{"id":2453,"date":"2024-01-16T11:39:04","date_gmt":"2024-01-16T09:39:04","guid":{"rendered":"https:\/\/oxy-bi.rtu.lv\/?page_id=2453"},"modified":"2025-09-05T14:37:03","modified_gmt":"2025-09-05T12:37:03","slug":"publications-and-projects","status":"publish","type":"page","link":"https:\/\/bi.rtu.lv\/en\/publications-and-projects\/","title":{"rendered":"Publications and Projects"},"content":{"rendered":"<div id=\"div_block-8-2453\" class=\"ct-div-block\" ><h1 id=\"headline-5-2453\" class=\"ct-headline\">Projects<\/h1><div id=\"text_block-22-2453\" class=\"ct-text-block\" >The results of various projects completed by the students of the Business Informatics program are listed below.<br><br><\/div><main id=\"div_block-430-2453\" class=\"ct-div-block oxel_accordion\" ><list id=\"code_block-431-2453\" class=\"ct-code-block\" ><!-- --><\/list><button id=\"div_block-432-2453\" class=\"ct-div-block oxel_accordion__row\"  aria-expanded=\"false\"><div id=\"div_block-433-2453\" class=\"ct-div-block oxel_accordion__row_left\" ><div id=\"fancy_icon-434-2453\" class=\"ct-fancy-icon oxel_accordion__icon\" ><svg id=\"svg-fancy_icon-434-2453\"><use xlink:href=\"#BI_Logoicon-image2vector\"><\/use><\/svg><\/div><\/div><h2 id=\"headline-306-2453\" class=\"ct-headline\">Small and Medium Enterprise(SME)-AI-Toolkit<br><\/h2><div id=\"fancy_icon-436-2453\" class=\"ct-fancy-icon oxel_accordion__icon\" ><svg id=\"svg-fancy_icon-436-2453\"><use xlink:href=\"#Lineariconsicon-chevron-down\"><\/use><\/svg><\/div><\/button><div id=\"div_block-437-2453\" class=\"ct-div-block oxel_accordion__content oxel_accordion__content__hidden\" ><div id=\"div_block-305-2453\" class=\"ct-div-block\" ><div id=\"div_block-371-2453\" class=\"ct-div-block\" ><div id=\"div_block-372-2453\" class=\"ct-div-block\" ><div id=\"text_block-373-2453\" class=\"ct-text-block\" ><b>by Gulbe Rasa<\/b><br><\/div><a id=\"link-374-2453\" class=\"ct-link\" href=\"https:\/\/www.linkedin.com\/in\/rasa-gulbe\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" id=\"image-375-2453\" alt=\"\" src=\"https:\/\/bi.rtu.lv\/wp-content\/uploads\/6WtDIesg_400x400-1.png\" class=\"ct-image\" srcset-disabled=\"https:\/\/bi.rtu.lv\/wp-content\/uploads\/6WtDIesg_400x400-1.png 400w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/6WtDIesg_400x400-1-150x150.png 150w\" sizes=\"(max-width: 400px) 100vw, 400px\" title=\"\"><\/a><\/div><\/div><div id=\"text_block-307-2453\" class=\"ct-text-block\" >Recent advances in artificial intelligence have reignited interest in how it can enable the digital transformation of organizations. Considering the slow pace at which SMEs adopt AI, a wealth of support documents in the form of guidelines, frameworks, and toolkits have been created to aid AI uptake. However, past research shows that no single support document considers all aspects to be relevant to SMEs.<br><\/div><div id=\"div_block-370-2453\" class=\"ct-div-block\" ><a id=\"link-308-2453\" class=\"ct-link\" href=\"https:\/\/github.com\/rasagu\/SME-AI-Toolkit?tab=readme-ov-file\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" id=\"image-309-2453\" alt=\"\" src=\"https:\/\/bi.rtu.lv\/wp-content\/uploads\/332155674-50ae92da-11e5-409b-ac28-0593d0d262c1-960x651.png\" class=\"ct-image\" srcset-disabled=\"https:\/\/bi.rtu.lv\/wp-content\/uploads\/332155674-50ae92da-11e5-409b-ac28-0593d0d262c1-960x651.png 960w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/332155674-50ae92da-11e5-409b-ac28-0593d0d262c1-768x521.png 768w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/332155674-50ae92da-11e5-409b-ac28-0593d0d262c1-480x326.png 480w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/332155674-50ae92da-11e5-409b-ac28-0593d0d262c1-640x434.png 640w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/332155674-50ae92da-11e5-409b-ac28-0593d0d262c1-720x489.png 720w\" sizes=\"(max-width: 960px) 100vw, 960px\" title=\"\"><\/a><\/div><\/div><\/div><button id=\"div_block-1565-2453\" class=\"ct-div-block oxel_accordion__row\"  aria-expanded=\"false\"><div id=\"div_block-1566-2453\" class=\"ct-div-block oxel_accordion__row_left\" ><div id=\"fancy_icon-1567-2453\" class=\"ct-fancy-icon oxel_accordion__icon\" ><svg id=\"svg-fancy_icon-1567-2453\"><use xlink:href=\"#BI_Logoicon-image2vector\"><\/use><\/svg><\/div><\/div><h2 id=\"headline-1568-2453\" class=\"ct-headline\">An ArchiMate-Based Thematic Knowledge Graph for Low-Code Software Development Domain<br><\/h2><div id=\"fancy_icon-1569-2453\" class=\"ct-fancy-icon oxel_accordion__icon\" ><svg id=\"svg-fancy_icon-1569-2453\"><use xlink:href=\"#Lineariconsicon-chevron-down\"><\/use><\/svg><\/div><\/button><div id=\"div_block-1571-2453\" class=\"ct-div-block oxel_accordion__content oxel_accordion__content__hidden\" ><div id=\"div_block-365-2453\" class=\"ct-div-block\" ><div id=\"div_block-376-2453\" class=\"ct-div-block\" ><div id=\"div_block-377-2453\" class=\"ct-div-block\" ><div id=\"text_block-378-2453\" class=\"ct-text-block\" ><b>by K\u0101rlis Ro\u0137is<\/b><br><\/div><a id=\"link-379-2453\" class=\"ct-link\" href=\"https:\/\/www.linkedin.com\/in\/k\u0101rlis-ro\u0137is-462623170\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" id=\"image-380-2453\" alt=\"\" src=\"https:\/\/bi.rtu.lv\/wp-content\/uploads\/6WtDIesg_400x400-1.png\" class=\"ct-image\" srcset-disabled=\"https:\/\/bi.rtu.lv\/wp-content\/uploads\/6WtDIesg_400x400-1.png 400w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/6WtDIesg_400x400-1-150x150.png 150w\" sizes=\"(max-width: 400px) 100vw, 400px\" title=\"\"><\/a><\/div><\/div><div id=\"text_block-367-2453\" class=\"ct-text-block\" >This porject illustrates, how ArchiMate modelling language can be applied as the ontology level of a knowledge graph for representing knowledge that concerns an enterprise. In particular, the ArchiMate-based knowledge graph is proposed for representing knowledge about low-code software development with the purpose to make this knowledge available for enterprise management.<br><\/div><a id=\"link-368-2453\" class=\"ct-link\" href=\"https:\/\/github.com\/KarlisRokis\/LCD-and-Business-Objectives-Relation-Model\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" id=\"image-369-2453\" alt=\"\" src=\"https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-06-17-at-2.56.49-PM.png\" class=\"ct-image\" srcset-disabled=\"https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-06-17-at-2.56.49-PM.png 2708w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-06-17-at-2.56.49-PM-960x381.png 960w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-06-17-at-2.56.49-PM-1920x761.png 1920w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-06-17-at-2.56.49-PM-768x305.png 768w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-06-17-at-2.56.49-PM-1536x609.png 1536w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-06-17-at-2.56.49-PM-2048x812.png 2048w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-06-17-at-2.56.49-PM-480x190.png 480w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-06-17-at-2.56.49-PM-640x254.png 640w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-06-17-at-2.56.49-PM-720x286.png 720w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-06-17-at-2.56.49-PM-1168x463.png 1168w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-06-17-at-2.56.49-PM-1440x571.png 1440w\" sizes=\"(max-width: 2708px) 100vw, 2708px\" title=\"\"><\/a><\/div><\/div><button id=\"div_block-1594-2453\" class=\"ct-div-block oxel_accordion__row\"  aria-expanded=\"false\"><div id=\"div_block-1595-2453\" class=\"ct-div-block oxel_accordion__row_left\" ><div id=\"fancy_icon-1596-2453\" class=\"ct-fancy-icon oxel_accordion__icon\" ><svg id=\"svg-fancy_icon-1596-2453\"><use xlink:href=\"#BI_Logoicon-image2vector\"><\/use><\/svg><\/div><\/div><h2 id=\"headline-1597-2453\" class=\"ct-headline\">Website for DevOps Adoption Methods <br><\/h2><div id=\"fancy_icon-1598-2453\" class=\"ct-fancy-icon oxel_accordion__icon\" ><svg id=\"svg-fancy_icon-1598-2453\"><use xlink:href=\"#Lineariconsicon-chevron-down\"><\/use><\/svg><\/div><\/button><div id=\"div_block-1584-2453\" class=\"ct-div-block oxel_accordion__content oxel_accordion__content__hidden\" ><div id=\"div_block-27-2453\" class=\"ct-div-block\" ><div id=\"div_block-381-2453\" class=\"ct-div-block\" ><div id=\"div_block-382-2453\" class=\"ct-div-block\" ><div id=\"text_block-383-2453\" class=\"ct-text-block\" ><b>by Ineta B\u016bcena<\/b><br><\/div><a id=\"link-384-2453\" class=\"ct-link\" href=\"https:\/\/www.linkedin.com\/in\/ineta-bucena-32935334\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" id=\"image-385-2453\" alt=\"\" src=\"https:\/\/bi.rtu.lv\/wp-content\/uploads\/6WtDIesg_400x400-1.png\" class=\"ct-image\" srcset-disabled=\"https:\/\/bi.rtu.lv\/wp-content\/uploads\/6WtDIesg_400x400-1.png 400w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/6WtDIesg_400x400-1-150x150.png 150w\" sizes=\"(max-width: 400px) 100vw, 400px\" title=\"\"><\/a><\/div><\/div><div id=\"text_block-30-2453\" class=\"ct-text-block\" >This website accumulates different practices and tools that can be utilized for DevOps adoption in companies with less than 25 employees. <\/div><a id=\"link-32-2453\" class=\"ct-link\" href=\"https:\/\/devopsadoptmeth.wordpress.com\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" id=\"image-31-2453\" alt=\"\" src=\"https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-2.53.53-PM.png\" class=\"ct-image\" srcset-disabled=\"https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-2.53.53-PM.png 2880w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-2.53.53-PM-960x546.png 960w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-2.53.53-PM-1920x1092.png 1920w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-2.53.53-PM-768x437.png 768w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-2.53.53-PM-1536x874.png 1536w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-2.53.53-PM-2048x1165.png 2048w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-2.53.53-PM-480x273.png 480w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-2.53.53-PM-640x364.png 640w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-2.53.53-PM-720x410.png 720w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-2.53.53-PM-1168x664.png 1168w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-2.53.53-PM-1440x819.png 1440w\" sizes=\"(max-width: 2880px) 100vw, 2880px\" title=\"\"><\/a><\/div><\/div><button id=\"div_block-1601-2453\" class=\"ct-div-block oxel_accordion__row\"  aria-expanded=\"false\"><div id=\"div_block-1602-2453\" class=\"ct-div-block oxel_accordion__row_left\" ><div id=\"fancy_icon-1603-2453\" class=\"ct-fancy-icon oxel_accordion__icon\" ><svg id=\"svg-fancy_icon-1603-2453\"><use xlink:href=\"#BI_Logoicon-image2vector\"><\/use><\/svg><\/div><\/div><h2 id=\"headline-1604-2453\" class=\"ct-headline\">Website for Continous Requirements Engineering for Start-Ups  <br><\/h2><div id=\"fancy_icon-1605-2453\" class=\"ct-fancy-icon oxel_accordion__icon\" ><svg id=\"svg-fancy_icon-1605-2453\"><use xlink:href=\"#Lineariconsicon-chevron-down\"><\/use><\/svg><\/div><\/button><div id=\"div_block-1607-2453\" class=\"ct-div-block oxel_accordion__content oxel_accordion__content__hidden\" ><div id=\"div_block-33-2453\" class=\"ct-div-block\" ><div id=\"div_block-386-2453\" class=\"ct-div-block\" ><div id=\"div_block-387-2453\" class=\"ct-div-block\" ><div id=\"text_block-388-2453\" class=\"ct-text-block\" ><b>by Kaspars Purmalietis<\/b><br><\/div><a id=\"link-389-2453\" class=\"ct-link\" href=\"https:\/\/www.linkedin.com\/in\/kasparskoo\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" id=\"image-390-2453\" alt=\"\" src=\"https:\/\/bi.rtu.lv\/wp-content\/uploads\/6WtDIesg_400x400-1.png\" class=\"ct-image\" srcset-disabled=\"https:\/\/bi.rtu.lv\/wp-content\/uploads\/6WtDIesg_400x400-1.png 400w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/6WtDIesg_400x400-1-150x150.png 150w\" sizes=\"(max-width: 400px) 100vw, 400px\" title=\"\"><\/a><\/div><\/div><div id=\"text_block-35-2453\" class=\"ct-text-block\" >This website describes and helps implement a framework (Lean analytics framework ) that enables continuous requirements engineering in start-ups.<br><\/div><a id=\"link-36-2453\" class=\"ct-link\" href=\"https:\/\/kasparskoo.wixsite.com\/crefsu\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" id=\"image-37-2453\" alt=\"\" src=\"https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-3.11.55-PM.png\" class=\"ct-image\" srcset-disabled=\"https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-3.11.55-PM.png 2880w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-3.11.55-PM-960x546.png 960w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-3.11.55-PM-1920x1092.png 1920w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-3.11.55-PM-768x437.png 768w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-3.11.55-PM-1536x874.png 1536w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-3.11.55-PM-2048x1165.png 2048w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-3.11.55-PM-480x273.png 480w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-3.11.55-PM-640x364.png 640w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-3.11.55-PM-720x410.png 720w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-3.11.55-PM-1168x664.png 1168w, https:\/\/bi.rtu.lv\/wp-content\/uploads\/Screenshot-2024-01-16-at-3.11.55-PM-1440x819.png 1440w\" sizes=\"(max-width: 2880px) 100vw, 2880px\" title=\"\"><\/a><\/div><\/div><\/main><\/div><div id=\"div_block-6-2453\" class=\"ct-div-block\" ><h1 id=\"headline-3-2453\" class=\"ct-headline\"><br><br>Publications<\/h1><div id=\"text_block-10-2453\" class=\"ct-text-block\" >The research articles published by the students of the Business Informatics program are listed below.<br><\/div><div id=\"div_block-11-2453\" class=\"ct-div-block\" ><div id=\"div_block-361-2453\" class=\"ct-div-block\" ><h2 id=\"headline-13-2453\" class=\"ct-headline\">Structuring complexity: A functional evaluation of Jira tools for requirements management&nbsp;<br><\/h2><a id=\"link-363-2453\" class=\"ct-link\" href=\"https:\/\/ceur-ws.org\/Vol-4034\/paper98.pdf\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-364-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-364-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-14-2453\" class=\"ct-text-block\" ><b><\/b><b>Rozenberga A.<\/b><b><\/b><br><\/div><div id=\"text_block-15-2453\" class=\"ct-text-block\" >Joint Proceedings of the BIR 2025 Workshops and Doctoral Consortium co-located with 24th International Conference on Perspectives in Business Informatics Research (BIR 2025), CEUR Workshop Proceedings, vol. 4034, pp. 131\u2013142.<br><\/div><\/div><div id=\"div_block-1672-2453\" class=\"ct-div-block\" ><div id=\"div_block-1673-2453\" class=\"ct-div-block\" ><h2 id=\"headline-1674-2453\" class=\"ct-headline\">Addressing functionality gaps, data integrity, and system interoperability in enterprise systems&nbsp;<br><\/h2><a id=\"link-1675-2453\" class=\"ct-link\" href=\"https:\/\/ceur-ws.org\/Vol-4034\/paper90.pdf\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-1676-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-1676-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-1677-2453\" class=\"ct-text-block\" ><b><\/b><b>Gaigals M.<\/b><b><\/b><br><\/div><div id=\"text_block-1678-2453\" class=\"ct-text-block\" >Joint Proceedings of the BIR 2025 Workshops and Doctoral Consortium co-located with 24th International Conference on Perspectives in Business Informatics Research (BIR 2025), CEUR Workshop Proceedings, vol. 4034, pp. 96\u2013107.<br><\/div><\/div><div id=\"div_block-1665-2453\" class=\"ct-div-block\" ><div id=\"div_block-1666-2453\" class=\"ct-div-block\" ><h2 id=\"headline-1667-2453\" class=\"ct-headline\">Toward a knowledge management method for training customer support AI agents&nbsp;<br><\/h2><a id=\"link-1668-2453\" class=\"ct-link\" href=\"https:\/\/ceur-ws.org\/Vol-4034\/paper80.pdf\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-1669-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-1669-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-1670-2453\" class=\"ct-text-block\" ><b><\/b><b>Dzenuska E.<\/b>, Rudzajs P.<b><\/b><br><\/div><div id=\"text_block-1671-2453\" class=\"ct-text-block\" >Joint Proceedings of the BIR 2025 Workshops and Doctoral Consortium co-located with 24th International Conference on Perspectives in Business Informatics Research (BIR 2025), CEUR Workshop Proceedings, vol. 4034, pp. 70\u201383.<br><\/div><\/div><div id=\"div_block-1658-2453\" class=\"ct-div-block\" ><div id=\"div_block-1659-2453\" class=\"ct-div-block\" ><h2 id=\"headline-1660-2453\" class=\"ct-headline\">Interdependency-Aware Business Process Prioritization for Process Improvements&nbsp;<br><\/h2><a id=\"link-1661-2453\" class=\"ct-link\" href=\"https:\/\/doi.org\/10.1007\/978-3-031-95397-2_3\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-1662-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-1662-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-1663-2453\" class=\"ct-text-block\" ><b><\/b><b>Lubane, L.,<\/b> Kirikova, M.<b><\/b><br><\/div><div id=\"text_block-1664-2453\" class=\"ct-text-block\" >In: Guizzardi, R., Pufahl, L., Sturm, A., van der Aa, H. (eds) Enterprise, Business-Process and Information Systems Modeling. BPMDS EMMSAD 2025 2025. Lecture Notes in Business Information Processing, vol 558. Springer, Cham.<br><\/div><\/div><div id=\"div_block-1651-2453\" class=\"ct-div-block\" ><div id=\"div_block-1652-2453\" class=\"ct-div-block\" ><h2 id=\"headline-1653-2453\" class=\"ct-headline\">Methodology for Analysing LMS Data to Predict Student Droput Risk in Higher Education&nbsp;<br><\/h2><a id=\"link-1654-2453\" class=\"ct-link\" href=\"https:\/\/journals.rta.lv\/index.php\/ETR\/article\/view\/8613\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-1655-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-1655-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-1656-2453\" class=\"ct-text-block\" ><b><\/b>Barbare L., Jurenoks A., Rauba M., <b>Vi\u0161\u0137ere Z.<\/b><br><\/div><div id=\"text_block-1657-2453\" class=\"ct-text-block\" >Published in: Environment Technology Resources. Proceedings of the 16th International Scientific and Practical Conference, vol. 2, pp. 57\u201364, 2025<br><\/div><\/div><div id=\"div_block-1644-2453\" class=\"ct-div-block\" ><div id=\"div_block-1645-2453\" class=\"ct-div-block\" ><h2 id=\"headline-1646-2453\" class=\"ct-headline\">Suitability of Business Process Modeling Methods for Requirements Elicitation&nbsp;<br><\/h2><a id=\"link-1647-2453\" class=\"ct-link\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-71333-0_11\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-1648-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-1648-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-1649-2453\" class=\"ct-text-block\" ><b>Kraup\u0161a L.I.<\/b>, Kirikova M.<br><\/div><div id=\"text_block-1650-2453\" class=\"ct-text-block\" >Published in: Perspectives in Business Informatics Research. BIR 2024. Lecture Notes in Business Information Processing, 2025, vol 529,&nbsp;pp 162\u2013175<br><\/div><\/div><div id=\"div_block-1637-2453\" class=\"ct-div-block\" ><div id=\"div_block-1638-2453\" class=\"ct-div-block\" ><h2 id=\"headline-1639-2453\" class=\"ct-headline\">Automated data science project knowledge graph construction using a document retrieval augmented generation pipeline<br><\/h2><a id=\"link-1640-2453\" class=\"ct-link\" href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=5198936\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-1641-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-1641-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-1642-2453\" class=\"ct-text-block\" ><b>Kumarasinghe A.<\/b>, Kirikova M.<br><\/div><div id=\"text_block-1643-2453\" class=\"ct-text-block\" >Published in:&nbsp;SSRN, 2025<br><\/div><\/div><div id=\"div_block-1630-2453\" class=\"ct-div-block\" ><div id=\"div_block-1631-2453\" class=\"ct-div-block\" ><h2 id=\"headline-1632-2453\" class=\"ct-headline\">Knowledge Graph for Reusing Research Knowledge on Related Work in Data Analytics<br><\/h2><a id=\"link-1633-2453\" class=\"ct-link\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-61003-5_17\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-1634-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-1634-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-1635-2453\" class=\"ct-text-block\" ><b>Kumarasinghe A.<\/b>,  Kirikova M.<br><\/div><div id=\"text_block-1636-2453\" class=\"ct-text-block\" >Published in:&nbsp;Advanced Information Systems Engineering Workshops. CAiSE 2024. Lecture Notes in Business Information Processing, 2024, vol 521,&nbsp;pp 186\u2013199<br><\/div><\/div><div id=\"div_block-1615-2453\" class=\"ct-div-block\" ><div id=\"div_block-1616-2453\" class=\"ct-div-block\" ><h2 id=\"headline-1617-2453\" class=\"ct-headline\">Requirements Template for Analytics Projects<br><\/h2><a id=\"link-1618-2453\" class=\"ct-link\" href=\"https:\/\/csimq-journals.rtu.lv\/csimq\/article\/view\/csimq.2024-39.04\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-1619-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-1619-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-1620-2453\" class=\"ct-text-block\" ><b>Kumarasinghe A., <\/b>Kirikova M.<br><\/div><div id=\"text_block-1621-2453\" class=\"ct-text-block\" >Published in:&nbsp;Complex Systems Informatics and Modeling Quarterly, 2024, No. 39, pp.65-85.<br><\/div><\/div><div id=\"div_block-1608-2453\" class=\"ct-div-block\" ><div id=\"div_block-1609-2453\" class=\"ct-div-block\" ><h2 id=\"headline-1610-2453\" class=\"ct-headline\">Survey on Organizational Chat Conversation Analysis: Exploring Dialogue Summarization from a Knowledge Discovery Perspective.<br><\/h2><a id=\"link-1611-2453\" class=\"ct-link\" href=\"https:\/\/csimq-journals.rtu.lv\/article\/view\/csimq.2024-39.05\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-1612-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-1612-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-1613-2453\" class=\"ct-text-block\" ><b>Kosilova K.<\/b>, Birzniece I.<br><\/div><div id=\"text_block-1614-2453\" class=\"ct-text-block\" >Published in:&nbsp;Complex Systems Informatics and Modeling Quarterly, 2024, No. 39, pp.86-104.<br><\/div><\/div><div id=\"div_block-423-2453\" class=\"ct-div-block\" ><div id=\"div_block-424-2453\" class=\"ct-div-block\" ><h2 id=\"headline-425-2453\" class=\"ct-headline\">Using Topological Functioning Model to Support Event-Driven Solutions<br><\/h2><a id=\"link-426-2453\" class=\"ct-link\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-09850-5_9\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-427-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-427-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-428-2453\" class=\"ct-text-block\" ><b>Deharam, S. T.<\/b>, Alksnis, G.<br><\/div><div id=\"text_block-429-2453\" class=\"ct-text-block\" >Published in:&nbsp;International Baltic Conference on Digital Business and Intelligent Systems 2022 Jun 27 (pp. 125-135). Cham: Springer International Publishing.<br><\/div><\/div><div id=\"div_block-415-2453\" class=\"ct-div-block\" ><div id=\"div_block-416-2453\" class=\"ct-div-block\" ><h2 id=\"headline-417-2453\" class=\"ct-headline\">A Conceptual Model of Digital Immune System to Increase the Resilience of Technology Ecosystems<br><\/h2><a id=\"link-418-2453\" class=\"ct-link\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-59465-6_6\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-419-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-419-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-420-2453\" class=\"ct-text-block\" ><b>Krauze B.<\/b>, Grabis J.<br><\/div><div id=\"text_block-421-2453\" class=\"ct-text-block\" >Published in:&nbsp;International Conference on Research Challenges in Information Science (pp. 82-96). Cham: Springer Nature Switzerland.<br><\/div><\/div><div id=\"div_block-407-2453\" class=\"ct-div-block\" ><div id=\"div_block-408-2453\" class=\"ct-div-block\" ><h2 id=\"headline-409-2453\" class=\"ct-headline\">Towards Simplifying the Use of Self-Services<br><\/h2><a id=\"link-410-2453\" class=\"ct-link\" href=\"https:\/\/ceur-ws.org\/Vol-3698\/paper3.pdf\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-411-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-411-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-412-2453\" class=\"ct-text-block\" ><b>Kalnins K.<\/b>, Kirikova M.<br><\/div><div id=\"text_block-413-2453\" class=\"ct-text-block\" >Published in:&nbsp;Baltic DB&amp;IS Conference Forum and Doctoral Consortium 2024<br><\/div><\/div><div id=\"div_block-399-2453\" class=\"ct-div-block\" ><div id=\"div_block-400-2453\" class=\"ct-div-block\" ><h2 id=\"headline-401-2453\" class=\"ct-headline\">Convergence Approach for Electricity Balancing Information System Delivery<br><\/h2><a id=\"link-402-2453\" class=\"ct-link\" href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10586678\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-403-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-403-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-404-2453\" class=\"ct-text-block\" ><b>Graudone J.<\/b>, Haidabrus B., Kirikova M., Grabis J. <br><\/div><div id=\"text_block-405-2453\" class=\"ct-text-block\" >Published in:&nbsp;2024 IEEE 11th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE) (pp. 1-6). IEEE.<\/div><\/div><div id=\"div_block-391-2453\" class=\"ct-div-block\" ><div id=\"div_block-392-2453\" class=\"ct-div-block\" ><h2 id=\"headline-393-2453\" class=\"ct-headline\">Systematic Literature Review of Agile Framework Application for IT System Development in Public Sector. <\/h2><a id=\"link-394-2453\" class=\"ct-link\" href=\"https:\/\/ceur-ws.org\/Vol-3414\/paper-2.pdf\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-395-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-395-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-396-2453\" class=\"ct-text-block\" ><b>Graudone J.<\/b>, Kirikova M<\/div><div id=\"text_block-397-2453\" class=\"ct-text-block\" >Published in:&nbsp;Agil-ISE 2023: 2nd International Workshop on Agile Methods for Information Systems Engineering (Agil-ISE 2023): Short Paper Proceedings of the Second International Workshop on Agile Methods for Information Systems Engineering (Agil-ISE 2023) co-located with the 35th International Conference on Advanced Information Systems Engineering (CAiSE 2023). CEUR Workshop Proceedings. Vol.3414, Spain, Zaragoza, 13-13 June, 2023. Aachen: RWTH, 2023, pp.10-16. <\/div><\/div><div id=\"div_block-16-2453\" class=\"ct-div-block\" ><div id=\"div_block-357-2453\" class=\"ct-div-block\" ><h2 id=\"headline-17-2453\" class=\"ct-headline\">A Weighted Knowledge Graph for Representing the Results of a Systematic Literature Review. <\/h2><a id=\"link-359-2453\" class=\"ct-link\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-34985-0_13\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-360-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-360-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-18-2453\" class=\"ct-text-block\" ><b>Graudone J.<\/b>, Kirikova M<\/div><div id=\"text_block-19-2453\" class=\"ct-text-block\" >Published in: Advanced Information Systems Engineering Workshops: CAiSE 2023 International Workshops: Proceedings. Lecture Notes in Business Information Processing, Vol.482, Spain, Zaragoza, 12-16 June, 2023. Cham: Springer, 2023, pp. 125-131.<\/div><\/div><div id=\"div_block-41-2453\" class=\"ct-div-block\" ><div id=\"div_block-353-2453\" class=\"ct-div-block\" ><h2 id=\"headline-42-2453\" class=\"ct-headline\">Agile Requirements Engineering in Maritime Freight Transportation.<br><\/h2><a id=\"link-355-2453\" class=\"ct-link\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-43126-5_2\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-356-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-356-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-43-2453\" class=\"ct-text-block\" ><b>Apine I.<\/b>, Kirikova M. <br><\/div><div id=\"text_block-44-2453\" class=\"ct-text-block\" >Published in:&nbsp;Perspectives in Business Informatics Research: 22nd International Conference on Business Informatics Research (BIR 2023): Proceedings. Lecture Notes in Business Information Processing. Vol.493, Italy, Ascoli Piceno, 13-15 September, 2023. <\/div><\/div><div id=\"div_block-47-2453\" class=\"ct-div-block\" ><div id=\"div_block-349-2453\" class=\"ct-div-block\" ><h2 id=\"headline-48-2453\" class=\"ct-headline\">Exploring Low-Code Development: A Comprehensive Literature Review.<br><\/h2><a id=\"link-351-2453\" class=\"ct-link\" href=\"https:\/\/csimq-journals.rtu.lv\/article\/view\/csimq.2023-36.04\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-352-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-352-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-49-2453\" class=\"ct-text-block\" ><b>Ro\u0137is K.<\/b>, Kirikova M. <br><\/div><div id=\"text_block-50-2453\" class=\"ct-text-block\" >Published in:&nbsp;Complex Systems Informatics and Modeling Quarterly, 2023, No. 36, pp. 68-86.<\/div><\/div><div id=\"div_block-53-2453\" class=\"ct-div-block\" ><div id=\"div_block-345-2453\" class=\"ct-div-block\" ><h2 id=\"headline-54-2453\" class=\"ct-headline\">An ArchiMate-Based Thematic Knowledge Graph for Low-Code Software Development Domain. <br><\/h2><a id=\"link-347-2453\" class=\"ct-link\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-42941-5_40\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-348-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-348-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-55-2453\" class=\"ct-text-block\" ><b>Ro\u0137is K.<\/b>, Kirikova M. <br><\/div><div id=\"text_block-56-2453\" class=\"ct-text-block\" >Published in:&nbsp;New Trends in Database and Information Systems (ADBIS 2023): Communications in Computer and Information Science. Vol.1850, Spain, Barcelona, 4-7 September, 2023. <\/div><\/div><div id=\"div_block-58-2453\" class=\"ct-div-block\" ><div id=\"div_block-341-2453\" class=\"ct-div-block\" ><h2 id=\"headline-59-2453\" class=\"ct-headline\">Retail Sales Forecasting Using Deep Learning: Systematic Literature Review. <br><\/h2><a id=\"link-343-2453\" class=\"ct-link\" href=\"https:\/\/csimq-journals.rtu.lv\/csimq\/article\/view\/csimq.2022-30.03\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-344-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-344-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-60-2453\" class=\"ct-text-block\" ><b>Eglite L.<\/b>, Birzniece I.  <br><\/div><div id=\"text_block-61-2453\" class=\"ct-text-block\" >Published in:&nbsp;Complex Systems Informatics and Modeling Quarterly, 2022, No. 30, pp. 53-62. ISSN 2255-9922. Available from: doi:10.7250\/csimq.2022-30.03.<\/div><\/div><div id=\"div_block-64-2453\" class=\"ct-div-block\" ><div id=\"div_block-336-2453\" class=\"ct-div-block\" ><h2 id=\"headline-65-2453\" class=\"ct-headline\">Applicability of Fractal Architecture Based Microservices on System-of-Systems.<br><\/h2><a id=\"link-339-2453\" class=\"ct-link\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-23012-7_7\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-340-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-340-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-66-2453\" class=\"ct-text-block\" ><b>Dhamodaran B. <\/b><br><\/div><div id=\"text_block-67-2453\" class=\"ct-text-block\" >Published in:&nbsp;Digital Transformation: PLAIS EuroSymposium 2022. Lecture Notes in Business Information Processing. Vol.465, Poland, Sopot, 15-15 December, 2022.<\/div><\/div><div id=\"div_block-70-2453\" class=\"ct-div-block\" ><div id=\"div_block-332-2453\" class=\"ct-div-block\" ><h2 id=\"headline-71-2453\" class=\"ct-headline\">Challenges of Low-Code\/No-Code Software Development: A Literature Review. <br><\/h2><a id=\"link-334-2453\" class=\"ct-link\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-16947-2_1\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-335-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-335-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-72-2453\" class=\"ct-text-block\" ><b>Ro\u0137is K.<\/b>, Kirikova M.<br><\/div><div id=\"text_block-73-2453\" class=\"ct-text-block\" >Published in:&nbsp;Perspectives in Business Informatics Research: 21st International Conference on Business Informatics Research (BIR 2022): Proceedings. Lecture Notes in Business Information Processing, vol.462, Germany, Rostock, 20-23 September, 2022.<\/div><\/div><div id=\"div_block-78-2453\" class=\"ct-div-block\" ><div id=\"div_block-327-2453\" class=\"ct-div-block\" ><h2 id=\"headline-79-2453\" class=\"ct-headline\">Continuous Requirements Engineering for Digital Transformation. <br><\/h2><a id=\"link-329-2453\" class=\"ct-link\" href=\"https:\/\/ceur-ws.org\/Vol-2991\/paper03.pdf\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-330-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-330-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-80-2453\" class=\"ct-text-block\" ><b>Michailidis<\/b> <b>K.<\/b>, Strazdina R., and Kirikova M. <br><\/div><div id=\"text_block-81-2453\" class=\"ct-text-block\" >Published in:&nbsp;6th Workshop on Managed Complexity. Vienna, 22 September, 2021. CEUR Workshop Proceedings, vol. 2991, pp. 26-40, 2021. <\/div><\/div><div id=\"div_block-83-2453\" class=\"ct-div-block\" ><div id=\"div_block-321-2453\" class=\"ct-div-block\" ><h2 id=\"headline-322-2453\" class=\"ct-headline\">Blockchain Applicability for Securities Settlement.<br><\/h2><a id=\"link-323-2453\" class=\"ct-link\" href=\"https:\/\/ceur-ws.org\/Vol-2991\/paper10.pdf\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-324-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-324-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-85-2453\" class=\"ct-text-block\" ><b>Bauvars<\/b> <b>J.<\/b>, Kirikova M. <br><\/div><div id=\"text_block-86-2453\" class=\"ct-text-block\" >Published in:&nbsp;1st Workshop on Blockchain for Trusted Data Sharing (B4TDS 2021), Vienna, 22 September, 2021. CEUR Workshop Proceedings, vol. 2991, pp. 113-127, 2021. <\/div><\/div><div id=\"div_block-89-2453\" class=\"ct-div-block\" ><div id=\"div_block-313-2453\" class=\"ct-div-block\" ><h2 id=\"headline-90-2453\" class=\"ct-headline\">Blockchain Applicability for Securities Settlement.<br><\/h2><a id=\"link-315-2453\" class=\"ct-link\" href=\"https:\/\/csimq-journals.rtu.lv\/article\/view\/csimq.2021-28.03\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-316-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-316-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-91-2453\" class=\"ct-text-block\" ><b>Bauvars<\/b> <b>J.<\/b>, Kirikova M. <br><\/div><div id=\"text_block-92-2453\" class=\"ct-text-block\" >Published in:&nbsp;Complex Systems Informatics and Modeling Quarterly, CSIMQ, no. 28, pp. 34\u201358, 2021.<\/div><\/div><div id=\"div_block-94-2453\" class=\"ct-div-block\" ><div id=\"div_block-103-2453\" class=\"ct-div-block\" ><h2 id=\"headline-95-2453\" class=\"ct-headline\">Service Dependency Graph Analysis in Microservice Architecture. <br><\/h2><a id=\"link-105-2453\" class=\"ct-link\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-61140-8_9\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-104-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-104-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-96-2453\" class=\"ct-text-block\" ><b>Gaidels<\/b> <b>E.<\/b> and Kirikova, M.   <br><\/div><div id=\"text_block-97-2453\" class=\"ct-text-block\" >Published in:&nbsp;19th International Conference on Perspectives in Business Informatics Research, BIR 2020, Lecture Notes in Business Information Processing, vol. 398, pp. 128\u2013139, 2020.<\/div><\/div><div id=\"div_block-106-2453\" class=\"ct-div-block\" ><div id=\"div_block-107-2453\" class=\"ct-div-block\" ><h2 id=\"headline-108-2453\" class=\"ct-headline\">Sinusoidal Neural Networks: Towards ANN that Learns Faster.<br><\/h2><a id=\"link-109-2453\" class=\"ct-link\" href=\"https:\/\/csimq-journals.rtu.lv\/article\/view\/csimq.2020-23.04\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-110-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-110-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-111-2453\" class=\"ct-text-block\" ><b>Ozmermer T.<\/b><b>E.<\/b><br><\/div><div id=\"text_block-112-2453\" class=\"ct-text-block\" >Published in:&nbsp;Complex Systems Informatics and Modeling Quarterly, CSIMQ, no. 23, pp. 44\u201357, 2020.<\/div><\/div><div id=\"div_block-113-2453\" class=\"ct-div-block\" ><div id=\"div_block-114-2453\" class=\"ct-div-block\" ><h2 id=\"headline-115-2453\" class=\"ct-headline\">Towards Trust Analytics in Cyber Physical Systems of Industry 4.0. <br><\/h2><a id=\"link-116-2453\" class=\"ct-link\" href=\"https:\/\/ceur-ws.org\/Vol-2218\/paper19.pdf\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-117-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-117-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-118-2453\" class=\"ct-text-block\" ><b>Harlamova M. <\/b><br><\/div><div id=\"text_block-119-2453\" class=\"ct-text-block\" >Published in:&nbsp;BIR-WS 2018 [online]: BIR Short Papers, Workshops and Doctoral Consortium: Joint Proceedings of the BIR 2018 Short Papers, Workshops and Doctoral Consortium co-located with 17th International Conference &#8220;Perspectives in Business Informatics Research&#8221; (BIR 2018). CEUR Workshop Proceedings. Vol.2218, Sweden, Stockholm, 24-26 September 2018. Aachen: RWTH, 2018, pp.189-200. <\/div><\/div><div id=\"div_block-120-2453\" class=\"ct-div-block\" ><div id=\"div_block-121-2453\" class=\"ct-div-block\" ><h2 id=\"headline-122-2453\" class=\"ct-headline\">Blockchain Use Cases and Their Feasibility.<br><\/h2><a id=\"link-123-2453\" class=\"ct-link\" href=\"https:\/\/www.researchgate.net\/publication\/325534791_Blockchain_Use_Cases_and_Their_Feasibility\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-124-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-124-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-125-2453\" class=\"ct-text-block\" ><b>Z\u012ble, K. and <\/b>Strazdi\u0146a,<b> <\/b>R.<b>&nbsp;<\/b><br><\/div><div id=\"text_block-126-2453\" class=\"ct-text-block\" >Published in:&nbsp;Applied Computer Systems, 2018, Vol. 23, No. 1, pp. 12-20. ISSN 2255-8683. e-ISSN 2255-8691.<\/div><\/div><div id=\"div_block-128-2453\" class=\"ct-div-block\" ><div id=\"div_block-129-2453\" class=\"ct-div-block\" ><h2 id=\"headline-130-2453\" class=\"ct-headline\">A Coarse-Grained Comparison of BPMN Extensions for Security Requirements Modelling. <br><\/h2><a id=\"link-131-2453\" class=\"ct-link\" href=\"https:\/\/www.researchgate.net\/publication\/325534791_Blockchain_Use_Cases_and_Their_Feasibility\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-132-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-132-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-133-2453\" class=\"ct-text-block\" ><b>Gaidels<\/b> <b>E.<\/b>, Gaidukovs A., Matulevi\u010dius R.<b><\/b><br><\/div><div id=\"text_block-134-2453\" class=\"ct-text-block\" >Published in:&nbsp;BIR-WS 2018 [online]: BIR Short Papers, Workshops and Doctoral Consortium: Joint Proceedings of the BIR 2018 Short Papers, Workshops and Doctoral Consortium co-located with 17th International Conference &#8220;Perspectives in Business Informatics Research&#8221; (BIR 2018). CEUR Workshop Proceedings. Vol.2218, Sweden, Stockholm, 24-26 September, 2018. <\/div><\/div><div id=\"div_block-136-2453\" class=\"ct-div-block\" ><div id=\"div_block-137-2453\" class=\"ct-div-block\" ><h2 id=\"headline-138-2453\" class=\"ct-headline\">Towards the Trust Handling Framework for Industry 4.0.  <br><\/h2><a id=\"link-139-2453\" class=\"ct-link\" href=\"https:\/\/ebooks.iospress.nl\/publication\/50992\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-140-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-140-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-141-2453\" class=\"ct-text-block\" ><b>Harlamova<\/b> <b>M.<\/b>, Kirikova M. <b><\/b><br><\/div><div id=\"text_block-142-2453\" class=\"ct-text-block\" >Published in:&nbsp;Frontiers in Artificial Intelligence and Applications, vol. 315: Databases and Information Systems X, IOS Press, vol. 315, pp. 49-64, 2018. <\/div><\/div><div id=\"div_block-144-2453\" class=\"ct-div-block\" ><div id=\"div_block-145-2453\" class=\"ct-div-block\" ><h2 id=\"headline-146-2453\" class=\"ct-headline\">Variability Modeling for New Technology Choices in a Facility Management Domain.  <br><\/h2><\/div><div id=\"text_block-149-2453\" class=\"ct-text-block\" ><b>Zvirbule<\/b> <b>S.<\/b>, Kirikova M.  <b><\/b><br><\/div><div id=\"text_block-150-2453\" class=\"ct-text-block\" >Published in:&nbsp;Proceedings of the 2nd International Workshop on Practicing Open Enterprise Modelling within OMiLAB (PrOse) co-located with 11th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modelling (PoEM 2018), Austria, Vienna, 31 October 2018. CEUR Workshop Proceedings 2238, pp. 25-36, 2018. <\/div><\/div><div id=\"div_block-152-2453\" class=\"ct-div-block\" ><div id=\"div_block-153-2453\" class=\"ct-div-block\" ><h2 id=\"headline-154-2453\" class=\"ct-headline\">Containers for Virtualization: An Overview.   <br><\/h2><a id=\"link-160-2453\" class=\"ct-link\" href=\"https:\/\/sciendo.com\/article\/10.2478\/acss-2018-0003\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-161-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-161-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-155-2453\" class=\"ct-text-block\" ><b>Da Silva V. G.<\/b>, Kirikova M., Alksnis G.   <b><\/b><br><\/div><div id=\"text_block-156-2453\" class=\"ct-text-block\" >Published in:&nbsp;Applied Computer Systems, vol. 23(1), pp. 21-27, 2018. <\/div><\/div><div id=\"div_block-162-2453\" class=\"ct-div-block\" ><div id=\"div_block-163-2453\" class=\"ct-div-block\" ><h2 id=\"headline-164-2453\" class=\"ct-headline\">Trust Handling Framework for Networks in Cyber Physical Systems of Industry 4.0.    <br><\/h2><a id=\"link-165-2453\" class=\"ct-link\" href=\"https:\/\/doi.org\/10.1007\/978-3-319-99951-7_3\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-166-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-166-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-167-2453\" class=\"ct-text-block\" ><b>Harlamova M.<\/b>, Kirikova M.<br><\/div><div id=\"text_block-168-2453\" class=\"ct-text-block\" >Published in:&nbsp;Lecture Notes in Business Information Processing (LNBIP): 17th International Conference on Perspectives in Business Informatics Research (BIR 2018), Sweden, Stockholm, 24-26 September 2018. Springer, pp. 29-43, 2018.<\/div><\/div><div id=\"div_block-170-2453\" class=\"ct-div-block\" ><div id=\"div_block-171-2453\" class=\"ct-div-block\" ><h2 id=\"headline-172-2453\" class=\"ct-headline\">Towards the trust model for Industry 4.0. <br><\/h2><a id=\"link-173-2453\" class=\"ct-link\" href=\"https:\/\/doi.org\/10.1007\/978-3-319-97571-9_6\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-174-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-174-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-175-2453\" class=\"ct-text-block\" ><b>Harlamova M.<\/b>, Kirikova M.<br><\/div><div id=\"text_block-176-2453\" class=\"ct-text-block\" >Published in:&nbsp;Proceedings. Communications in Computer and Information Science, vol.838, Lithuania, Trakai, 1-4 July 2018. Springer, pp.\u202f43-57, 2018. <\/div><\/div><div id=\"div_block-177-2453\" class=\"ct-div-block\" ><div id=\"div_block-178-2453\" class=\"ct-div-block\" ><h2 id=\"headline-179-2453\" class=\"ct-headline\">A Survey on Challenges of Semantics Application in the Internet of Things Domain.<br><\/h2><a id=\"link-180-2453\" class=\"ct-link\" href=\"https:\/\/doi.org\/10.1515\/acss-2017-0002\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-181-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-181-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-182-2453\" class=\"ct-text-block\" ><b>Harlamova M.<\/b>, Kirikova M.,&nbsp;Sandkuhl K. <br><\/div><div id=\"text_block-183-2453\" class=\"ct-text-block\" >Published in:&nbsp;Applied Computer Systems. vol.\u202f21(1), pp.\u202f13-21, 2017.<\/div><\/div><div id=\"div_block-184-2453\" class=\"ct-div-block\" ><div id=\"div_block-185-2453\" class=\"ct-div-block\" ><h2 id=\"headline-186-2453\" class=\"ct-headline\">Triple-Agile: A Paradigm for Cloud Based SME Process Support.<br><\/h2><a id=\"link-187-2453\" class=\"ct-link\" href=\"https:\/\/doi.org\/10.1007\/978-3-319-69023-0_15\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-188-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-188-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-189-2453\" class=\"ct-text-block\" ><b><\/b>Businska L., <b>Dargis M.<\/b>, Kirikova M., and Salna E <br><\/div><div id=\"text_block-190-2453\" class=\"ct-text-block\" >Published in:&nbsp;Business Information Systems Workshops. BIS 2017. 28-30 June 2017, Pozna\u0144, Poland. Springer, LNBIP, vol. 303, pp. 163\u2013174, 2017.<\/div><\/div><div id=\"div_block-192-2453\" class=\"ct-div-block\" ><div id=\"div_block-193-2453\" class=\"ct-div-block\" ><h2 id=\"headline-194-2453\" class=\"ct-headline\">Simplifying the DevOps Adoption Process. <br><\/h2><\/div><div id=\"text_block-197-2453\" class=\"ct-text-block\" ><b>Bucena I.<\/b>, Kirikova M.  <br><\/div><div id=\"text_block-198-2453\" class=\"ct-text-block\" >Published in:&nbsp;Joint Proceedings of the BIR 2017 pre-BIR Forum, Workshops and Doctoral Consortium co-located with 16th International Conference on Perspectives in Business Informatics Research (BIR 2017), Copenhagen, Denmark, August 28\u201330, 2017. CEUR Workshop Proceedings 1898, 2017.<\/div><\/div><div id=\"div_block-200-2453\" class=\"ct-div-block\" ><div id=\"div_block-201-2453\" class=\"ct-div-block\" ><h2 id=\"headline-202-2453\" class=\"ct-headline\">Analytics in Continuous Requirements Engineering.  <br><\/h2><\/div><div id=\"text_block-203-2453\" class=\"ct-text-block\" ><b><\/b>Kirikova M., <b>Purmalietis K.   <\/b><br><\/div><div id=\"text_block-204-2453\" class=\"ct-text-block\" >Published in:&nbsp;Joint Proceedings of REFSQ-2017 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017), Essen, Germany, February 27, 2017, CRE\u201917, CEUR Workshop Proceedings, vol. 1796, pp.\u202f1-9, 2017. <\/div><\/div><div id=\"div_block-206-2453\" class=\"ct-div-block\" ><div id=\"div_block-207-2453\" class=\"ct-div-block\" ><h2 id=\"headline-208-2453\" class=\"ct-headline\">Continuous Requirements Engineering for Mobile Application Development.  <br><\/h2><\/div><div id=\"text_block-209-2453\" class=\"ct-text-block\" ><b>Stepanova<\/b> <b>E.<\/b>, Kirikova M.<b>   <\/b><br><\/div><div id=\"text_block-210-2453\" class=\"ct-text-block\" >Published in:&nbsp;Joint Proceedings of REFSQ-2017 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017), Essen, Germany, February 27, 2017, CRE\u201917, CEUR Workshop Proceedings 1796, pp.\u202f1-10, 2017.  <\/div><\/div><div id=\"div_block-212-2453\" class=\"ct-div-block\" ><div id=\"div_block-213-2453\" class=\"ct-div-block\" ><h2 id=\"headline-214-2453\" class=\"ct-headline\">Comparative Analysis of Business Process Modelling Tools for Compliance Management Support.  <br><\/h2><\/div><div id=\"text_block-215-2453\" class=\"ct-text-block\" ><b>Koncevi\u010ds<\/b> <b>R.<\/b>, Pe\u0146icina L., Gaidukovs A., <b>Dar\u0123is M.<\/b>, Burbo R., Auzi\u0146\u0161 A.<br><\/div><div id=\"text_block-216-2453\" class=\"ct-text-block\" >Published in: Applied Computer Systems, 2017, 21, pp.22-27.   <\/div><\/div><div id=\"div_block-218-2453\" class=\"ct-div-block\" ><div id=\"div_block-219-2453\" class=\"ct-div-block\" ><h2 id=\"headline-220-2453\" class=\"ct-headline\">Auditing Security of Information Flows.   <br><\/h2><a id=\"link-226-2453\" class=\"ct-link\" href=\"https:\/\/doi.org\/10.1007\/978-3-319-45321-7_15\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-227-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-227-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-221-2453\" class=\"ct-text-block\" ><b>Kozlovs<\/b> <b>D.<\/b>, Kirikova M. <br><\/div><div id=\"text_block-222-2453\" class=\"ct-text-block\" >Published in: Proceedings Perspectives in Business Informatics Research. 15th International Conference, BIR 2016, Prague, Czech Republic, September 15\u201316, 2016, Lecture Notes in Business Information Processing, vol. 261, Springer, pp.\u202f204-219.    <\/div><\/div><div id=\"div_block-228-2453\" class=\"ct-div-block\" ><div id=\"div_block-229-2453\" class=\"ct-div-block\" ><h2 id=\"headline-230-2453\" class=\"ct-headline\">Attributes of User Engagement for Website Development. <br><\/h2><a id=\"link-231-2453\" class=\"ct-link\" href=\"https:\/\/doi.org\/10.1007\/978-3-319-45321-7_10\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-232-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-232-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-233-2453\" class=\"ct-text-block\" ><b>Senbergs<\/b> <b>J.<\/b>, Kirikova M.  <br><\/div><div id=\"text_block-234-2453\" class=\"ct-text-block\" >Published in: Proceedings Perspectives in Business Informatics Research. 15th International Conference, BIR 2016, Prague, Czech Republic, September 15\u201316, 2016, Lecture Notes in Business Information Processing, vol. 261, Springer, pp.\u202f130-144, 2016.     <\/div><\/div><div id=\"div_block-236-2453\" class=\"ct-div-block\" ><div id=\"div_block-237-2453\" class=\"ct-div-block\" ><h2 id=\"headline-238-2453\" class=\"ct-headline\">Towards Continuous Information Security Audit.<br><\/h2><\/div><div id=\"text_block-241-2453\" class=\"ct-text-block\" ><b>Kozlovs<\/b> <b>D.<\/b>, Cjaputa K., and Kirikova M.<br><\/div><div id=\"text_block-242-2453\" class=\"ct-text-block\" >Published in: Joint Proceedings of REFSQ-2016 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2016), March 14-17, 2016, Gothenburg, Sweden. CEUR Workshop Proceedings 1564, 2016.  <\/div><\/div><div id=\"div_block-244-2453\" class=\"ct-div-block\" ><div id=\"div_block-245-2453\" class=\"ct-div-block\" ><h2 id=\"headline-246-2453\" class=\"ct-headline\">Opinion Mining in Latvian Text Using Semantic Polarity Analysis and Machine Learning Approach. <br><\/h2><a id=\"link-254-2453\" class=\"ct-link\" href=\"https:\/\/doi.org\/10.7250\/csimq.2016-7.03\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-255-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-255-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-247-2453\" class=\"ct-text-block\" ><b>\u0160pats<\/b> <b>G.<\/b>, Birzniece I.<br><\/div><div id=\"text_block-248-2453\" class=\"ct-text-block\" >Published in:&nbsp;Complex Systems Informatics and Modeling Quarterly, 2016, no.7, pp.51-59. e-ISSN 2255-9922. <\/div><\/div><div id=\"div_block-256-2453\" class=\"ct-div-block\" ><div id=\"div_block-257-2453\" class=\"ct-div-block\" ><h2 id=\"headline-258-2453\" class=\"ct-headline\">Towards Knowledge and Information Technology Transfer Concept and Its Validation. <br><\/h2><a id=\"link-259-2453\" class=\"ct-link\" href=\"https:\/\/doi.org\/10.1016\/j.procs.2015.12.358\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-260-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-260-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-261-2453\" class=\"ct-text-block\" >Novickis L., <b>Ponomarenko V.<\/b>, Mitasiunas A.<br><\/div><div id=\"text_block-262-2453\" class=\"ct-text-block\" >Published in:&nbsp;Complex Systems Informatics and Modeling Quarterly, 2016, no.7, pp.51-59. e-ISSN 2255-9922. <\/div><\/div><div id=\"div_block-263-2453\" class=\"ct-div-block\" ><div id=\"div_block-264-2453\" class=\"ct-div-block\" ><h2 id=\"headline-265-2453\" class=\"ct-headline\">Towards a Method for Integrated Semi-Automated Business Process and Regulations Compliance Management for Continuous Requirements Engineering.<br><\/h2><\/div><div id=\"text_block-268-2453\" class=\"ct-text-block\" >Buk\u0161a I., <b>Dar\u0123is<\/b> <b>M.<\/b>, Pe\u0146icina L.<br><\/div><div id=\"text_block-269-2453\" class=\"ct-text-block\" >Published in:&nbsp;REFSQ-JP 2015, REFSQ Workshops, Research Method Track, and Poster Track: Joint Proceedings of REFSQ-2015 Workshops, Research Method Track, and Poster Track co-located with the 21st International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2015), CEUR Workshop Proceedings, Volume 1342, Germany, Essen, 23 March, 2015. <\/div><\/div><div id=\"div_block-271-2453\" class=\"ct-div-block\" ><div id=\"div_block-272-2453\" class=\"ct-div-block\" ><h2 id=\"headline-273-2453\" class=\"ct-headline\">Relationship between Personality Types Conceptualized by C. G. Jung and Latvian IT Specialist Preferences. <br><\/h2><a id=\"link-279-2453\" class=\"ct-link\" href=\"https:\/\/doi.org\/10.7250\/csimq.2015-4.01\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-280-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-280-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-274-2453\" class=\"ct-text-block\" >Pe\u0146icina L., Finke A., <b>Dar\u0123is M.<\/b><br><\/div><div id=\"text_block-275-2453\" class=\"ct-text-block\" >Published in:&nbsp;Complex Systems Informatics and Modeling Quarterly, 2015, no.4, pp.1-11. e-ISSN 2255-9922. <\/div><\/div><div id=\"div_block-288-2453\" class=\"ct-div-block\" ><div id=\"div_block-289-2453\" class=\"ct-div-block\" ><h2 id=\"headline-290-2453\" class=\"ct-headline\">Supporting Introduction of Social Interaction in Business Processes.<br><\/h2><a id=\"link-291-2453\" class=\"ct-link\" href=\"http:\/\/dx.doi.org\/10.1007\/978-3-319-11370-8_14\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-292-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-292-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-293-2453\" class=\"ct-text-block\" ><b>\u010cerenkovs R.<\/b>, Kirikova M. <br><\/div><div id=\"text_block-294-2453\" class=\"ct-text-block\" >Published in:&nbsp;Perspectives in Business Informatics Research. Proceedings of the 13th International Conference, BIR 2014, Lund, Sweden, September 22-24, 2014. LNBIP, vol. 194, Springer,\u202fpp. 187-201, 2014.<\/div><\/div><div id=\"div_block-281-2453\" class=\"ct-div-block\" ><div id=\"div_block-282-2453\" class=\"ct-div-block\" ><h2 id=\"headline-283-2453\" class=\"ct-headline\">Game-based Training of Communication Skills in Requirements Engineering.  <br><\/h2><\/div><div id=\"text_block-286-2453\" class=\"ct-text-block\" ><b>Dar\u0123is M., Koncevi\u010ds R., Silami\u0137elis A.,<\/b> Kirikova M. <br><\/div><div id=\"text_block-287-2453\" class=\"ct-text-block\" >Published in:&nbsp;Proceedings of REFSQ-2014 Workshops, Doctoral Symposium, Empirical Track, and Posters co-located with the 20th International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2014), Essen, Germany, April 7-10, 2014. CEUR Workshop Proceedings, vol. 1138, pp. 147\u2013148, 2014.<\/div><\/div><div id=\"div_block-298-2453\" class=\"ct-div-block\" ><div id=\"div_block-299-2453\" class=\"ct-div-block\" ><h2 id=\"headline-300-2453\" class=\"ct-headline\">Customer Oriented Management of Changes in ERP Systems: The Vendor&#8217;s Side.<br><\/h2><a id=\"link-301-2453\" class=\"ct-link\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-11370-8_23\" target=\"_blank\" rel=\"noopener\"><div id=\"fancy_icon-302-2453\" class=\"ct-fancy-icon\" ><svg id=\"svg-fancy_icon-302-2453\"><use xlink:href=\"#FontAwesomeicon-external-link-square\"><\/use><\/svg><\/div><\/a><\/div><div id=\"text_block-303-2453\" class=\"ct-text-block\" ><b><\/b>As\u0146ina \u0112., Pud\u0101ne M., <b>Svi\u0137e M.<\/b>, Alksnis G <br><\/div><div id=\"text_block-304-2453\" class=\"ct-text-block\" >Published in:&nbsp;Perspectives in Business Informatics Research. Proceedings of the 13th International Conference, BIR 2014, Lund, Sweden, September 22-24, 2014. LNBIP, vol. 194, Springer,\u202fpp. 187-201, 2014.<\/div><\/div><\/div>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-2453","page","type-page","status-publish","hentry"],"meta_box":[],"_links":{"self":[{"href":"https:\/\/bi.rtu.lv\/en\/wp-json\/wp\/v2\/pages\/2453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bi.rtu.lv\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bi.rtu.lv\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bi.rtu.lv\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/bi.rtu.lv\/en\/wp-json\/wp\/v2\/comments?post=2453"}],"version-history":[{"count":8,"href":"https:\/\/bi.rtu.lv\/en\/wp-json\/wp\/v2\/pages\/2453\/revisions"}],"predecessor-version":[{"id":4244,"href":"https:\/\/bi.rtu.lv\/en\/wp-json\/wp\/v2\/pages\/2453\/revisions\/4244"}],"wp:attachment":[{"href":"https:\/\/bi.rtu.lv\/en\/wp-json\/wp\/v2\/media?parent=2453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}