Abstract: Over the last years a multitude of approaches and frameworks making prescriptions on how to document an enterprise architecture (EA) have been developed. These approaches...
Sabine Buckl, Florian Matthes, Christian M. Schwed...
Today’s cross-organizations are increasingly coordinating their capabilities in the quest of dynamically adaptable and thus highly competitive realistic services. Unfortunately,...
During the requirements elicitation phase, analysts have often to take into consideration laws and regulations enacted by different levels of government. The purpose of this paper...
Alberto Siena, Anna Perini, Angelo Susi, John Mylo...
Nowadays, data mining is based on low-level speci cations of the employed techniques typically bounded to a speci c analysis platform. Therefore, data mining lacks a modelling arc...
The approach to information security governance has predominantly followed a functionalist paradigm with emphasis placed on formalized rule structures and policy frameworks. The a...