As a security policy model evolves, the design of security systems using that model could become increasingly complicated. It is necessary to come up with an approach to guide the ...
Shu Gao, Yi Deng, Huiqun Yu, Xudong He, Konstantin...
This paper focuses on online gift exchange in a setting where online and offline interactions are tightly intertwined and most of the exchanges require face-to-face interaction to...
This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
The Unified Modelling Language (UML) is a language for specifying, visualizing, constructing, and documenting the artefacts of software systems, as well as for modelling business ...
A. Minosi, S. Mankan, A. Martinola, F. Balzarini, ...
The progression of implementation of an information systems strategy in a UK acute hospital is described. The case study describes the IS strategy, the conditions that led to its ...