This book constitutes the revised selected papers of the Second International Conference on Information Systems Security and Privacy, ICISSP 2016, held in Rome, Italy, in February 2016.
This proceedings volume brings together the results of a corporate discussion on research, academic teaching and education in the field of business and economics in the context of globalization.
Enterprise security is an important area since all types of organizations require secure and robust environments, platforms and services to work with people, data and computing applications.
This unique volume explores cutting-edge management approaches to developing complex software that is efficient, scalable, sustainable, and suitable for distributed environments.
This book highlights the growing number of 'post-bureaucratic' firms that are abandoning hierarchical organizational forms in favor of self-managing teams.
This is the first book to seriously address the disconnection between nimble Agile teams and other groups in the enterprise, including enterprise architecture, the program management office (PMO), human resources, and even business executives.
This book constitutes the proceedings of the 23rd International Working Conference on Requirements Engineering - Foundation for Software Quality, REFSQ 2017, held in Essen, Germany, in February/March 2017.
This book constitutes revised selected papers from the 5th International Conference on Operations Research and Enterprise Systems, ICORES 2016, held in Rome, Italy, in February 2016.
This reference book shows how the Zero Outage method leads to more stability in operations, more reliability in projects and, ultimately, to greater customer satisfaction.
This book constitutes revised proceedings of the 17th International Conference on E-Commerce and Web Technologies, EC-Web 2016, held in Porto, Portugal, in September 2016, in conjunction with DEXA.
This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016.
This book constitutes revised selected papers from the 14th Conference on Advanced Information Technologies for Management, AITM 2016, and the 11th Conference on Information Systems Management, ISM 2016, held as part of the Federated Conference on Computer Science and Information Systems, FedCSIS, which took place in Gdansk, Poland, in September 2016.
This book constitutes revised selected papers from the 8th International Workshop on Enterprise Applications, Markets and Services in the Finance Industry, FinanceCom 2016, held in Frankfurt, Germany, in December 2016.
Bringing together theoretical and empirical studies from the Journal of Information Technology, this book provides a definitive guide to research discovered on the growing global sourcing phenomenon.
This book constitutes revised selected papers from the 16th International Conference on Group Decision and Negotiation, GDN 2016, held in Bellingham, WA, USA, in June 2016.
This book demonstrates the use of a wide range of strategic engineering concepts, theories and applied case studies to improve the safety, security and sustainability of complex and large-scale engineering and computer systems.
This book constitutes revised papers from the six workshops held at the 19th International Conference on Business Information Systems, BIS 2016, held in Leipzig, Germany, in July 2016.
This book provides a state-of-the-art perspective on intelligent process-aware information systems and presents chapters on specific facets and approaches applicable to such systems.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA, in February 2017.
This book explores the influence of the modes of knowledge transfer and environmental dynamism on the relationship between strategic actions and the sustainable balanced scorecard measurement of performance.
This book constitutes the proceedings of the 9th International Workshop on Multiple Access Communications, MACOM 2016, held in Aalborg, Denmark, in November 2016.
This management book presents value-driven business process management as a successful discipline to turn strategy into people- and technology-based execution, quickly and at minimal risk.
This book investigates the powerful role of online intermediaries, which connect companies with their end customers, to facilitate joint product innovation.
This book constitutes the refereed proceedings of the 11th International Conference on Global Security, Safety and Sustainability, ICGS3 2017, held in London, UK, in January, 2017.
This book examines the effectiveness of communication between chief information officer (CIO) and chief executive officer (CEO) and its impact on the role of information technology (IT) in an organization.
This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016.
This book explores the gender dimension in technology commercialization through a collection of papers by internationally renowned scholars in the USA, Mexico and Europe.
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology in India, INDOCRYPT 2016, held in Kolkata, India, in December 2016.
This book constitutes the refereed proceedings of the 19th Brazilian Symposium on Formal Methods, SBMF 2016, which took place in Natal, Brazil, in November 2016.
This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016.
This book constitutes the refereed proceedings of the 12th International Workshop on Enterprise and Organizational Modeling and Simulation, EOMAS 2016, held in Ljubljana, Slovenia, in June 2016.