Identifying failure modes and their effects is critical to software failure mode and effects analysis and it largely depends on the analysts' experience and the skill.
This book constitutes the thoroughly refereed proceedings of the international workshops associated with the 33rd International Conference on Advanced Information Systems Engineering, CAiSE 2021, which was held during June 28-July 2, 2021.
Based on papers from the 4th Business Systems Laboratory International Symposium (BSLAB) in 2016, this volume contributes to the business management, organizational and innovation literature by providing insights on the antecedents of systems thinking in the business systems domain.
This book constitutes selected papers from the 14th European, Mediterranean, and Middle Eastern Conference, EMCIS 2017, held in Coimbra, Portugal, in September 2017.
This book constitutes the proceedings of the 16th International Conference on Perspectives in Business Informatics Research, BIR 2017, held in Copenhagen, Denmark, in August 2017.
This book constitutes the proceedings of the BPM Forum from the International Conference on Business Process Management, BPM 2017, held in Barcelona, Spain, September 2017.
This textbook offers undergraduate students an introduction to the main principles and some of the most popular techniques that constitute 'software quality assurance'.
This book constitutes the proceedings of the 11th International Conference on Network and System Security, NSS 2017, held in Helsinki, Finland, in August 2017.
This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017.
This book constitutes the refereed proceedings of the 14th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2017, held in Lyon, France, in August 2017 in conjunction with DEXA 2017.
This book constitutes the refereed proceedings of the 12th International Workshop on Security, IWSEC 2017, held in Hiroshima, Japan, in August/September 2017.
This easy-to-follow textbook provides an exercise-driven guide to the use of the Discrete Event Systems Specification (DEVS) simulation modeling formalism and the System Entity Structure (SES) simulation model ontology supported with the latest advances in software architecture and design principles, methods, and tools for building and testing virtual Systems of Systems (SoS).
Exploring the Cloud Computing (CC) commercial landscape as it matures; this book asserts that the key ingredient in sustaining the Software as a Service (SaaS) business model is subscription renewal.
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.
This book constitutes the refereed proceedings of the 17th International Conference on Group Decision and Negotiation, GDN 2017, held in Stuttgart, Germany, in August 2017.
This book explores conceptualizations of CSR and sustainability in the digital economy, focusing upon points of intersection between CSR and online communities.
This book constitutes the refereed proceedings of the 5th Iberoamerican Conference on Applications and Usability of Interactive TV , jAUTI 2016, held in conjunction with the III International Congress on Information Engineering and Information Systems, in La Habana, Cuba, in November 2016.
This book presents different perspectives of online business education - how it is designed, delivered and how it supports advances in management disciplines.
This book contains the refereed proceedings of the 12th International Conference on Knowledge Management in Organizations, KMO 2017, held in Beijing, China, in August 2017.
This book constitutes extended, revised and selected papers from the 6th International Conference on Cloud Computing and Services Science, CLOSER 2016, held in Rome, Italy, in April 2016.
This book constitutes the thoroughly refereed proceedings of the 11th International Joint Conference on Software Technologies, ICSOFT 2016, held in Lisbon, Portugal, in July 2016.
This book helps decision makers grasp the importance, and applicability to business, of the new technologies and extended connectivity of systems that underlie what is becoming known as the Fourth Industrial Revolution: technologies and systems such as artificial intelligence, machine learning, 3D printing, the internet of things, virtual and augmented reality, big data and mobile networks.
This book constitutes revised selected papers from the 18th International Conference on Enterprise Information Systems, ICEIS 2016, held in Rome, Italy, in April 2016.
This book includes a selection of the best research papers presented at the annual conference of the Italian chapter of the Association for Information Systems (AIS), which took place in Verona, Italy in October 2016.
This book constitutes the thoroughly refereed post-workshop proceedings of the 24 th International Workshop on Securit Protocols, held in Brno, Czech Republic, in April 2016.
This book constitutes the refereed proceedings of the 10th International Conference on Model Transformation, ICMT 2017, held as part of STAF 2017, in Marburg, Germany, in July 2017.
This book constitutes the refereed proceedings of the Second Conference on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2016, held in Crete, Greece, in September 2016 in conjunction with ESORICS 2016, the 21st annual European Symposium on Research in Computer Security.
This book summarizes the results of Design Thinking Research Program at Stanford University in Palo Alto, California, USA and the Hasso Plattner Institute in Potsdam, Germany.
This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016.
This book constitutes the refereed proceedings of the 5th International Conference on Serviceology for Services, held in Vienna, Austria, in July 2017.
This book combines the three dimensions of technology, society and economy to explore the advent of today's cloud ecosystems as successors to older service ecosystems based on networks.
This book is intended to spark a discourse on, and contribute to finding a clear consensus in, the debate between conceptualizing a knowledge strategy and planning a knowledge strategy.
This book reports on the latest research and developments in the field of cybersecurity, placing special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
This book draws on recent debate surrounding the emergence of cognitive intelligence in organizations, exploring the redefinition of the labor market and consequently, employment.
This book presents the edited proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2017), which was held on May 24-26, 2017 in Wuhan, China.
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy,ACISP 2017, held in Auckland, New Zealand, in July 2017.
This book constitutes the thoroughly refereed proceedings of three international workshops held in Essen, Germany, in conjunction with the 29th International Conference on Advanced Information Systems Engineering, CAiSE 2017, in June 2017.
This book constitutes the proceedings of the 12th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2017, held in Guilin, China, in June 2017.
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017.
This book presents the latest on the theoretical approach of the contemporary issues evolved in strategic marketing and the integration of theory and practice.
This book constitutes the proceedings of two events held in conjunction with the CAiSE conferences and related to the areas of enterprise, business-process and information systems modeling: the 18th International Conference on Business Process Modeling, Development and Support, BPMDS 2017, and the 22nd International Conference on Evaluation and Modeling Methods for Systems Analysis and Development, EMMSAD, 2017.