Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patc...
This study addresses a long-standing and wellrecognized problem in KM research, namely the lack of a cumulative tradition. This problem is addressed by an intensive and critical r...
Utilization of Radio Frequency Identification (RFID) is often presented as improving supply chain management even though there are still few in-depth studies that support the hype...
Organizations are increasingly inter-connected as they source talent, goods and services from other organizations located in disparate parts of the world. They seek new ways of cr...
Swedish public administration is currently undergoing radical change towards dynamic models of governance relying on a high level of intergovernmental collaboration. This high lev...