Adoption of an information system could be reflected in two ways: through the adoption intentions of the non-adopters and the extent of adoption for the adopters. This study seeks...
This paper analyzes the reflections of an agile team, developing a large-scale project in an industry setting. The team uses an Iteration Summary Meeting practice, which includes ...
David Talby, Orit Hazzan, Yael Dubinsky, Arie Kere...
Abstract. This article deals with the use of Open Source Software (OSS) at the primary and secondary level of education in Slovenia. The challenges and advantages of using OSS in e...
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
- With a trend toward becoming more and more information based, enterprises constantly attempt to surpass the accomplishments of each other by improving their information activitie...
S. Shervin Ostadzadeh, Fereidoon Shams Aliee, S. A...