This book constitutes the proceedings of the BPM Forum from the International Conference on Business Process Management, BPM 2016, held in Rio de Janeiro, September 2016.
This book constitutes the proceedings of the 14th International Conference on Business Process Management, BPM 2016, held in Rio de Janeiro, Brazil, in September 2016.
This book constitutes the proceedings of the 15th International Conference on Perspectives in Business Informatics Research, BIR 2016, held in Prague, Czech Republic, in September 2016.
This textbook introduces the basis for modelling and analysing discrete dynamic systems, such as computer programmes, soft- and hardware systems, and business processes.
This book presents the latest findings and ongoing research in the field of green information systems as well as green information and communication technology (ICT).
This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016.
This book constitutes the refereed proceedings of the 5th European Conference on Service-Oriented and Cloud Computing, ESOCC 2016, held in Vienna, Austria, in September 2016.
This book constitutes the refereed proceedings of the 13th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2016, held in Porto, Portugal, in September 2016 in conjunction with DEXA 2016.
This book constitutes the refereed proceedings of the 5th International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2016, held in Porto, Portugal, in September 2016, in conjunction with DEXA 2015.
This book contains the refereed proceedings of the 7th Scandinavian Conference on Information Systems, SCIS 2016, as well as of the IFIP Working Group 8.
This book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, held in Graz, Austria, in April 2016.
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks.
This book constitutes the refereed proceedings of ten international workshops held in Innsbruck, Austria, in conjunction with the 13th International Conference on Business Process Management, BPM 2015, in September 2015.
This book constitutes the proceedings of the 11th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2016, held in Bozeman, MT, USA, in August 2016.
This book explores the impact of design science and design thinking on tourism planning, gathering contributions from leading authorities in the field of tourism research and providing a comprehensive and interconnected panorama of cutting-edge results that influence the current and future design of tourist destinations.
This book offers postgraduate and early career researchers in accounting and information systems a guide to choosing, executing and reporting appropriate data analysis methods to answer their research questions.
This book develops the core system science needed to enable the development of a complex industrial internet of things/manufacturing cyber-physical systems (IIoT/M-CPS).
This book constitutes the proceedings of the 12th European Conference on Modelling Foundations and Applications, ECMFA 2016, held as part of STAF 2016, in Vienna, Austria, in July 2016.
This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
This book describes pragmatic instruments and methods that enable business experts and software engineers to develop a common understanding of the software to be created, to determine their key requirements, and to manage the project in a way that fosters trust, encourages innovation and distributes risk fairly between clients and contractors.
This book presents the proceedings of the Gmunden Retreat on NeuroIS 2016, reporting on topics at the intersection of Information Systems (IS) research, neurophysiology and the brain sciences.
Addressing the issues that will be central to Africa's various attempts to effectively manage knowledge and innovation for sustainable business management, this edited book makes a timely contribution to research on business in Africa.
This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastian, Spain, in July 2016.
This book constitutes the refereed proceedings of the 6th International Provenance and Annotation Workshop, IPAW 2016, held in McLean, VA, USA, in June 2016.
This book contains the refereed proceedings of the 7th International Conference on Software Business, ICSOB 2016, held in Ljubljana, Slovenia, in June 2016.
This book contains revised and extended versions of selected papers from the Fifth International Symposium on Business Modeling and Software Design, BMSD 2015, held in Milan, Italy, in July 2015.
This book constitutes the refereed proceedings of the First Conference on Cybersecurity of Industrial Control Systems, CyberICS 2015, and the First Workshop on the Security of Cyber Physical Systems, WOS-CPS 2015, held in Vienna, Austria, in September 2015 in conjunction with ESORICS 2015, the 20th annual European Symposium on Research in Computer Security.
This book summarizes the results of Design Thinking Research carried out at Stanford University in Palo Alto, California, USA and at the Hasso Plattner Institute in Potsdam, Germany.
The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016.
This book provides a broad overview of Information and Communication Technology (ICT)-supported innovation both on an evidence-based level, a theoretical and a methodological level.
The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016.
This book reports on the results of an interdisciplinary and multidisciplinary workshop on provenance that brought together researchers and practitioners from different areas such as archival science, law, information science, computing, forensics and visual analytics that work at the frontiers of new knowledge on provenance.
This edited book presents scientific results of the 15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016) which was held on June 26- 29 in Okayama, Japan.
This book provides theoretical and practical backgrounds for the digital creativity management and related Agent-Based Modeling (ABM) results on the basis of a set of realistic assumptions in which several topics such as knowledge network, diversity, individual creativity, team creativity, exploration and exploitation, and organizational creativity are discussed.