As historically acknowledged in the Reasoning about Actions and Change community, intuitiveness of a logical domain description cannot be fully automated. Moreover, like any other...
This essay extends Simon’s arguments in the Sciences of the Artificial to a critical examination of how theorizing in Information Technology disciplines should occur. The essay ...
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Information and communication technologies (ICTs) continue to have a profound effect on the economies and societies where they are used. In this article, we propose three related...
Despite evidence that the majority of knowledge management (KM) initiatives miscarry, there has been a paucity of critical, in-depth research into the causes of failure. In this p...