


default search action
Journal of Cases on Information Technology, Volume 21
Volume 21, Number 1, 2019
- Rafael A. González
, Marisela Vargas, Florentino Malaver, Efraín Ortiz
:
Structuration and Learning in a Software Firm: A Technology-Based Entrepreneurship Case Study. 1-18 - Muhammad Izhar Mehar, Charles Louis Shier, Alana Giambattista, Elgar Gong, Gabrielle Fletcher, Ryan Sanayhie, Henry M. Kim
, Marek Laskowski:
Understanding a Revolutionary and Flawed Grand Experiment in Blockchain: The DAO Attack. 19-32 - Andrea Brunello
, Paolo Gallo, Enrico Marzano, Angelo Montanari, Nicola Vitacolonna:
An Event-Based Data Warehouse to Support Decisions in Multi-Channel, Multi-Service Contact Centers. 33-51 - Khalid Suliman Al-Tahat:
The Impact of a 3D Visual Programming Tool on Students' Performance and Attitude in Computer Programming: A Case Study in Jordan. 52-64
Volume 21, Number 2, 2019
- Abhishek Srivastava, Parmod Kumar Kapur, Deepti Mehrotra
, Rana Majumdar
:
Modelling Fault Detection Using SRGM in Agile Environment and Ranking of Models. 1-20 - Alka Agnihotri, Shikha Kapoor
:
Measuring and Exploring Factors of Shared Leadership in the Context of Indian IT Sector. 21-38 - Swati Narang, P. K. Kapur, D. Damodaran:
Measuring Severity of Attributes That Create Vulnerabilities in Websites and Software Applications Using Two Way Assessment Technique. 39-50 - Priyanka Chandani, Chetna Gupta:
An Early Multi-Criteria Risk Assessment Model: Requirement Engineering Perspective. 51-64 - Kumari Anshu
, Loveleen Gaur
:
E-Satisfaction Estimation: A Comparative Analysis Using AHP and Intuitionistic Fuzzy TOPSIS. 65-87 - Kamlesh Dutta, Varun Gupta
, Vachik S. Dave
:
Analysis and Comparison of Neural Network Models for Software Development Effort Estimation. 88-112
Volume 21, Number 3, 2019
- Thomas Cole, Amit Kumar Bhardwaj
, Lalit Garg
, Divya Prakash Shrivastava
:
Investigation Into Cloud Computing Adoption Within the Hedge Fund Industry. 1-25 - Regner Sabillon
, Jordi Serra-Ruiz
, Victor Cavaller, Jeimy J. Cano M.
:
An Effective Cybersecurity Training Model to Support an Organizational Awareness Program: The Cybersecurity Awareness TRAining Model (CATRAM). A Case Study in Canada. 26-39 - Thomas Mercieca, Joseph G. Vella:
Multi-Dimensional Indexes in DBMSs. 40-50 - Nita Kakhandaki
, Shrinivas B. Kulkarni
, Ramesh K., Umakant P. Kulkarni:
Classification of Brain Hemorrhages in MRI Using Naïve Bayes- Probabilistic Kernel Approach. 51-65 - Ikedinachi Ayodele Power Wogu
, Sanjay Misra
, Patrick A. Assibong, Esther Fadeke Olu-Owolabi, Rytis Maskeliunas
, Robertas Damasevicius:
Artificial Intelligence, Smart Classrooms and Online Education in the 21st Century: Implications for Human Development. 66-79 - Madhuri Gupta, Bharat Gupta:
Survey of Breast Cancer Detection Using Machine Learning Techniques in Big Data. 80-92
Volume 21, Number 4, 2019
- Andre de la Harpe, Thomas Wolfgang Thurner:
The Critical Role of Information System Integration in a Horizontal Merger. 1-13 - Priti Narwal, Deepak Kumar
, Shailendra Narayan Singh
:
A Hidden Markov Model Combined With Markov Games for Intrusion Detection in Cloud. 14-26 - Rebecca Angeles
:
Internet of Things (IOT)-Enabled Product Monitoring at Steadyserv: Interpretations From Two Frameworks. 27-45 - Manal Abdo Farhan Saif, Ahmed Tlili, Fathi Essalmi, Mohamed Jemni
:
Impact of Facebook as a Learning Tool on Learning Outcomes, Technology Acceptance, and Attitude. 46-61

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.