Although different strands of “post-approaches” and “post-theories”, for example, grounded theory and structuration theory, have gained popularity in Information Systems (...
Most published research in information systems is underpinned by a positivist or empiricist philosophy. This generally involves the collection of quantitative data and its subsequ...
The purpose of this research paper is to illustrate the industrial and federal need for Information Systems Security Engineering (ISSE) in order to build Information Assurance (IA...
Concurrent Time-stamp Systems (ctss) allow processes to temporally order concurrent events in an asynchronous shared memorysystem, a powerful tool for concurrency control, serving...
Abstract. The need for effective testing techniques for architectural level descriptions is widely recognised. However, due to the variety of domain-specific architectural descript...