Table of contents
Analyzing bloggers data on software design patterns and applications integration; methodology and implementation
Adil Fathelrahamn, Mathew ShafaghiBlogs (a term that is short for weblogs) are one mean of getting public opinions about important topics. Several techniques could be used to reveal important views and directions…
Strategies for successful CRM implementation
ThuyUyen H. Nguyen, Joseph S. Sherif, Michael NewbyCustomer relationship management (CRM) is an information system that tracks customers' interactions with the firm and allows employees to instantly pull up information about the…
Analysis of security‐relevant semantics of BPEL in cross‐domain defined business processes
K.P. Fischer, U. Bleimann, W. Fuhrmann, S.M. FurnellAims to identify security‐relevant semantics of business processes being defined by WS‐BPEL (Web Services Business Process Execution Language, BPEL for short) scripts, in…
Evaluating the security controls of CAIS in developing countries: an empirical investigation
Ahmad A. Abu‐MusaThis paper aims to examine the existence and adequacy of implemented computerized accounting information system (CAIS) security controls to prevent, detect and correct security…
A risk‐control framework for e‐marketplace participation: the findings of seven cases
Pauline RatnasingamE‐marketplaces have recently become a popular internet‐based e‐commerce application. Despite extensive research on this topic, there has been limited work in the realm of…