The last decades have seen a growing interest and demand for community-centered collaborative systems and platforms. These systems and platforms aim to provide an …
As we are continuously depending on information technology applications by adopting electronic channels and software applications for our business, online transaction and …
Y Alotaibi - Journal of intelligent manufacturing, 2016 - Springer
We have presented a review of the challenges facing business PM. These challenges are categorized into three challenges:(1) between business and IT, difficulty of deriving IT goals …
Security is a concern that must be taken into consideration starting from the early stages of system development. Over the last two decades, researchers and engineers have …
G Elahi, E Yu, N Zannone - Requirements engineering, 2010 - Springer
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which …
Y Alotaibi, F Liu - Enterprise Information Systems, 2017 - Taylor & Francis
The current literature shows that creating a good framework on business process model (PM) is not an easy task. A successful business PM should have the ability to ensure …
Human values (eg, pleasure, privacy, and social justice) are what a person or a society considers important. Inability to address them in software-intensive systems can result in …
Abstract The Internet of Things (IoT) is a paradigm that permits smart entities to be interconnected anywhere and anyhow. IoT opens new opportunities but also rises new …
The commonly used centralised trust and centralised identity management make information systems and organisations prone to a single point of failure. Therefore, decentralised identity …