This book offers a simple introduction to the fundamentals and applications of the Analytic Hierarchy Process (AHP) without a pre-requisite for a sophisticated mathematical background.
This volume presents the revised and peer reviewed contributions of the 'EPR Future 2014' conference held in Dornbirn/Austria on November 17-18th, 2014.
This book combines the quantitative decision-informing techniques of management science and operations research with the data-centric techniques found throughout the world of analytics.
Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehensive security plan meaningful to management and technical staff Uses practical risk management techniques to intelligently assess and manage the network security risks facing your organization Presents the material in a witty and lively style, backed up by solid business planning methods Companion Web site provides all worksheets and the security planning template
This book constitutes revised selected papers from the 6th International Conference on Information Systems, Logistics, and Supply Chains, ILS 2016, held in Bordeaux, France, in June 2016.
This second edition is designed for those interested in developing their skills in the construction of analytical tools and rich visual demonstrations in Excel.
This books brings readers a holistic understanding of blockchain adoption in healthcare by not only considering the technical fundamentals of use cases, but also the regulatory, informational and organizational challenges and solutions.
The essential guide for nonprofits wanting to manage their Internet applications in a coordinated, cost-effective, and efficient manner The rapid onset of increasingly advanced and complex technologies has challenged nonprofits to invest with their sparse resources in attempting, and failing, to keep pace with for-profit companies, with the result that most now cannot compete with new commercial products and commercial applications.
This book constitutes the proceedings of the 15th IFIP Working Conference on the Practice of Enterprise Modeling, PoEM 2022, which took place in London, UK, during November 23-25, 2022.
The purpose of this book is to promote discussion about educational objectives generally and objectives in the teaching of educational psychology in particular.
More African women than men become entrepreneurs, with women often balancing time caring for their households with small enterprises such as setting up shops in front of their homes, renting market stalls, or setting up hairstyling businesses.
For those wishing to acquire knowledge on national development issues, this comprehensive compendium traverses a spectrum of subjects that the audience ought to be well acquainted with.
Foreword by Lars Knudsen Practical Intranet Security focuses on the various ways in which an intranet can be violated and gives a thorough review of the technologies that can be used by an organization to secure its intranet.
Elements of Numerical Mathematical Economics with Excel: Static and Dynamic Optimization shows readers how to apply static and dynamic optimization theory in an easy and practical manner, without requiring the mastery of specific programming languages that are often difficult and expensive to learn.
Use this practical guide to the Splunk operational data intelligence platform to search, visualize, and analyze petabyte-scale, unstructured machine data.
Case Studies in Service Innovation provides the reader fresh insight into how innovation occurs in practice, and stimulates learning from one context to another.
Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee.
This book explains how gamification, specifically enterprise gamification, can help mangers in multiple areas within an enterprise to improve attrition.
This book examines the effectiveness of communication between chief information officer (CIO) and chief executive officer (CEO) and its impact on the role of information technology (IT) in an organization.
Jorg Igelbrink's study provides the disclosure of a comprehensive explanation approach of the consumers purchase motivation and attitude towards local fashion brands.
This book constitutes the refereed proceedings of the 2023 International Conference on Business Intelligence and Information Technology (BIIT 2023) held in Harbin, China, during December 16-17, 2023.
It is now more than twenty-five years since object-oriented programming was "e;inve- ed"e; (actually, more than thirty years since work on Simula started), but, by all accounts, it would appear as if object-oriented technology has only been "e;discovered"e; in the past ten years!
This book explores AI technology in wealth management, including what it is, how it changes the wealth management and private banking landscape, its advantages, and how it democratizes wealth management.
This book constitutes the refereed proceedings of the 5th International Conference on Serviceology for Services, held in Vienna, Austria, in July 2017.
Der erfolgreiche Einsatz eines Datenbanksystems in der Praxis ist davon abhängig, inwieweit es gelingt, das gegebene Informationsproblem in einem Datenmodell abzubilden, das dann auf einem Rechner implementiert wird und in vielfältiger Form genutzt werden kann.
This book offers a comprehensive overview of the dynamics underpinning the successful performance of local innovation systems (LIS), that is, spatial concentration of innovation activities in specific geographical areas, characterized by the synergetic co-localization of research centers, innovation-driven enterprises, large corporations and capital providers.