Sciweavers

JACIII
2006
114views more  JACIII 2006»
13 years 4 months ago
A Theoretical Formulation of Object-Oriented Rough Set Models
ata forms, and abstract structural hierarchy based on is-a relationship and has-a relationship. Object structures illustrate many kinds of objects and actual dependence among objec...
Yasuo Kudo, Tetsuya Murai
JITECH
2008
172views more  JITECH 2008»
13 years 4 months ago
Information systems in developing countries: a critical research review
In this paper I review the Information Systems (IS) research on how developing countries have attempted to benefit from information and communication technologies (ICTs). First I ...
Chrisanthi Avgerou
ITP
2006
94views Mathematics» more  ITP 2006»
13 years 4 months ago
Critical research in information systems: looking forward, looking back
Purpose
Lynette Kvasny, Helen Richardson
JDCTA
2008
160views more  JDCTA 2008»
13 years 4 months ago
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...
JDCTA
2008
122views more  JDCTA 2008»
13 years 4 months ago
An Analysis Present Condition of Information Systems in Turkish Ports and Direction of Improvement
The international business environment of port logistics has changed drastically in the last few decades. The increase in international trade, advent of ultra-large vessels, chang...
Hyung Rim Choi, Yavuz Keceli, Min Je Cho
ISJ
2008
64views more  ISJ 2008»
13 years 4 months ago
The ethical nature of critical research in information systems
Critical research in information systems is based on and inspired by ethics and morality. In order to support this proposition, this paper will suggest a way of classifying critica...
Bernd Carsten Stahl
EOR
2006
82views more  EOR 2006»
13 years 4 months ago
Flowshop scheduling research after five decades
: All information systems have to be protected. As the number of information objects and the number of users increase the task of information system's protection becomes more ...
Jatinder N. D. Gupta, Edward F. Stafford
ENTCS
2006
129views more  ENTCS 2006»
13 years 4 months ago
A Constructive Object Oriented Modeling Language for Information Systems
One of the central aspects in an Information System is the meaning of data in the external world and the information carried by them. We propose a Constructive Object Oriented Mod...
Mario Ornaghi, Marco Benini, Mauro Ferrari, Camill...