This volume explores emerging research and pedagogy in analytics, collaboration, and decision support with an emphasis on business intelligence and social media.
This book constitutes the refereed proceedings of ten international workshops held in Eindhoven, The Netherlands, in conjunction with the 12th International Conference on Business Process Management, BPM 2014, in September 2014.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on Energy Efficient Data Centers, E2DC 2014, held in Cambridge, UK, in June 2014.
This book constitutes revised selected papers from the International Symposium on Formal Aspects of Component Software, FACS 2014, held in Bertinoro, Italy, in September 2014.
This classroom-texted textbook/reference presents a set of useful modeling techniques, describing how these can be combined into a powerful framework for the analysis and design of business systems.
This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on Jeju Island, Korea, in August 2014.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th Brazilian Symposium on Formal Methods, SBMF 2014, held in Maceio, Brazil, in September/October 2014.
This book examines how information systems research and education can play a major role in contributing to solutions to the Societal Grand Challenges formulated in "e;The Millennium Project"e; (millenium-project.
This book contains the refereed proceedings of the 6th International Conference on Exploring Service Science (IESS), held in Porto, Portugal, in February 2015.
This volume contains the post-proceedings of the 9th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, MEMICS 2014, held in Telc, Czech Republic, in October 2014.
This volume contains the technical papers presented in the four high-quality workshops associated with the European Conference on Service-Oriented and Cloud Computing, ESOCC 2014, held in Manchester, UK, in September 2014: 4th International Workshop on Adaptive Services for the Future Internet, WAS4FI 2014, 2nd International Workshop on Cloud for IoT, CLIoT 2014, 2nd International Workshop on Cloud Service Brokerage, CSB 2014, and Seamless Adaptive Multi-cloud Management of Service-based Applications, SeaCloudS Workshop.
This book constitutes the refereed proceedings of the 11th International Conference on Economics of Grids, Clouds, Systems, and Services, GECON 2014, held in Cardiff, UK, in September 2014.
Featuring numerous case examples from companies around the world, this second edition integrates theoretical advances and empirical data with practical applications, including in-depth discussion on the COBIT 5 framework which can be used to build, measure and audit enterprise governance of IT approaches.
This book investigates the design and implementation of market mechanisms to explore how they can support knowledge- and innovation management within firms.
This book shows how business process management (BPM), as a management discipline at the intersection of IT and Business, can help organizations to master digital innovations and transformations.
This book collects and reports on the results of a study conducted on the Chinese Software and Services Outsourcing (SSO) industry, focusing on one of its main players as a key case study.
This book constitutes the refereed proceedings of three international workshops held in Rome, Italy, in conjunction with the 15th International Conference on Agile Software Development, XP 2014, in May 2014.
The papers presented in this volume advance the state-of-the-art research on big data and analytics, social media, electronic marketing, mobile computing and recommender systems, mobile sensors and geosocial services, augmented reality, wearable computing, smart tourism, electronic distribution for tourism and hospitality products and services, e-learning, responsive web design and management, and eTourism for development.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2013, held in September 2013 in Moscow, Russia.
This text presents an overview of smart information systems for both the private and public sector, highlighting the research questions that can be studied by applying computational intelligence.
This book provides comprehensive and concise definitions of risk pooling and risk-pooling methods, a straightforward statistical explanation, and a value-chain oriented framework for analyzing risk-pooling methods.
This book constitutes the refereed proceedings of workshops, held at the 32nd International Conference on Conceptual Modeling, ER 2013, in Hong Kong, China in November 2013.
This book constitutes the refereed proceedings of the 15th International Conference on Product-Focused Software Process Improvement, PROFES 2014, held in Helsinki, Finland, in December 2014.
This timely text/reference explores the business and technical issues involved in the management of information systems in the era of big data and beyond.
This book deals with the limitations of economic and financial accounting as an appropriate instrument to reflect the real value created or destroyed by an organization.
This book constitutes the refereed proceedings of the scientific track of the 7th Software Quality Days Conference, SWQD 2015, held in Vienna, Austria, in January 2015.
This volume contains 12 thoroughly refereed and revised papers detailing recent advances in research on designing trading agents and mechanisms for agent-mediated e-commerce.
This book constitutes the refereed proceedings of the 14th International Conference on Software Process Improvement and Capability Determination, SPICE 2014, held in Vilnius, Lithuania, in November 2014.
This book constitutes the refereed proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Chi Minh City, Vietnam, in November 2014.
This textbook mainly addresses beginners and readers with a basic knowledge of object-oriented programming languages like Java or C#, but with little or no modeling or software engineering experience - thus reflecting the majority of students in introductory courses at universities.
Investigates theoretically and empirically what it means to design technological artefacts while embracing the large number of practices which practitioners engage with when handling technologies.
This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014.
This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012.
This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols, held in Cambridge, UK, in March 2014.
This book constitutes the refereed proceedings of the 8th International Conference on Sequences and Their Applications, SETA 2014, held in Melbourne, VIC, Australia, in November 2014.
This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014.
This book constitutes the refereed proceedings of workshops, held at the 33rd International Conference on Conceptual Modeling, ER 2014, in Atlanta, GA, USA in October 2014.
This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments.
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013.
This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography Engineering held in Pune, India, in October 2014.
This book gathers together, in a new way, established and contemporary thinking about how to get the best out of information technology and information systems investments.
This book constitutes the refereed proceedings of the 11th Joint Conference on Knowledge-Based Software-Engineering, JCKBSE 2014, held in Volgograd, Russia, in September 2014.