Search dblp for Publications

export results for "toc:db/journals/jitedc/jitedc6.bht:"

 download as .bib file

@article{DBLP:journals/jitedc/BerndtLM17,
  author       = {Donald J. Berndt and
                  Ricardo Lasa and
                  James A. McCart},
  title        = {SiteWit Corporation: {SQL} or NoSQL? That is the Question!},
  journal      = {J. Inf. Technol. Educ. Discuss. Cases},
  volume       = {6},
  pages        = {4},
  year         = {2017},
  url          = {https://doi.org/10.28945/3920},
  doi          = {10.28945/3920},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jitedc/BerndtLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jitedc/CupidoB17,
  author       = {Kim Cupido and
                  Jean{-}Paul Van Belle},
  title        = {A Digitally Enabled Strategic Sourcing Process to Mitigate Risk},
  journal      = {J. Inf. Technol. Educ. Discuss. Cases},
  volume       = {6},
  pages        = {8},
  year         = {2017},
  url          = {https://doi.org/10.28945/3924},
  doi          = {10.28945/3924},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jitedc/CupidoB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jitedc/ElderJRW17,
  author       = {Jonathan Elder and
                  Nicole Jacobson and
                  Natalie Remsen and
                  Kim Wilmath},
  title        = {Behind Enemy Lines},
  journal      = {J. Inf. Technol. Educ. Discuss. Cases},
  volume       = {6},
  pages        = {12},
  year         = {2017},
  url          = {https://doi.org/10.28945/3928},
  doi          = {10.28945/3928},
  timestamp    = {Fri, 22 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jitedc/ElderJRW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jitedc/GasantB17,
  author       = {Kaasiefa Gasant and
                  Jean{-}Paul Van Belle},
  title        = {LifeInsure: Choosing a {PAS} to Manage and Maintain Their Product
                  Lifecycle},
  journal      = {J. Inf. Technol. Educ. Discuss. Cases},
  volume       = {6},
  pages        = {5},
  year         = {2017},
  url          = {https://doi.org/10.28945/3921},
  doi          = {10.28945/3921},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jitedc/GasantB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jitedc/GillR17,
  author       = {Grandon Gill and
                  Bernardo Rodrigues},
  title        = {Employing Dynamic Logic in Cybersecurity},
  journal      = {J. Inf. Technol. Educ. Discuss. Cases},
  volume       = {6},
  pages        = {11},
  year         = {2017},
  url          = {https://doi.org/10.28945/3927},
  doi          = {10.28945/3927},
  timestamp    = {Fri, 22 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jitedc/GillR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jitedc/Hammond17,
  author       = {Robert W. Hammond},
  title        = {How to Grow Revenues in an uncertain World?},
  journal      = {J. Inf. Technol. Educ. Discuss. Cases},
  volume       = {6},
  pages        = {2},
  year         = {2017},
  url          = {https://doi.org/10.28945/3650},
  doi          = {10.28945/3650},
  timestamp    = {Fri, 22 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jitedc/Hammond17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jitedc/HoeckerBBES17,
  author       = {Jay Hoecker and
                  Debbie Bernal and
                  Alex Brito and
                  Arda Ergonen and
                  Richard Stiftinger},
  title        = {These Models Need Enterprise Data Management!},
  journal      = {J. Inf. Technol. Educ. Discuss. Cases},
  volume       = {6},
  pages        = {1},
  year         = {2017},
  url          = {https://doi.org/10.28945/3651},
  doi          = {10.28945/3651},
  timestamp    = {Fri, 22 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jitedc/HoeckerBBES17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jitedc/JohnstonG17,
  author       = {Kevin A. Johnston and
                  Grandon Gill},
  title        = {Standard Bank: The Agile Transformation},
  journal      = {J. Inf. Technol. Educ. Discuss. Cases},
  volume       = {6},
  pages        = {7},
  year         = {2017},
  url          = {https://doi.org/10.28945/3923},
  doi          = {10.28945/3923},
  timestamp    = {Fri, 22 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jitedc/JohnstonG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jitedc/MohammedSDN17,
  author       = {Taufeeq Mohammed and
                  Utkarsh Shrivastava and
                  Ashish K. Das and
                  Quynh Thi Nguyen},
  title        = {Grandon.com Got Hacked!},
  journal      = {J. Inf. Technol. Educ. Discuss. Cases},
  volume       = {6},
  pages        = {10},
  year         = {2017},
  url          = {https://doi.org/10.28945/3926},
  doi          = {10.28945/3926},
  timestamp    = {Fri, 22 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jitedc/MohammedSDN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jitedc/Montgomery17,
  author       = {Troy A. Montgomery},
  title        = {Cost estimating - Make or Buy?},
  journal      = {J. Inf. Technol. Educ. Discuss. Cases},
  volume       = {6},
  pages        = {3},
  year         = {2017},
  url          = {https://doi.org/10.28945/3649},
  doi          = {10.28945/3649},
  timestamp    = {Fri, 22 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jitedc/Montgomery17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jitedc/ShrivastavaM17,
  author       = {Utkarsh Shrivastava and
                  Taufeeq Mohammed},
  title        = {A Cybersecurity Executive DBA?},
  journal      = {J. Inf. Technol. Educ. Discuss. Cases},
  volume       = {6},
  pages        = {9},
  year         = {2017},
  url          = {https://doi.org/10.28945/3925},
  doi          = {10.28945/3925},
  timestamp    = {Fri, 22 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jitedc/ShrivastavaM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jitedc/ThomasB17,
  author       = {Marc Thomas and
                  Jean{-}Paul Van Belle},
  title        = {Virtualization Footprint: Why Re-Invest?},
  journal      = {J. Inf. Technol. Educ. Discuss. Cases},
  volume       = {6},
  pages        = {6},
  year         = {2017},
  url          = {https://doi.org/10.28945/3922},
  doi          = {10.28945/3922},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jitedc/ThomasB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics