This book contains the refereed proceedings of the 9th International Conference on Knowledge Management in Organizations (KMO) held in Santiago, Chile, during September 2014.
This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014.
This book constitutes the refereed proceedings of the 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2014, held in Egham, UK, in July 2014.
This book constitutes the refereed proceedings of the 14th International Symposium on Privacy Enhancing Technologies, PETS 2014, held in Amsterdam, The Netherlands, in July 2014.
This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Smart Card Research and Advanced Applications, CARDIS 2013, held in Berlin, Germany, in November 2013.
This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Web Services and Formal Methods, WS-FM 2013, held in Beijing, China, in August 2013.
This book constitutes the proceedings of the Second Asia Pacific Conference on Business Process Management held in Brisbane, QLD, Australia, in July 2014.
This book constitutes the proceedings of the First International Workshop on future Internet Testing, FITTEST 2013, held in Turkey, Istanbul, in November 2013, in conjunction with the International Conference on Testing Software and Systems (ICTSS).
This book constitutes the refereed proceedings of the 9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014, held in Harbin, China, in June 2014.
This book constitutes the proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas.
This book constitutes the revised selected papers of the 10th International Symposium on Formal Aspects of Component Software, FACS 2013, held in Nanchang, China, in October 2013.
This book constitutes the thoroughly refereed proceedings of the Third Australian Symposium on Service Research and Innovation, ASSRI 2013, held in Sydney, NSW, Australia, in November 2013.
This book explores the diversity of topics, views and perspectives focused on the relationship between information systems, organizations and managerial control.
This book constitutes the proceedings of 26th International Conference on Advanced Information Systems Engineering, CAiSE 2014, held in Thessaloniki, Greece in June 2014.
This book constitutes the thoroughly refereed proceedings of five international workshops held in Thessaloniki, Greece, in conjunction with the 26th International Conference on Advanced Information Systems Engineering, CAiSE 2014, in June 2014.
Data mining applications range from commercial to social domains, with novel applications appearing swiftly; for example, within the context of social networks.
This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future Internet services and systems, produced by the NESSoS project researchers.
This book constitutes the refereed proceedings of the 13th International Conference on Ad-hoc, Mobile and Wireless Networks, ADHOC-NOW 2014, held in Benidorm, Spain, in June 2014.
This book constitutes the proceedings of the Joint INFORMS-GDN and EWG-DSS International Conference on Group Decision and Negotiation (GDN), held in Toulouse, France, during June 10-13, 2014.
This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Risk Assessment and Risk-driven Testing, RISK 2013, held in conjunction with 25th IFIP International Conference on Testing Software and Systems, ICTSS 2013, in Istanbul, Turkey, in November 2013.
This book offers a multidisciplinary strategy for finding new and more effective human-computer interaction approaches, in particular from a socio-technical perspective, that facilitate the exploration and exploitation of benefits that information technologies (IT) offer organizations.
This collection of case studies in public management bridges the gap between mainstream CSR - confined to the for-profit corporations -and the vast bodies of workers and organizations that make up government and its public administration.
This book describes how manufacturing enterprises, by reinforcing their existing monitoring and control of manufacturing processes, can successfully face the ever-increasing pressure from internal and external environments to maintain their competitive advantage.
This book contains the refereed proceedings of the 15th International Conference on Agile Software Development, XP 2014, held in Rome, Italy, in May 2014.
This book constitutes the revised selected papers of the workshops of the 11th International Conference on Service-Oriented Computing (ICSOC 2013), held in Berlin, Germany, in December 2013.
This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICA CRYPT 2014, held in Marrakesh, Morocco in May 2014.
This book contains the refereed proceedings of the 17th International Conference on Business Information Systems, BIS 2014, held in Larnaca, Cyprus, in May 2014.
This book contains the extended and revised versions of selected papers from the Third International Symposium on Business Modeling and Software Design (BMSD 2013), held in Noordwijkerhout, The Netherlands, during July 8-10, 2013.
This book constitutes the proceedings of the 4th Enterprise Engineering Working Conference (EEWC), held in Funchal, Madeira Island, Portugal, during May 5-8, 2014.
This book constitutes the refereed proceedings of the 7th International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction, SBP 2014, held in Washington, DC, USA, in April 2014.
To large organizations, business intelligence (BI) promises the capability of collecting and analyzing internal and external data to generate knowledge and value, thus providing decision support at the strategic, tactical, and operational levels.
Due to the increasing importance of product differentiation and collapsing product life cycles, a growing number of value-adding activities in the industry and service sector are organized in projects.
This book constitutes the thoroughly refereed proceedings of the 6th International Conference on Subject-Oriented Business Process Management, S-BPM ONE 2014, held in Eichstatt, Germany, in April 2014.
This book aims to offer a comprehensive overview of the issues facing organizations when deciding whether to accept e-commerce as a platform for business.