Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
We propose a framework for policy generation in continuoustime stochastic domains with concurrent actions and events of uncertain duration. We make no assumptions regarding the co...
Knowledge management depends on effective methods for capturing knowledge in useful forms and making it available when needed. Electronic concept maps provide a promising represen...
This paper argues that ERP systems take the part of an organization’s administrative paradox. An administrative paradox is two sides of the same coin when coordinating organizat...