This paper is to study the information system development (ISD) by looking into fifty-six cases from the perspectives of power development stage and organizational politics. We in...
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number...
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
Retrenchment is a framework that allows relatively unrestricted system evolution steps to be described in a way that gives an evolution step some formal content — unlike model b...
Utilization of Radio Frequency Identification (RFID) is often presented as improving supply chain management even though there are still few in-depth studies that support the hype...