BOOR 发表于 2025-3-26 21:42:06
Business Process-Based Legitimacy of Data Access Framework for Enterprise Information Systems Protecal data. Among imposed constraints, we find that while a disclosure occurs on user’s personal data, the burden of proof is now in the charge of business owners. In this context, data access has to be managed according to what is mentioned in Terms of Service and logged in a way to prove the occurrenNonconformist 发表于 2025-3-27 03:26:58
Equity Crowdfunding: Quality Signals for Online-Platform Projects and Supporters’ Motivationst decision and other non-motivational dimensions are taken into account as they might convey information about the underlying and often not directly observable qualitative characteristics of the business.Flu表流动 发表于 2025-3-27 08:06:15
http://reply.papertrans.cn/83/8280/827912/827912_33.pngpacifist 发表于 2025-3-27 12:01:28
Enterprise Information Management in Cultural Heritage Domainon up to pan-European data platform Europeana.eu via the level of regional and national cultural heritage data services. It is based on experiences of Poznań Supercomputing and Networking Center collected during the last 15+ years of involvement in the development of cultural heritage network services on all these levels.格子架 发表于 2025-3-27 14:40:16
Designing a Technical Debt Visualization Tool to Improve Stakeholder Communication in the Decision-Mhis case study show that technical debt visualizations were considered useful for decision-making processes associated with software life cycle, especially for executives, business managers, software product owners, architects and project managers.饶舌的人 发表于 2025-3-27 21:43:49
The Penetration of ICT into the Economy—Technical Infrastructure in the V4 Countriesulti-criteria TOPSIS analysis method is used for comparison. A comparison of the penetration of technological infrastructure into the V4 countries between 2010 and 2014 and a comparison of them with the EU average is provided at the end of the article.残暴 发表于 2025-3-27 22:57:52
The Design of an Identity and Access Management Assurance Dashboard Modelevaluation criteria such as hot spots, maturity, technology gaps and compliance. The SABSA model supports the design of the IAM assurance dashboard which is business requirements driven, to address the needs of executives.主动脉 发表于 2025-3-28 03:31:32
http://reply.papertrans.cn/83/8280/827912/827912_38.png典型 发表于 2025-3-28 09:16:41
http://reply.papertrans.cn/83/8280/827912/827912_39.pngamplitude 发表于 2025-3-28 13:48:49
A Cost-Effective Data Replica Placement Strategy Based on Hybrid Genetic Algorithm for Cloud Serviceper proposes a hybrid genetic algorithm and a data support-based initialization method that addresses the problem. Experiments show that the approach result in significant reduction in total data management cost and the algorithm is with good performance.