Keyphrases
Addiction
14%
Agile Practices
25%
Agile Software Development
14%
Andean Countries
14%
Application Layer
57%
Assigned Task
18%
Attack Detection
46%
Cloud-based
14%
Comprehensive Management
28%
Critical Success Factors
56%
Customer Experience
14%
Customer Journey
14%
Data Envelopment Analysis
28%
DDoS Attack
39%
DDoS Detection
28%
Deaf children
14%
Decision Tree
14%
Desertion
16%
Detection Mechanism
17%
Digital Experience
14%
Distributed Denial of Service (DDoS)
42%
Dropout
35%
Dynamism
18%
Ecuador
23%
Educational Systems Design
14%
Elicitation Methods
14%
Enterprise Content Management
42%
Entrepreneurial Process
19%
Entrepreneurial Success
19%
Entrepreneurs
19%
Entrepreneurship
19%
Entrepreneurship Process
19%
Environmental Levels
35%
Environmental Sustainability
14%
ERP Systems
14%
Evaluation Model
14%
Gamification
14%
Healthcare Fraud
14%
Industry Studies
14%
Information Technology
21%
Information Technology Application
14%
Information Technology Use
14%
Internet Governance
28%
IT Governance
14%
Jewelry
14%
Layered Structure
14%
Making Decisions
16%
Management Model
71%
Manufacturing Sector
14%
Microenvironment
22%
Multi-agent Systems
14%
Negative Effects
19%
Neural Network
28%
New Factors
54%
Nonlinear Programming
14%
Peru
48%
Peruvian
17%
Predicting Dropout
16%
Productivity Assessment
28%
Productivity Factors
42%
Protein Folding Prediction
14%
Quality Assurance Model
14%
Quality-oriented
14%
Radial Basis Function
19%
Reading Instruction
14%
Real Users
23%
Requirements Elicitation
28%
Requirements Elicitation Process
23%
Retail Sector
14%
Scoping Review
14%
Service Model
28%
Small to Medium Size Enterprises
23%
SMEs
14%
Social Networks
21%
Software Development
23%
Software Factory
100%
Software Process
29%
Software Production
18%
Software Quality
42%
Software Requirements Elicitation
14%
Solid Waste Collection
14%
Student Dropout
23%
System Database
14%
Systematic Literature Review
77%
Technological Factors
14%
Technological Transfer
14%
Technology Startups
28%
Technology Transfer
19%
Technology Transfer Process
14%
Tree Structure
14%
Trust Region Method
14%
University Level
14%
Urban municipality
14%
User Behavior
28%
User Feature
14%
Video Games
14%
Waste Transportation
14%
Web User
16%
Women Entrepreneurship
28%
Work Unit
25%
Computer Science
Absorptive Capacity
14%
Agile Development
14%
Agile Practice
28%
Agile Software Development
14%
Application Layer
57%
Assurance Model
14%
Attackers
7%
Case Study
28%
Change Government
14%
Classification Algorithm
10%
Classifier Structure
14%
Collaboration and Communication
14%
Computer Science
7%
Computer Service
5%
Computer System
14%
Content Management
42%
Continuous Process
14%
Critical Success Factor
52%
Customer Experience
14%
Customer Satisfaction
5%
Data Envelopment Analysis
28%
database
14%
Detection Accuracy
7%
Detection Mechanism
17%
Detection Method
5%
Detection Rate
10%
Distributed Denial of Service Attack
42%
Document Management
11%
Dynamic Bayesian Network
14%
e-government
14%
Elicitation Process
32%
Evaluation Models
14%
Good Requirement
14%
Google Analytics
7%
Government System
10%
Influence Factor
16%
Information and Communication Technology
7%
Information Interaction
7%
Information Technology
28%
Learning System
21%
Legitimate User
7%
Machine Learning
21%
Manufacturing Sector
14%
Model Management
28%
Multiclass Case
14%
Multiclass Classifier
14%
Negative Effect
7%
Nested Dichotomy
14%
Network Layer
7%
Network Modeling
14%
Neural Network
14%
Neural Network Approach
7%
Open Source
14%
Organizational Behavior
19%
Project Management Practice
7%
Project Portfolio
14%
Quality Attribute
13%
Quality Characteristic
7%
Quality Management
28%
quality model
9%
quality of software
14%
Radial Basis Function
14%
Related Factor
14%
Requirement Elicitation
28%
Research Question
16%
Response Time
11%
Robot
14%
School Professional
14%
Search Engine
14%
Selection Criterion
14%
Sized Enterprise
14%
Small and Medium Enterprise
9%
Social Network
21%
Social Security
14%
Software Development
44%
Software Factory
57%
Software Production
18%
Software Quality
19%
Software Requirements
14%
Speed-up
5%
Structural Equation
16%
Supervised Method
14%
Technological Capability
14%
Traffic Network
7%
User Behavior
28%
Value Chain
7%
Victim Machine
7%
Web Page
10%
web user
24%
Xception
9%