Software is typically improved and modified in small increments (we refer to each of these increments as a modification record--MR). MRs are usually stored in a configuration manag...
This paper presents an exploratory study of Information Systems (IS) competencies of business managers in Europe. Following resource-based theory and a knowledge-based view of IS ...
: The successful deployment and exploitation of an Information and Communications Technologies (ICT) project in a traditional Public Organization involves the proper design and imp...
—Successful secure knowledge management requires consideration of both technical and organizational concerns. We use the example of existing industrial incident management system...
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...