-
21
Analisis Keselarasan Teknologi Informasi dan Bisnis Menggunakan Strategic Alignment Model Maturity (SAMM) di Universitas Flores Nusa Tenggara Timur
Published 2022-06-01“…Mengacu pada Strategic Alignment Model Maturity (SAMM) kerangka konseptual model pada penelitian ini memiliki 4 konstruk yakni Information Technology (IT), Business, Information Technology-Business Alignment (BITA), dan Information Technology Performance. …”
Get full text
Article -
22
-
23
-
24
Perceptions of environmental sustainability amongst mineworkers
Published 2018-01-01Get full text
Article -
25
Computational intelligence in the identification of Covid-19 patients by using KNN-SVM Classifier
Published 2024-12-01Get full text
Article -
26
Value-Based and Context-Aware Selection of Software-Service Bundles: A Capability Based Method
Published 2017-04-01Get full text
Article -
27
Selected Topics on Complex Systems Informatics: Editorial Introduction to Issue 23 of CSIMQ
Published 2020-07-01Get full text
Article -
28
Resilience of Complex Systems: State of the Art and Directions for Future Research
Published 2018-01-01Get full text
Article -
29
Asset Price Dynamics in a Chartist-Fundamentalist Model with Time Delays: A Bifurcation Analysis
Published 2016-01-01Get full text
Article -
30
Product-IT Inclusive Enterprise Architecture Management: An Approach Based on Ecosystems, Customer Journey and Data-Driven Business Opportunities
Published 2021-04-01“…However, EA models capture the details of business, information and technology architecture of an enterprise (i.e., the enterprise-IT) but usually do not include the product-IT. …”
Get full text
Article -
31
Identifying Usability and Productivity Dimensions for Measuring the Success of Mobile Business Services
Published 2008-01-01Get full text
Article -
32
-
33
Information Technology and development of Small and medium Enterprises in Kabale Municipality, Kabale District.
Published 2020“…Among them were mobile phones which played a very big role in the development of the businesses such as sending and receiving money at will; and scanners through the transfer hard copy information into soft copy into the computer system that had enabled transfer and sharing of vital business information from retailers to wholesalers and general suppliers, especially when ordering for business products, transfers of receipts, invoices among others. …”
Get full text
Thesis -
34
The Business Process Reconstruction of Railway-River Combined Transportation Cloud Platform Taking China Container Export as an Example
Published 2021-01-01“…Illustrated by the example of China’s container export process, this paper explores a series of key technical issues in the cloud environment, such as application management, business information sharing, and Big Data processing, at different levels of the construction of the rail water transport cloud platform, combined with its business characteristics, and makes experimental analysis on the relevant models to verify the feasibility of the reconstruction of the rail water transport cloud platform. …”
Get full text
Article -
35
Investigating the effect of business intelligence competency dimensions on marketing performance considering the mediating role of customer relationship management
Published 2024-02-01“…This shows that one of the ways to improve marketing performance and create a sustainable competitive advantage for managers is to use business intelligence.Originality/Value: In today's highly competitive world, the quality and timeliness of business information in organizations determine the difference between survival and bankruptcy. …”
Get full text
Article -
36
-
37
Zipper Pattern: An Investigation into Psychotic Criminal Detection Using EEG Signals
Published 2025-01-01Get full text
Article -
38
IT Governance in the e-Business Era
Published 2022-10-01“…In the context of e-businesses, Information Technologies (IT) are not only simple support to companies' businesses, but they often constitute an integral part of their main activities. …”
Get full text
Article -
39
Evolution of Theoretical Approaches to the Study of Debt Security
Published 2024-06-01Get full text
Article -
40
Cyber Security of the Economy and Public Finances: Historiography and Post-War Trajectory of Development
Published 2024-06-01Get full text
Article