From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using the risk - remedy method to evaluate outsourcing tenders.. JIT, 14 (2): 203-211 (1999)Building Business-Based Service Levels for IT Outsourcing Contracts: The Measure to Manage (M2P) Performance Measurement System.. ECIS, стр. 429-436. (2000)AnnL: The Tool for Planning for Viable Enterprises.. CAiSE Forum, том 734 из CEUR Workshop Proceedings, стр. 121-130. CEUR-WS.org, (2011)The Viable Governance Model - A Theoretical Model for the Governance of IT., и . HICSS, стр. 1-10. IEEE Computer Society, (2009)Case Study: The State of Information Systems in Australian Capital Territory Universities., , и . Australas. J. Inf. Syst., (2006)The use of Viable System Model to develop guidelines for generating Enterprise Architecture Principles., , , , и . SMC, стр. 1020-1026. IEEE, (2014)Using the Managerial Enterprise Structure Stakeholders (MESS) Model to examine the effects of organisational politics and structure upon the cost of Information Systems development., и . ICSTM, том 72 из CEUR Workshop Proceedings, CEUR-WS.org, (2000)W3 Trust Model: Evluating Trust and Transitivity of Trust of Online Services., , , и . International Conference on Internet Computing, стр. 354-362. CSREA Press, (2002)Profile-based digital identity management - a better way to combat fraud., , и . ISTAS, стр. 260-267. IEEE, (2010)W3 Trust-Profiling Framework (W3TF) to Assess Trust and Transitivity of Trust of Web-Based Services in a Heterogeneous Web Environment., , , и . APWeb, том 3841 из Lecture Notes in Computer Science, стр. 367-378. Springer, (2006)