منابع مشابه
An Agile Approach to Workflow Management
In today’s dynamic and uncertain business environment workflow management systems must react quickly to change. This paper suggests extending workflow management with case-based reasoning (CBR) to allow just-in-time updates to the predefined workflow model and to provide flexibility by keeping (real) options open rather than freezing them early on. First an initial workflow model is created, co...
متن کاملA Systems Approach to Information Technology (IT) Infrastructure Design for Utility Management Automation Systems
Almost all of electric utility companies are planning to improve their management automation system, in order to meet the changing requirements of new liberalized energy market and to benefit from the innovations in information and communication technology (ICT or IT). Architectural design of the utility management automation (UMA) systems for their IT-enabling requires proper selection of ...
متن کاملA Comparative Study on Hybrid IT Project Managment Using Traditional Project Management and Agile Approach
Traditional Project Management Methodologies (TPMM) aim to prevent change by extensively planning and documenting as much as possible before the system is developed while change is inevitable and that it is not to be avoided. Additionally, Traditional Project Management rely more on processes, sequential software development, like waterfall. Consequently, there is a demand for system developmen...
متن کاملAgile Software Development: It Is about Knowledge Management and Creativity
Software development is a knowledge intensive activity and its success depends on knowledge and creativity of the developers. In the last years the traditional perspective on software development is changing and agile methods have received considerable attention. The purpose of this paper is to provide an understanding of knowledge management and creativity in relation with new software enginee...
متن کاملSpecifying Digital Forensics: A Forensics Policy Approach
In this paper we present an approach to digital forensics specification based on forensic policy definition. Our methodology borrows from computer security policy specification, which has accumulated a significant body of research over the past 30 years. We first define the process of specifying forensics properties through a forensics policy and then present an example application of the proce...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Internet Technology and Secured Transactions
سال: 2019
ISSN: 2046-3723
DOI: 10.20533/jitst.2046.3723.2019.0078