Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05) 2005
DOI: 10.1109/icis.2005.79
|View full text |Cite
|
Sign up to set email alerts
|

Knowledge-based compliance management systems - methodology and implementation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
2
0

Year Published

2008
2008
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 2 publications
1
2
0
Order By: Relevance
“…From our experience in developing KMS in real‐world situations and in accordance with other authors like Viswanathan, Yang, Whangbo, Kim, and Garner (2005), who highlight the common weaknesses found in KMS development methodologies in practice, we can state that one of the chief reasons for the large number of failures in implementing a KMS is the lack of an ISDM that is specifically oriented towards the development of a KMS that reduces the complexity of the process. For example, when the currently existing ISDM are applied to the development of a KMS, at some stage it becomes necessary to specify the requirements the future KMS should meet.…”
Section: Introductionsupporting
confidence: 84%
“…From our experience in developing KMS in real‐world situations and in accordance with other authors like Viswanathan, Yang, Whangbo, Kim, and Garner (2005), who highlight the common weaknesses found in KMS development methodologies in practice, we can state that one of the chief reasons for the large number of failures in implementing a KMS is the lack of an ISDM that is specifically oriented towards the development of a KMS that reduces the complexity of the process. For example, when the currently existing ISDM are applied to the development of a KMS, at some stage it becomes necessary to specify the requirements the future KMS should meet.…”
Section: Introductionsupporting
confidence: 84%
“…From our experience in developing KMS in real-world situations and in accordance with other authors like Viswanathan et al (2005), who highlight the common weaknesses found in KMS development methodologies in practice, we can state that one of the chief reasons for the large number of failures in implementing a KMS is the lack of an ISDM which is specifically oriented towards the development of a KMS that reduces the complexity of the process. For example, when the currently existing ISDM are applied to the development of a KMS, at some stage it becomes necessary to specify the requirements the future KMS should meet.…”
Section: Introductionmentioning
confidence: 55%
“…This is because cybercriminals will find data and software vulnerabilities that are used at any time, including in the banking industry. Therefore, experts must share information to face challenges and determine reactions to potential cybercrime threats such as carding related (Viswanathan et al, 2005).…”
Section: Literature Review and The Hypothesesmentioning
confidence: 99%