Even though security requirements in health care are traditionally high, most computerized health care applications lack sophisticated security measures or focus only on single sec...
: Economic theory and business strategists have pointed at the phenomenon of positive externalities and the related enabling and constraining aspects of an installed base. For inst...
The implementation and use of new information technology initiate changes. These changes can be either of a technological nature (and often explicitly known), or of a social natur...
- Anyone familiar with the German IS research culture would expect to find numerous action researchers in Germany. However, a closer examination of the literature reveals there are...
The paper addresses some misconceptions of Software Engineering, requirements analysis and modelling in particular, due to underlying epistemological flaws., e.g. the believe that...