An investigation into the possibility of using sociological research methodologies for the elicitation of tacit knowledge for building knowledge intensive systems
Full text
Figure
Related documents
There were four focus groups (one with each group) held on the same day in each participating district with 21-26 participants representing each district, for a total of twelve
A simple, selective, precise high performance thin layer chromatography (HPTLC) method with densitometry at λ= 205 nm was developed and validated for simultaneous determination of
NSF CCLI has funded the development of this Information Security course that would enable students to help small businesses plan and audit security, via service
The five categories that present themselves in the literature review are space and time, mentalities of self-identity, community responsibility, religious philosophies,
To gain points for a position, the competitor must show clear control for 3 seconds (including takedowns and throws). 1) Advantages are submission attempts that posed a real threat
The Individuals with Disabilities Act (IDEA) requires that all identified students who qualify for special education services have a transition meeting before graduating from
Ms. Schroeder then reviewed the Engineer's Report, a copy of which is attached hereto. Schroeder then reported that BGE has completed the cathodic protection
This paper discusses Software Engineering competence remote evaluation process model suggested within a methodology of Master Program Learning Outcome (LO)