Governments have developed policies and strategies which are designed to assist SMEs to become eenabled. It is not clear what impact these strategies have on SMEs. There is some e...
Cloud computing environments allow customers to execute arbitrary code on hardware owned by a cloud provider. While cloud providers use virtualization to ensure isolation between ...
In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) righ...
Recent research has demonstrated the benefits of active networks: customized network services can easily be built and modified, packet streams can be processed inside the network...
Many financial institutions are actively developing new electronic banking products for their retail customers. These efforts are can succeed only if their managers focus the prom...
In this paper we address the weaknesses of current EC applications related to their lack of support for the customer to recognize other people, either other customers or vendors o...
: This research develops, operationalizes, and empirically tests a model for explaining/predicting the satisfaction of customers with Internet-based services in the context of an o...
Most data mining algorithms and tools stop at discovered customer models, producing distribution information on customer profiles. Such techniques, when applied to industrial pro...
To determine the important trends and issues in thousands of comments from customers and make strategic decisions about business operations, managers must go over these messages m...
Abstract. Extreme programming (XP), similar to other agile software development methods, values close collaboration with customers. One of the XP's practices suggests that cus...