Today’s business climate requires organizations to constantly evolve IT strategies to respond to new opportunities or threats. Tracking the achievement of business goals, object...
This work presents a method for the definition of process capability profiles lined up with the specific business model of small software companies. The developed method is made u...
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
When trying to describe the behaviour of large systems, such as the business processes of large enterprises, we often adopt diagramming techniques based on derivatives of data flo...
A software application has strong relationships with the business processes it supports. In the analysis phase those parts of the processes in which the software system is applied...