, 2008. ISI 2008
-
doi: 10.1109/ISI.2008.4565011
-
Lee, H. (2008). Cyber crime and challenges for crime investigation in the information era. In Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on (pp. xxv-xxvi). doi: 10.1109/ISI.2008.4565011.
-
(2008)
IEEE International Conference on (pp
-
-
Lee, H.1
-
26
-
-
70449664114
-
-
Lee, J., & Rao, H. R. (2007). Exploring the causes and effects of inter-agency information sharing systems adoption in the anti/counter-terrorism and disaster management domains. In Proceedings of the 8th annual international conference on Digital government research: bridging disciplines \& domains (pp. 155-163). Philadelphia, Pennsylvania: Digital Government Research Center.
-
Lee, J., & Rao, H. R. (2007). Exploring the causes and effects of inter-agency information sharing systems adoption in the anti/counter-terrorism and disaster management domains. In Proceedings of the 8th annual international conference on Digital government research: bridging disciplines \& domains (pp. 155-163). Philadelphia, Pennsylvania: Digital Government Research Center.
-
-
-
-
27
-
-
3142738238
-
PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. Knowledge and Data Engineering
-
doi: 10.1109/TKDE.2004.1318566
-
Li Xiong, & Ling Liu. (2004). PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. Knowledge and Data Engineering, IEEE Transactions on, 16(7), 843-857. doi: 10.1109/TKDE.2004.1318566.
-
(2004)
IEEE Transactions on
, vol.16
, Issue.7
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
28
-
-
42649109355
-
Why do we trust new technology? A study of initial trust formation with organizational information systems
-
doi: 10.1016/j.jsis.2008.01.001
-
Li, X., Hess, T. J., & Valacich, J. S. (2008). Why do we trust new technology? A study of initial trust formation with organizational information systems. The Journal of Strategic Information Systems, 17(1), 39-71. doi: 10.1016/j.jsis.2008.01.001.
-
(2008)
The Journal of Strategic Information Systems
, vol.17
, Issue.1
, pp. 39-71
-
-
Li, X.1
Hess, T.J.2
Valacich, J.S.3
-
29
-
-
70449689919
-
-
Lieberman, J. (2007). Confronting the Terrorist Threat to the Homeland: Six Years After 9/11. 342 DIRKSEN SENATE OFFICE BUILDING, WASHINGTON, D.C.: Federal News Service. Retrieved May 8, 2008, from http://www.fas.org/irp/ congress/2007-hr/091007transcript.pdf.
-
Lieberman, J. (2007). Confronting the Terrorist Threat to the Homeland: Six Years After 9/11. 342 DIRKSEN SENATE OFFICE BUILDING, WASHINGTON, D.C.: Federal News Service. Retrieved May 8, 2008, from http://www.fas.org/irp/ congress/2007-hr/091007transcript.pdf.
-
-
-
-
30
-
-
70449634639
-
-
Luna-Reyes, L. F., Andersen, D. F., Richardson, G. P., Pardo, T. A., & Cresswell, A. M. (2007). Emergence of the governance structure for information integration across governmental agencies: a system dynamics approach. In Proceedings of the 8th annual international conference on Digital government research: bridging disciplines \& domains (pp. 47-56). Philadelphia, Pennsylvania: Digital Government Society of North America. Retrieved October 16, 2008, from http://portal.acm.org/citation.cfm?id=1248460. 1248468&coll=GUIDE&dl=GUIDE&type=series&idx=SERIES10714& part=series&WantType=Proceedings&title=AICPS&CFID= 6749952&CFTOKEN=77254060#.
-
Luna-Reyes, L. F., Andersen, D. F., Richardson, G. P., Pardo, T. A., & Cresswell, A. M. (2007). Emergence of the governance structure for information integration across governmental agencies: a system dynamics approach. In Proceedings of the 8th annual international conference on Digital government research: bridging disciplines \& domains (pp. 47-56). Philadelphia, Pennsylvania: Digital Government Society of North America. Retrieved October 16, 2008, from http://portal.acm.org/citation.cfm?id=1248460. 1248468&coll=GUIDE&dl=GUIDE&type=series&idx=SERIES10714& part=series&WantType=Proceedings&title=AICPS&CFID= 6749952&CFTOKEN=77254060#.
-
-
-
-
31
-
-
34247255462
-
The impact of 9/11 on organizational development among state and local law enforcement agencies
-
Marks, D. E., & Sun, I. Y. (2007). The impact of 9/11 on organizational development among state and local law enforcement agencies. Journal of Contemporary Criminal Justice, 23(2), 159-173.
-
(2007)
Journal of Contemporary Criminal Justice
, vol.23
, Issue.2
, pp. 159-173
-
-
Marks, D.E.1
Sun, I.Y.2
-
32
-
-
70449655949
-
-
Information Sharing And Terrorism Risk Assessment Committee on Homeland Security United States House of Representatives Washington, D.C, Retrieved October 18, 2008, from
-
Mckay, J. (2008). Statement of John McKay, Former United States Attorney For the Western District of Washington, Before the Subcommittee on Intelligence, Information Sharing And Terrorism Risk Assessment Committee on Homeland Security United States House of Representatives (Washington, D.C., 2008), Retrieved October 18, 2008, from http://webdev.maxwell.syr.edu/insct/Research/ IS%20Page/McKay%20Testimony.pdf.
-
(2008)
Statement of John McKay, Former United States Attorney For the Western District of Washington, Before the Subcommittee on Intelligence
-
-
Mckay, J.1
-
33
-
-
0036737236
-
Developing and Validating Trust Measures for e-Commerce: An Integrative Typology. Info. Sys. Research
-
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and Validating Trust Measures for e-Commerce: An Integrative Typology. Info. Sys. Research, 13(3), 334-359.
-
(2002)
, vol.13
, Issue.3
, pp. 334-359
-
-
McKnight, D.H.1
Choudhury, V.2
Kacmar, C.3
-
35
-
-
33750738592
-
Knowledge sharing in cross-boundary information system development in the public sector
-
doi: 10.1007/s10799-006-0278-6
-
Pardo, Cresswell, Thompson, & Zhang. (2006). Knowledge sharing in cross-boundary information system development in the public sector. Information Technology and Management, 7(4), 293-313. doi: 10.1007/s10799-006-0278-6.
-
(2006)
Information Technology and Management
, vol.7
, Issue.4
, pp. 293-313
-
-
Pardo, C.1
Thompson2
Zhang3
-
36
-
-
70449676461
-
Component survivability for mission-critical distributed systems
-
JoATC, In press
-
Park, J., Chandramohan, P., Suresh, A., & Giordano, J. (2009). Component survivability for mission-critical distributed systems. Journal of Automatic and Trusted Computing (JoATC). In press.
-
(2009)
Journal of Automatic and Trusted Computing
-
-
Park, J.1
Chandramohan, P.2
Suresh, A.3
Giordano, J.4
-
37
-
-
34047206229
-
Trusted P2P computing environments with role-based access control (RBAC)
-
Park, J., An, G., and Chandra D. (2007). Trusted P2P computing environments with role-based access control (RBAC). IET (The Institution of Engineering and Technology, formerly IEE) Information Security, 1(1):27-35.
-
(2007)
IET (The Institution of Engineering and Technology, formerly IEE) Information Security
, vol.1
, Issue.1
, pp. 27-35
-
-
Park, J.1
An, G.2
Chandra, D.3
-
38
-
-
84904250889
-
-
Park, J., Kang, M., and Froscher, J. (2001). A secure workflow system for dynamic cooperation. In Michel Dupuy and Pierre Paradinas, editors, Trusted Information: The New Decade Challenge, pages167-182. Kluwer Academic Publishers, 2001. Proceedings of the 16th IFIP TC11 International Conference on Information Security (IFIP/SEC), Paris, France, June 11-13.
-
Park, J., Kang, M., and Froscher, J. (2001). A secure workflow system for dynamic cooperation. In Michel Dupuy and Pierre Paradinas, editors, Trusted Information: The New Decade Challenge, pages167-182. Kluwer Academic Publishers, 2001. Proceedings of the 16th IFIP TC11 International Conference on Information Security (IFIP/SEC), Paris, France, June 11-13.
-
-
-
-
39
-
-
84994391858
-
Role-based access control on the Web
-
Park, J., Sandhu, R., and Ahn, G. (2001). Role-based access control on the Web. ACM Transactions on Information and System Security (TISSEC), 4(1):37-71.
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.1
, pp. 37-71
-
-
Park, J.1
Sandhu, R.2
Ahn, G.3
-
40
-
-
50249119553
-
A framework of multiple-aspect component-testing for trusted collaboration in mission-critical systems
-
Atlanta, Georgia, November 17-20. IEEE Computer Society
-
Park, J., Suresh, A., An, G., and Giordano, J. (2006). A framework of multiple-aspect component-testing for trusted collaboration in mission-critical systems. In Proceedings of the IEEE Workshop on Trusted Collaboration (TrustCol), Atlanta, Georgia, November 17-20. IEEE Computer Society.
-
(2006)
Proceedings of the IEEE Workshop on Trusted Collaboration (TrustCol)
-
-
Park, J.1
Suresh, A.2
An, G.3
Giordano, J.4
-
41
-
-
35048832496
-
A vector model of trust for developing trustworthy systems
-
P. Samarati et al. editors, Computer Security- ESORICS, Proceedings of the 9th European Symposium on Research in Computer Security, September 13-15, Sophia Antipolis, France, Springer
-
Ray, Indrajit and Chakraborty, Sudip (2004). A vector model of trust for developing trustworthy systems. In P. Samarati et al. editors, Computer Security- ESORICS, Proceedings of the 9th European Symposium on Research in Computer Security, September 13-15, 2004, Sophia Antipolis, France. LNCS 3193, Springer.
-
(2004)
LNCS
, vol.3193
-
-
Ray, I.1
Chakraborty, S.2
-
42
-
-
34547169479
-
A grounded theory of information sharing behavior in a personal learning space
-
Banff, Alberta, Canada: ACM. doi: 10.1145/1180875.1180946
-
Razavi, M. N., & Iverson, L. (2006). A grounded theory of information sharing behavior in a personal learning space. In Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work (pp. 459-468). Banff, Alberta, Canada: ACM. doi: 10.1145/1180875.1180946.
-
(2006)
Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
, pp. 459-468
-
-
Razavi, M.N.1
Iverson, L.2
-
43
-
-
0031632337
-
Trust breaks down in electronic contexts but can be repaired by some initial face-to-face contact
-
Los Angeles, California, United States: ACM Press/Addison-Wesley Publishing Co
-
Rocco, E. (1998). Trust breaks down in electronic contexts but can be repaired by some initial face-to-face contact. In Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 496-502). Los Angeles, California, United States: ACM Press/Addison-Wesley Publishing Co.
-
(1998)
Proceedings of the SIGCHI conference on Human factors in computing systems
, pp. 496-502
-
-
Rocco, E.1
-
44
-
-
33744747110
-
e-Commerce: The Roles of Trust, Security, and Type of e-Commerce Involvement
-
Ruppel, C., Underwood-Queen, L., & Harrington, S. J. (2003). e-Commerce: The Roles of Trust, Security, and Type of e-Commerce Involvement. e-Service Journal, 2(2), 25-45.
-
(2003)
e-Service Journal
, vol.2
, Issue.2
, pp. 25-45
-
-
Ruppel, C.1
Underwood-Queen, L.2
Harrington, S.J.3
-
45
-
-
70449689918
-
-
Schooley, B. L. (2007). Inter-organizational systems analysis to improve time-critical public services: The case of mobile emergency medical services. Retrieved from http://proquest.umi.com/pqdweb?did=1390309161&Fmt= 7&clientId=3739&RQT=309&VName=PQD.
-
Schooley, B. L. (2007). Inter-organizational systems analysis to improve time-critical public services: The case of mobile emergency medical services. Retrieved from http://proquest.umi.com/pqdweb?did=1390309161&Fmt= 7&clientId=3739&RQT=309&VName=PQD.
-
-
-
-
46
-
-
34247525112
-
-
Schoorman, F. D., Mayer, R. C., & Davis, J. H. (2007). AN INTEGRATIVE MODEL OF ORGANIZATIONAL TRUST: PAST, PRESENT, AND FUTURE. Academy of Management Review, 32(2), 344-354. doi: Article.
-
Schoorman, F. D., Mayer, R. C., & Davis, J. H. (2007). AN INTEGRATIVE MODEL OF ORGANIZATIONAL TRUST: PAST, PRESENT, AND FUTURE. Academy of Management Review, 32(2), 344-354. doi: Article.
-
-
-
-
48
-
-
70449660793
-
Using Explicit Control Processes in Distributed Workflows to Gather Provenance
-
Retrieved February 22, 2009, from
-
Serra da Cruz, S., Chirigati, F., Dahis, R., Campos, M., & Mattoso, M. (2008). Using Explicit Control Processes in Distributed Workflows to Gather Provenance. In Provenance and Annotation of Data and Processes (pp. 186-199). Retrieved February 22, 2009, from http://dx.doi.org/10.1007/978-3-540-89965-5- 20.
-
(2008)
Provenance and Annotation of Data and Processes
, pp. 186-199
-
-
Serra da Cruz, S.1
Chirigati, F.2
Dahis, R.3
Campos, M.4
Mattoso, M.5
-
49
-
-
0031481660
-
Intervening in the shadow systems of organizations Consulting from a complexity perspective
-
Shaw, P. (1997). Intervening in the shadow systems of organizations Consulting from a complexity perspective. Journal of Organizational Change Management, 10(3), 235.
-
(1997)
Journal of Organizational Change Management
, vol.10
, Issue.3
, pp. 235
-
-
Shaw, P.1
-
51
-
-
0022200670
-
Force field analysis: A new way to evaluate your strategy
-
doi: 10.1016/0024-6301(85)90064-0
-
Thomas, J. (1985). Force field analysis: A new way to evaluate your strategy. Long Range Planning, 18(6), 54-59. doi: 10.1016/0024-6301(85)90064-0.
-
(1985)
Long Range Planning
, vol.18
, Issue.6
, pp. 54-59
-
-
Thomas, J.1
-
52
-
-
70449678053
-
-
United States. (2007b). Building the Information Sharing Environment: Addressing the Challenges of Implementation: Hearing Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, U.S. House of Representatives, One Hundred Ninth Congress, Second Session, May 10, 2006 (p. 27). Washington: U.S. G.P.O.
-
United States. (2007b). Building the Information Sharing Environment: Addressing the Challenges of Implementation: Hearing Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, U.S. House of Representatives, One Hundred Ninth Congress, Second Session, May 10, 2006 (p. 27). Washington: U.S. G.P.O.
-
-
-
-
53
-
-
70449662403
-
-
United States. (2007c). Federal Support for Homeland Security Information Sharing: Role of the Information Sharing Program Manager: Hearing Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, First Session, November 8, 2005 (p. 58). Washington: U.S. G.P.O. Retrieved from http://www.gpoaccess.gov/congress/index.html.
-
United States. (2007c). Federal Support for Homeland Security Information Sharing: Role of the Information Sharing Program Manager: Hearing Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, First Session, November 8, 2005 (p. 58). Washington: U.S. G.P.O. Retrieved from http://www.gpoaccess.gov/congress/index.html.
-
-
-
-
54
-
-
70449665746
-
-
U.S. Dept. of Justice, Bureau of Justice Statistics (2006). Law Enforcement Management and Administrative Statistics (LEMAS): 2003 Sample Survey of Law Enforcement Agencies [Computer file]. ICPSR04411-v1. Ann Arbor, MI: Inter-university Consortium for Political and Social Research [producer and distributor], 2006.
-
U.S. Dept. of Justice, Bureau of Justice Statistics (2006). Law Enforcement Management and Administrative Statistics (LEMAS): 2003 Sample Survey of Law Enforcement Agencies [Computer file]. ICPSR04411-v1. Ann Arbor, MI: Inter-university Consortium for Political and Social Research [producer and distributor], 2006.
-
-
-
-
55
-
-
70449648568
-
Technical, Social & Legal Barriers to Effective Information Sharing Among Sensitive Organizations
-
Treglia, J. and Park J. (2009). Technical, Social & Legal Barriers to Effective Information Sharing Among Sensitive Organizations. In Proceedings of iConference, Chapel Hill, North Carolina, February 8-11. Poster.
-
(2009)
Proceedings of iConference, Chapel Hill, North Carolina, February 8-11. Poster
-
-
Treglia, J.1
Park, J.2
|