نتایج جستجو برای: it quality
تعداد نتایج: 3385862 فیلتر نتایج به سال:
The implementation team problem is one of the critical elements lead to ERP project failure. The purpose of this research is to explore the relationship between team risk factors and IT governance. The IT governance includes five important domains, that is, IT strategic alignment, IT value delivery, IT resource management, IT risk management, and IT performance management. Our research results ...
Take a strip of paper with ‘once upon a time there’ written on one side and ‘was a story that began’ on the other. Twisting the paper and joining the ends produces John Barth’s story Frame-Tale, which prefixes ‘once upon a time there was a story that began’ to itself. In this paper, I argue that the possibility of understanding Frame-Tale cannot be explained by tacit knowledge of a recursive th...
Producing IT products/services required carefully designed. IT development process is intangible and labour intensive. Making optimal use of available resources, both soft (knowledge, skill-set etc.) and hard (computer system, ancillary equipment etc.), is vital if IT development is to achieve sensible economical advantages. Apart from the norm of Project Life Cycle and System Development Life ...
There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract therefore difficult to generalize or even identify in real networks. While some papers distinct different attacker types, the usual approach is to present an anonymization technique and then to develop an attacker model for it in order to identify properties o...
Computational models are intensively used in engineering for risk analysis or prediction of future outcomes. Uncertainty and sensitivity analyses are of great help in these purposes. Although several methods exist to perform variance-based sensitivity analysis of model output with independent inputs only a few are proposed in the literature in the case of dependent inputs. This is explained by ...
In recent years, we have experienced the proliferation of videogames that have, as their main mode of play, the creation of in-game content. Even though existing literature has looked into various characteristics of these games, one of their aspects that warrants further exploration is the monetisation practices that can emerge in their context. Through our ongoing ethnographic study, we became...
As Information Technology (IT) has become increasingly important to the competitive position of firms, managers have grown more sensitive to their organization's overall IT risk management. Recent publicity concerning losses incurred by companies becauseofproblcms with their sophisticated information systems has focused attention on the importance of these systems to the organization. In an att...
Twitter has become a major source of data for social media researchers. One important aspect of Twitter not previously considered are deletions – removal of tweets from the stream. Deletions can be due to a multitude of reasons such as privacy concerns, rashness or attempts to undo public statements. We show how deletions can be automatically predicted ahead of time and analyse which tweets are...
We present a solution for modeling the dependencies of an IT infrastructure and determine the availability of components and services therein using Markov logic networks (MLN). MLNs offer a single representation of probability and first-order logic and are well suited to model dependencies and threats. We identify different kinds of dependency and show how they can be translated into an MLN. Th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید