Kathleen M. Hargiss

Learn More
INTRODUCTION Network security measures are cumbersome and often interfere with the flow of productivity by consuming device resources (hard drive space, physical memory, bandwidth, and processor time) without contributing anything to the workflow process (Ibraham, 2010). As security becomes a greater concern among more individuals and organizations, the(More)
Existing approaches to risk management in construction procurement primarily dwell on strategies designed for commonly identifiable risk factors in typical project environments. Commonly identifiable risk factors would include too early or late material delivery-a condition typically ameliorated by implementing a Just In Time (JIT) plan; inferior(More)
This article uses seminal and contemporary literature from 1980s till 2012. It captures issues of processes, alignment and trails patches of the issues for every tri-decade. Tri-decade analysis will be organized by researching issues from beginning of a decade, moving along to mid-decade leading towards the closing of a decade. This approach will be done(More)