default search action
Search dblp for Publications
export results for "toc:db/journals/jitedc/jitedc6.bht:"
@article{DBLP:journals/jitedc/BerndtLM17, author = {Donald J. Berndt and Ricardo Lasa and James A. McCart}, title = {SiteWit Corporation: {SQL} or NoSQL? That is the Question!}, journal = {J. Inf. Technol. Educ. Discuss. Cases}, volume = {6}, pages = {4}, year = {2017}, url = {https://doi.org/10.28945/3920}, doi = {10.28945/3920}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jitedc/BerndtLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jitedc/CupidoB17, author = {Kim Cupido and Jean{-}Paul Van Belle}, title = {A Digitally Enabled Strategic Sourcing Process to Mitigate Risk}, journal = {J. Inf. Technol. Educ. Discuss. Cases}, volume = {6}, pages = {8}, year = {2017}, url = {https://doi.org/10.28945/3924}, doi = {10.28945/3924}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jitedc/CupidoB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jitedc/ElderJRW17, author = {Jonathan Elder and Nicole Jacobson and Natalie Remsen and Kim Wilmath}, title = {Behind Enemy Lines}, journal = {J. Inf. Technol. Educ. Discuss. Cases}, volume = {6}, pages = {12}, year = {2017}, url = {https://doi.org/10.28945/3928}, doi = {10.28945/3928}, timestamp = {Fri, 22 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jitedc/ElderJRW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jitedc/GasantB17, author = {Kaasiefa Gasant and Jean{-}Paul Van Belle}, title = {LifeInsure: Choosing a {PAS} to Manage and Maintain Their Product Lifecycle}, journal = {J. Inf. Technol. Educ. Discuss. Cases}, volume = {6}, pages = {5}, year = {2017}, url = {https://doi.org/10.28945/3921}, doi = {10.28945/3921}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jitedc/GasantB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jitedc/GillR17, author = {Grandon Gill and Bernardo Rodrigues}, title = {Employing Dynamic Logic in Cybersecurity}, journal = {J. Inf. Technol. Educ. Discuss. Cases}, volume = {6}, pages = {11}, year = {2017}, url = {https://doi.org/10.28945/3927}, doi = {10.28945/3927}, timestamp = {Fri, 22 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jitedc/GillR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jitedc/Hammond17, author = {Robert W. Hammond}, title = {How to Grow Revenues in an uncertain World?}, journal = {J. Inf. Technol. Educ. Discuss. Cases}, volume = {6}, pages = {2}, year = {2017}, url = {https://doi.org/10.28945/3650}, doi = {10.28945/3650}, timestamp = {Fri, 22 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jitedc/Hammond17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jitedc/HoeckerBBES17, author = {Jay Hoecker and Debbie Bernal and Alex Brito and Arda Ergonen and Richard Stiftinger}, title = {These Models Need Enterprise Data Management!}, journal = {J. Inf. Technol. Educ. Discuss. Cases}, volume = {6}, pages = {1}, year = {2017}, url = {https://doi.org/10.28945/3651}, doi = {10.28945/3651}, timestamp = {Fri, 22 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jitedc/HoeckerBBES17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jitedc/JohnstonG17, author = {Kevin A. Johnston and Grandon Gill}, title = {Standard Bank: The Agile Transformation}, journal = {J. Inf. Technol. Educ. Discuss. Cases}, volume = {6}, pages = {7}, year = {2017}, url = {https://doi.org/10.28945/3923}, doi = {10.28945/3923}, timestamp = {Fri, 22 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jitedc/JohnstonG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jitedc/MohammedSDN17, author = {Taufeeq Mohammed and Utkarsh Shrivastava and Ashish K. Das and Quynh Thi Nguyen}, title = {Grandon.com Got Hacked!}, journal = {J. Inf. Technol. Educ. Discuss. Cases}, volume = {6}, pages = {10}, year = {2017}, url = {https://doi.org/10.28945/3926}, doi = {10.28945/3926}, timestamp = {Fri, 22 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jitedc/MohammedSDN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jitedc/Montgomery17, author = {Troy A. Montgomery}, title = {Cost estimating - Make or Buy?}, journal = {J. Inf. Technol. Educ. Discuss. Cases}, volume = {6}, pages = {3}, year = {2017}, url = {https://doi.org/10.28945/3649}, doi = {10.28945/3649}, timestamp = {Fri, 22 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jitedc/Montgomery17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jitedc/ShrivastavaM17, author = {Utkarsh Shrivastava and Taufeeq Mohammed}, title = {A Cybersecurity Executive DBA?}, journal = {J. Inf. Technol. Educ. Discuss. Cases}, volume = {6}, pages = {9}, year = {2017}, url = {https://doi.org/10.28945/3925}, doi = {10.28945/3925}, timestamp = {Fri, 22 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jitedc/ShrivastavaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jitedc/ThomasB17, author = {Marc Thomas and Jean{-}Paul Van Belle}, title = {Virtualization Footprint: Why Re-Invest?}, journal = {J. Inf. Technol. Educ. Discuss. Cases}, volume = {6}, pages = {6}, year = {2017}, url = {https://doi.org/10.28945/3922}, doi = {10.28945/3922}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jitedc/ThomasB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.