This book examines the various ways in which co-production can contribute to the creation, design, and delivery of public services, namely by engaging the expertise of users and their networks, by promoting public services that are better targeted and more responsive to users, by cutting costs against the background of austerity in public finance, by creating a synergy between government and civil society that will impact positively on social capital, and by addressing the challenges resulting from growing democratic and citizenship deficits.
This book constitutes revised and extended versions of the best papers from the 10th Conference on Information Systems Management (ISM 2015) and 13th Conference on Advanced Information Technologies for Management (AITM 2015), held in Lodz, Poland, September 2015 as part of the Federated Conference on Computer Science and Information Systems (FedCSIS 2015).
This bookconstitutes the proceedings of the 17th International Conference on Passive andActive Measurement, PAM 2016, held in Heraklion, Crete, Greece, in March/April2016.
This book describes how chief information officers (CIOs) can embrace and drive the digital transformation by providing innovative leadership that uses old skills in a novel way.
This book constitutes revised selected papers from the 11th International Conference on Web Information Systems and Technologies, WEBIST 2015, held in Lisbon, Portugal, May 20-22, 2015, organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), and technically sponsored by the European Research Center for Information Systems (ERCIS).
This book constitutes the thoroughly refereedproceedings of the 10th International Conference on Evaluation of NovelApproaches to Software Engineering, ENASE 2015, held in Barcelona, Spain, inApril 2015.
This bookconstitutes the thoroughly refereed proceedings of the 10th International JointConference on Software Technologies, ICSOFT 2015, held in Colmar, France, inJuly 2015.
This book introduces ongoingreflections within the research community on established information systemsdevelopment topics and emerging concepts, approaches and ideas in the field ofhealthcare information systems.
This book constitutes the thoroughly refereed post-conferenceproceedings of the 9th International Conference on Passwords, PASSWORDS2015, held in Cambridge, UK, in December 2015.
This book constitutes the revised selected papers of the 10th International Workshop on Data Privacy Management, DPM 2015, and the 4th International Workshop on Quantitative Aspects in Security Assurance, QASA 2015, held in Vienna, Austria, in September 2015, co-located with the 20th European Symposium on Research in Computer Security, ESORICS 2015.
This bookconstitutes the proceedings of the 22nd International Working Conference onRequirements Engineering Foundation for Software Quality, REFSQ 2016, held inGothenburg, Sweden, in March 2016.
This book offersreaders essential orientation on cybersecurity safeguards, and first andforemost helps them find the right balance between financial expenditures andrisk mitigation.
This volume contains the post-conference proceedings of the 10th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, MEMICS 2015, held in Telc, Czech Republic, in October 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015.
This book constitutes the thoroughly refereed proceedings of the 5th International Conference on Cloud Computing and Services Science, CLOSER 2015, held in Lisbon, Portugal, in May 2015.
This book constitutes revised selected papers from the18th Brazilian Symposium on Formal Methods, SBMF 2015, which took place in BeloHorizonte, Brazil, in September 2015.
This fourvolume set of books constitutes the proceedings of the 36th InternationalConference Information Systems Architecture and Technology 2015, or ISAT 2015for short, held on September 20 22, 2015 in Karpacz, Poland.
This fourvolume set of books constitutes the proceedings of the 36th InternationalConference Information Systems Architecture and Technology 2015, or ISAT 2015for short, held on September 20 22, 2015 in Karpacz, Poland.
This fourvolume set of books constitutes the proceedings of the 36th InternationalConference Information Systems Architecture and Technology 2015, or ISAT 2015for short, held on September 20 22, 2015 in Karpacz, Poland.
This fourvolume set of books constitutes the proceedings of the 36th InternationalConference Information Systems Architecture and Technology 2015, or ISAT 2015for short, held on September 20 22, 2015 in Karpacz, Poland.
This bookconstitutes the refereed proceedings of the 12th International Conference andSchool of Network Science, NetSci-X 2016, held in Wroclaw, Poland, in January2016.
This edited three volume edition brings together significant papers previously published in the Journal of information Technology (JIT) over its 30 year publication history.
This edited three volume edition brings together significant papers previously published in the Journal of information Technology (JIT) over its 30 year publication history.
Thisedited three volume edition brings together significant papers previouslypublished in the Journal of information Technology (JIT) over its 30 yearpublication history.
This book contains revisedpapers from the 17th International Conference on Enterprise Information Systems, ICEIS 2015, held in Barcelona, Spain, in April 2015.
This book constitutes the revised selected papers fromthe 12th International Conference on Formal Aspects of Component Software, FACS2015, held in Niteroi, Brazil, in October 2015.
This book presents a collection of original research papers focusing on emerging issues regarding the role of information and communication technologies in organizations, inter-organizational systems, and society.
Thisbook constitutes the refereed proceedings of the 7th International Workshop onPost-Quantum Cryptography, PQCrypto 2016, held in Fukuoka, Japan, in February2016.
This bookconstitutes the refereed proceedings of the Second International Symposium onCyber Security, CSS 2015, held in Coeur d'Alene, ID, USA, in April 2015.
The papers presented in this volume advance thestate-of-the-art research on digital marketing and social media, mobile computingand responsive web design, semantic technologies and recommender systems,augmented and virtual reality, electronic distribution and online travelreviews, MOOC and eLearning, eGovernment and sharing economy.
This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015.
This bookpresents recent research in the recognition of vulnerabilities of nationalsystems and assets which gained special attention for the CriticalInfrastructures in the last two decades.
Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereedpost-conference proceedings of the 6th International Conference on TrustedSystems, INTRUST 2014, held in Beijing, China, in December 2014.
This bookconstitutes revised selected papers from the 4th InternationalConference on Operations Research and Enterprise Systems, ICORES 2015, held inLisbon, Portugal, in January 2015.
This bookconstitutes revised selected papers from the First International Conference onInformation Systems Security and Privacy, ICISSP 2015, held in Angers, France,in February 2015.
This book constitutes the thoroughlyrefereed proceedings of the Fourth InternationalSymposium on Data-Driven Process Discovery and Analysis held in Riva del Milan,Italy, in November 2014.
Thisbook constitutes the thoroughly refereed proceedings of the 9th InternationalConference on Evaluation of Novel Approaches to Software Engineering, ENASE 2014,held in Lisbon, Portugal, in April 2014.
This book constitutes the refereed proceedings of the 6thInternational Conference on E-Democracy, E-Democracy 2015, held in Athens,Greece, in December 2015.
This book constitutes the refereed proceedings of theWorkshops and Symposiums of the 15th International Conference on Algorithms andArchitectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China,in November 2015.
This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 in Nanjing, China.
This volume presents the revised and peer reviewed contributions of the 'EPR Future 2014' conference held in Dornbirn/Austria on November 17-18th, 2014.
This book constitutes the refereed proceedings of the scientific trackof the 8th Software Quality Days Conference, SWQD 2016, held in Vienna,Austria, in January 2016.
This bookconstitutes revised selected papers from the 10th InternationalConference on Web Information Systems and Technologies, WEBIST 2014, held inBarcelona, Spain, April 2014, organized by the Institute for Systems andTechnologies of Information, Control and Communication (INSTICC), andtechnically sponsored by the European Research Center for Information Systems(ERCIS).
This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security, ICISS 2015, held in Kolkata, India, in December2015.