-
1
-
-
0033160014
-
Comprehending object and process models: An empirical study
-
July/August
-
Agarwal, R., De, P., and Sinha, A. "Comprehending Object and Process Models: An Empirical Study," IEEE Transactions on Software Engineering, (25:4), July/August 1999, pp. 541-556.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.4
, pp. 541-556
-
-
Agarwal, R.1
De, P.2
Sinha, A.3
-
2
-
-
33750169459
-
The effects of state-based data representation on user performance in query formulation tasks
-
Allen, G. and S., March "The Effects of State-Based Data Representation on User Performance in Query Formulation Tasks," MIS Quarterly, (30:2), 2006, pp. 269-290.
-
(2006)
MIS Quarterly
, vol.30
, Issue.2
, pp. 269-290
-
-
Allen, G.1
March, S.2
-
5
-
-
1942532238
-
XML-based specification for web services document security
-
Bhatti, R, Bertino, E., Ghafoor, Joshi, J. "XML-Based Specification for Web Services Document Security," IEEE Computer Society, (34:4), 2004, pp.41-49.
-
(2004)
IEEE Computer Society
, vol.34
, Issue.4
, pp. 41-49
-
-
Bhatti, R.1
Bertino, E.2
Ghafoor3
Joshi, J.4
-
6
-
-
84976852456
-
Studying programmer behavior experimentally: The problems of proper methodology
-
Apr.
-
Brooks, R. "Studying Programmer Behavior Experimentally: The Problems of Proper Methodology", Communication of ACM, (23: 4), pp. 207-213, Apr. 1980.
-
(1980)
Communication of ACM
, vol.23
, Issue.4
, pp. 207-213
-
-
Brooks, R.1
-
8
-
-
34247140996
-
The interdisciplinary study of coordination
-
Malone, T. W., Crowston, K., and Herman, G. A., editors MIT Press, Cambridge, Massachusetts.
-
Crowston, K. and Osborn, C. "The Interdisciplinary Study of Coordination," in Malone, T. W., Crowston, K., and Herman, G. A., editors, Organizing business knowledge: the MIT process handbook, MIT Press, Cambridge, Massachusetts. 2003.
-
(2003)
Organizing Business Knowledge: The MIT Process Handbook
-
-
Crowston, K.1
Osborn, C.2
-
10
-
-
23044525969
-
Current directions in IS security research: Towards socio-organizational perspectives
-
Dhillon, G. and J., Backhouse "Current Directions in IS Security Research: Towards Socio-Organizational Perspectives," Information Systems Journal, (11), 2001, pp. 127-153.
-
(2001)
Information Systems Journal
, Issue.11
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
11
-
-
0029004440
-
Toward a theory of situational awareness in dynamic systems
-
Endsley, M.R. "Toward a theory of Situational Awareness in dynamic systems," Human Factors (37:1) 1995, pp 32-64
-
(1995)
Human Factors
, vol.37
, Issue.1
, pp. 32-64
-
-
Endsley, M.R.1
-
12
-
-
84876640770
-
Assessing object oriented conceptual models maintainability
-
October Tampere, Finland
-
Genero, M., J. Olivas, M. Piattini, F. Romero. "Assessing object oriented conceptual models maintainability", International Workshop Conceptual Model. Quality, October 2002, Tampere, Finland.
-
(2002)
International Workshop Conceptual Model. Quality
-
-
Genero, M.1
Olivas, J.2
Piattini, M.3
Romero, F.4
-
13
-
-
0000391283
-
Within-subjects designs: To use or not to use?
-
Sept.
-
Greenwald, A. "Within-Subjects Designs: To Use or Not to Use?" Psychological Bull., (83:2), Sept. 1976.
-
(1976)
Psychological Bull
, vol.83
, Issue.2
-
-
Greenwald, A.1
-
14
-
-
0036779153
-
AutoWF: A secure web workflow system using autonomous objects?
-
Gudes, E., and A. Tubman "AutoWF: A Secure Web Workflow System Using Autonomous Objects? Data and Knowledge Engineering (43), 2002, pp. 1-27.
-
(2002)
Data and Knowledge Engineering
, Issue.43
, pp. 1-27
-
-
Gudes, E.1
Tubman, A.2
-
15
-
-
35648979668
-
Variations in conceptual modeling: Classification and ontological analysis
-
August
-
Hadar, I. and P., Soffer "Variations in Conceptual Modeling: Classification and Ontological Analysis," Journal of the Association for Information Systems, (7:8), August 2006, pp. 568-592.
-
(2006)
Journal of the Association for Information Systems
, vol.7
, Issue.8
, pp. 568-592
-
-
Hadar, I.1
Soffer, P.2
-
16
-
-
0003594966
-
-
Nicholas Brealey Publishing, Allen and Urwin, London
-
Hammer, M. & Champy, J.M. Reengineering the Corporation: A Manifesto for Business Revolution, Nicholas Brealey Publishing, Allen and Urwin, London, 1993.
-
(1993)
Reengineering the Corporation: A Manifesto for Business Revolution
-
-
Hammer, M.1
Champy, J.M.2
-
17
-
-
0242652022
-
Design science research in information systems
-
March
-
Hevner, A., March, S.T., Park, J., and Ram, S. "Design Science Research in Information Systems," MIS Quarterly (28:1), March 2004, pp. 75-105.
-
(2004)
MIS Quarterly
, vol.28
, Issue.1
, pp. 75-105
-
-
Hevner, A.1
March, S.T.2
Park, J.3
Ram, S.4
-
18
-
-
84944220091
-
Towards development of secure systems using UMLsec
-
in H. Hussmann, editor LNCS Springer
-
Jürjens, J. "Towards Development of Secure Systems Using UMLsec," in H. Hussmann, editor, Fundamental Approaches to Software Engineering, 4th International Conference, Proceedings, LNCS, 2001, pp. 187-200, Springer.
-
(2001)
Fundamental Approaches to Software Engineering, 4th International Conference, Proceedings
, pp. 187-200
-
-
Jürjens, J.1
-
19
-
-
56749094570
-
A handbook for data analysis in the behavioural sciences-methodological issues
-
chapter 19 Lawrence Erlbaum, Associates
-
Keren, G. A Handbook for Data Analysis in the Behavioural Sciences-Methodological Issues, chapter 19: Between-or Within-Subjects Design: A Methodological Dilemma. Lawrence Erlbaum, Associates, 1993.
-
(1993)
Between-or Within-Subjects Design: A Methodological Dilemma
-
-
Keren, G.1
-
20
-
-
13844297037
-
Meta workflows as a control and coordination mechanism for exception handling in workflow systems
-
Kumar, A. and Wainer, J. "Meta workflows as a Control and Coordination Mechanism for Exception Handling in Workflow Systems," Decision Support Systems (40:1), 2005, pp. 89-105.
-
(2005)
Decision Support Systems
, vol.40
, Issue.1
, pp. 89-105
-
-
Kumar, A.1
Wainer, J.2
-
21
-
-
0035331644
-
An internally replicated quasi-experiment comparison of checklist and perspective-based reading of code documents
-
May
-
Laitenberger, O., El Emam, K., Harbich, T. "An Internally Replicated Quasi-Experiment Comparison of Checklist and Perspective-Based Reading of Code Documents," IEEE Transactions on Software Engineering, (27:5) May. 2001.
-
(2001)
IEEE Transactions on Software Engineering
, vol.27
, Issue.5
-
-
Laitenberger, O.1
El Emam, K.2
Harbich, T.3
-
22
-
-
0242592090
-
Why a diagram is (Sometimes) worth ten thousand words
-
Larkin J.H. and H.A., Simon "Why a Diagram Is (Sometimes) Worth Ten Thousand Words," Cognitive Science, (11), 1987, pp. 65-99
-
(1987)
Cognitive Science
, Issue.11
, pp. 65-99
-
-
Larkin, J.H.1
Simon, H.A.2
-
23
-
-
0036305007
-
Integrating software lifecycle process standards with security engineering
-
Lee, Y., Lee, J., and Lee, Z. (2002) "Integrating Software Lifecycle Process Standards with Security Engineering," Computer and Security, (21:4), pp. 345-355.
-
(2002)
Computer and Security
, vol.21
, Issue.4
, pp. 345-355
-
-
Lee, Y.1
Lee, J.2
Lee, Z.3
-
24
-
-
0037549212
-
Co-opetition and knowledge transfer
-
Loebecke, C., van Fenema, P. and Powell, P. (1999) "Co-Opetition and Knowledge Transfer," Database for Advances in Information Systems, (30:2), pp. 14-25.
-
(1999)
Database for Advances in Information Systems
, vol.30
, Issue.2
, pp. 14-25
-
-
Loebecke, C.1
Van Fenema, P.2
Powell, P.3
-
25
-
-
1442311722
-
-
MIT Press, Cambridge, Massachusetts.
-
Malone, T. W., Crowston, K., and Herman, G. A. (Ed), Organizing business knowledge: the MIT process handbook, MIT Press, Cambridge, Massachusetts. 2003.
-
(2003)
Organizing Business Knowledge: The MIT Process Handbook
-
-
Malone, T.W.1
Crowston, K.2
Herman, G.A.3
-
26
-
-
0023366168
-
Electronic markets and electronic hierarchies
-
Malone, T. W., Yates, J., and Benjamin, R. I. "Electronic Markets and Electronic Hierarchies," Communications of the ACM, (30:6), 1987, pp. 484-497.
-
(1987)
Communications of the ACM
, vol.30
, Issue.6
, pp. 484-497
-
-
Malone, T.W.1
Yates, J.2
Benjamin, R.I.3
-
28
-
-
23944475544
-
When security meets software engineering: A case of modelling secure information systems
-
Mouratidis, H., Giorgini, P., and Manson, G. "When Security Meets Software Engineering: A Case of Modelling Secure Information Systems," Information Systems (30), pp. 609-629.
-
Information Systems
, Issue.30
, pp. 609-629
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
29
-
-
0042211798
-
Conceptual modeling and telos
-
Chapter 2 in P. Loucopoulos and R. Zicari (Ed.) UK: Wiley
-
Mylopoulos, J. "Conceptual Modeling and Telos", Chapter 2 in P. Loucopoulos and R. Zicari (Ed.), Conceptual Modeling, Databases, and CASE. UK: Wiley, pp. 49-68. 1992.
-
(1992)
Conceptual Modeling, Databases, and CASE
, pp. 49-68
-
-
Mylopoulos, J.1
-
30
-
-
0038825675
-
Task-role-based access control model
-
September
-
Oh, S. and Park, S. "Task-role-based Access Control Model," Information Systems, (28:6), September 2003, pp. 533-562.
-
(2003)
Information Systems
, vol.28
, Issue.6
, pp. 533-562
-
-
Oh, S.1
Park, S.2
-
31
-
-
0000842614
-
How information gives you competitive advantage
-
July/August
-
Porter, M.E., Millar, V.E. "How Information Gives You Competitive Advantage", Harvard Business Review (63:4), July/August 1985.
-
(1985)
Harvard Business Review
, vol.63
, Issue.4
-
-
Porter, M.E.1
Millar, V.E.2
-
32
-
-
84906925269
-
A business process context for knowledge management
-
In press
-
Raghu, T.S. and A., Vinze "A Business Process Context for Knowledge Management," Decision Support System, In press.
-
Decision Support System
-
-
Raghu, T.S.1
Vinze, A.2
-
33
-
-
0030086382
-
Role-based access control models
-
February
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., and Youman, C.E., "Role-Based Access Control Models," IEEE Computer (29:2), February 1996, pp. 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
34
-
-
33646894100
-
Semantic information assurance for secure distributed knowledge management: A business process perspective
-
Singh, R. and Salam, A.F. "Semantic Information Assurance for Secure Distributed Knowledge Management: A Business Process Perspective" IEEE Transactions on Systems, Man and Cybernetics (36:3), 2006, pp. 472-486.
-
(2006)
IEEE Transactions on Systems, Man and Cybernetics
, vol.36
, Issue.3
, pp. 472-486
-
-
Singh, R.1
Salam, A.F.2
-
35
-
-
44649191395
-
A design theory for secure information systems design methods
-
August
-
Siponen, M., Baskerville, R., and Heikka, J. "A Design Theory for Secure Information Systems Design Methods, "Journal of the Association for Information Systems (7:8), August 2006, pp. 568-592
-
(2006)
Journal of the Association for Information Systems
, vol.7
, Issue.8
, pp. 568-592
-
-
Siponen, M.1
Baskerville, R.2
Heikka, J.3
-
36
-
-
85085846560
-
Articulating and enforcing authorisation policies with UML and OCL
-
St. Luis, MO, USA
-
Sohr, K., Ahn, G., and Migge, L. "Articulating and Enforcing Authorisation Policies with UML and OCL," Software Engineering for Secure System-Building Trustworthy Applications (SESS'05), 2005, St. Luis, MO, USA.
-
(2005)
Software Engineering for Secure System-Building Trustworthy Applications (SESS'05)
-
-
Sohr, K.1
Ahn, G.2
Migge, L.3
-
37
-
-
79951820897
-
Framing of information security policies and practices
-
D. Straub, S. Goodman and R. Baskerville (eds.) Armonk, NY: M. E. Sharpe
-
Straub, D., Goodman, S., and Baskerville, R. "Framing of Information Security Policies and Practices," in Information Security Policies, Processes, and Practices, D. Straub, S. Goodman and R. Baskerville (eds.), 2008, Armonk, NY: M. E. Sharpe.
-
(2008)
Information Security Policies, Processes, and Practices
-
-
Straub, D.1
Goodman, S.2
Baskerville, R.3
-
38
-
-
0038301528
-
XML based schema definition for support of inter-organizational workflow
-
van der Aalst, W.M.P. and Kumar, A. "XML Based Schema Definition for Support of Inter-Organizational Workflow," Information Systems Research (14:1), 2003, pp.23-46.
-
(2003)
Information Systems Research
, vol.14
, Issue.1
, pp. 23-46
-
-
Van Der Aalst, W.M.P.1
Kumar, A.2
-
39
-
-
27644524446
-
Bridging the gap between software development and information security
-
Sept-Oct
-
van Wyk, K. and G., McGraw "Bridging the Gap Between Software Development and Information Security," IEEE Security & Privacy, Sept-Oct 2005, pp. 75-79.
-
(2005)
IEEE Security & Privacy
, pp. 75-79
-
-
Van Wyk, K.1
McGraw, G.2
|