This book constitutes the proceedings of the 5th Enterprise Engineering Working Conference, EEWC 2015, held in Prague, Czech Republic, during May 15-19, 2015.
This book constitutes the proceedings of the CAiSE Forum from the 26th International Conference on Advanced Information Systems Engineering, CAiSE 2014, held in Thessaloniki, Greece, June 2014.
This book constitutes the thoroughly refereed proceedings of seven international workshops held in Stockholm, Sweden, in conjunction with the 27th International Conference on Advanced Information Systems Engineering, CAiSE 2015, in June 2015.
This book contains the refereed proceedings of the 16th International Conference on Business Process Modeling, Development and Support, BPMDS 2015, and the 20th International Conference on Exploring Modeling Methods for Systems Analysis and Design, EMMSAD 2015, held together with the 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015) in Stockholm, Sweden, in June 2015.
This book constitutes the proceedings of the 27th International Conference on Advanced Information Systems Engineering, CAiSE 2015, held in Stockholm, Sweden, in June 2015.
This book contains the refereed proceedings of the 18th International Conference on Business Information Systems, BIS 2015, held in Poznan, Poland, in June 2015.
This book constitutes the thoroughly refereed proceedings of the 10th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2015, held in Dublin, Ireland, in May 2015.
This book presents the proceedings of the Gmunden Retreat on NeuroIS 2015, reporting on topics at the intersection of Information Systems (IS) research, neurophysiology and the brain sciences.
This book explains how gamification, specifically enterprise gamification, can help mangers in multiple areas within an enterprise to improve attrition.
This book contains the refereed proceedings of the 16th International Conference on Agile Software Development, XP 2015, held in Helsinki, Finland, in May 2015.
This book constitutes the refereed proceedings of the First International Conference on Decision Support Systems Technology, ICDSST 2015, held in Belgrade, Serbia, in May 2015.
This book constitutes the refereed proceedings of the 6th International Conference on E-Technologies, MCETECH 2015, held in Montreal, Canada, in May 2015.
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015.
The aim of this book is to demonstrate how Agent-Based Modelling (ABM) can be used to enhance the study of social agency, organizational behavior and organizational management.
This book contains 15 thoroughly refereed research papers selected from 90 submissions for the 5th, 6th, and 7th International Workshop on Enterprise Systems, Pre-ICIS 2010-2012, held in St.
This book constitutes the tutorial lectures of the 4th European Business Intelligence Summer School, eBISS 2014, held in Berlin, Germany, in July 2014.
This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015.
This book constitutes the refereed proceedings of the Third International Conference on Operations Research and Enterprise Systems, ICORES 2014, held in Angers, France, in March 2014.
After a brief presentation of the state of the art of process-mining techniques, Andrea Burratin proposes different scenarios for the deployment of process-mining projects, and in particular a characterization of companies in terms of their process awareness.
This book constitutes the refereed proceedings of the 7th International Workshop on Traffic Monitoring and Analysis, TMA 2015, held in Barcelona, Spain, in April 2015.
This book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Systems, CRiSIS 2014, held in Trento, Italy, in August 2014.
This is a multidisciplinary textbook on social commerce by leading authors of e-commerce and e-marketing textbooks, with contributions by several industry experts.
This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014, and the 3rd International Workshop on Quantitative Aspects in Security Assurance, held in Wroclaw, Poland, in September 2014, co-located with the 19th European Symposium on Research in Computer Security (ESORICS 2014).
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Smart Card Research and Advanced Applications, CARDIS 2014, held in Paris, France, in November 2014.
This book describes the next generation of business applications in the innovative new SAP Business Suite 4 SAP HANA (SAP S/4HANA), exploiting the revolutionary capabilities of the SAP HANA in-memory database.
This book constitutes the revised selected papers of the 5th International Provenance and Annotation Workshop, IPAW 2014, held in Cologne, Germany in June 2014.
This book constitutes the refereed proceedings of the 8th International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction, SBP 2015, held in Washington, DC, USA, in March/April 2015.
This book takes an in-depth look at consumer behavior in the context of multichannel commerce and explores how the convergence of physical and electronic channels influences consumer decision-making in a multichannel environment.
This book constitutes the refereed proceedings of the 20th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2014, held in Essen, Germany, in April 2013.
This book introduces a fuzzy classification approach, which combines relational databases with fuzzy logic for more effective and powerful customer relationship management (CRM).
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014.
This book describes the journey of developing and implementing a global knowledge sharing strategy at the multinational project development and construction company Skanska.