


default search action
Information, Knowledge, Systems Management, Volume 5
Volume 5, Number 1, 2006
- Tarek S. Sobh:
Explanation-based learning to recognize network malfunctions. 1-21 - Nong Ye, Harish Bashettihalli, Toni Farley:
Attack profiles to derive data observations, features, and characteristics of cyber attacks. 23-47 - Faith-Michael E. Uzoka:
AHP-based system for strategic evaluation of financial information. 49-61
Volume 5, Number 2, 2006
- Lawrence Miller, Ruth Miller, John Dismukes:
The Critical Role of Information and Information Technology in Future Accelerated Radical Innovation. 63-99 - Saraswati Sastrowardoyo, Mike Metcalfe:
Knowledge management as organising inquirers. 101-116 - A. M. M. Sharif Ullah, Khalifa H. Harib:
Knowledge extraction from time series and its application to surface roughness simulation. 117-134 - Nong Ye, Clark Newman, Toni Farley:
A System-Fault-Risk Framework for cyber attack classification. 135-151
Volume 5, Number 3, 2006
- Cynthia T. Small, Andrew P. Sage:
Knowledge management and knowledge sharing: A review. 153-169 - Sameer Kumar, Ganesh Thondikulam:
Knowledge management in a collaborative business framework. 171-187 - Tanja Ylimäki, Veikko Halttunen:
Method engineering in practice: A case of applying the Zachman framework in the context of small enterprise architecture oriented projects. 189-209
Volume 5, Number 4, 2006
- Nong Ye, Toni Farley, Xueping Li, Harish Bashettihalli:
Batch scheduled admission control for computer and network systems. 211-226 - Nouf K. M. Al-Kahtani, Julie J. C. H. Ryan, Theresa I. Jefferson:
How Saudi female faculty perceive internet technology usage and potential. 227-243 - Sameer Kumar, Jason H. Eickhoff:
Outsourcing: When and how should it be done? 245-259 - Roland T. Brooks, Andrew P. Sage:
System of systems integration and test. 261-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.