Services business generates significant amount of human and machine created data. Search and discovery of relevant information from this data is a critical factor in enhancing wor...
Nithya Rajamani, Murthy V. Devarakonda, Yu Deng, W...
Abstract. The adoption of mobile technologies into companies frequently follows a technology -driven approach without precise knowledge about the potential benefits that may be rea...
A recent trend in Ubiquitous Computing is that embedded software (e.g. in production machines, wired or wireless networked sensors and actuators, or RFID readers) directly offers W...
—A new approach to perform feasibility studies using business process models is proposed. The utilization of the improved Role Activity Diagram notations has led to the extractio...
Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...