— IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-se...
Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, E...
This paper contributes a general approach to characterizing patterns of change in a spatio-temporal database. While there is a particular interest in modelling and querying how sp...
Nassima Djafri, Alvaro A. A. Fernandes, Norman W. ...
This research considers whether interpretive techniques can be used to enhance our understanding of computer-mediated discussions. The case study considered in this research is th...
Many data sets exist that contain both geospatial and temporal elements. Within such data sets, it can be difficult to determine how the data have changed over spatial and tempor...
Orland Hoeber, Garnett Carl Wilson, Simon Harding,...
Increasingly information systems log historic information in a systematic way. Workflow management systems, but also ERP, CRM, SCM, and B2B systems often provide a so-called “ev...