As organizations strive to balance innovation with accountability, this second volume in a trilogy on fuzzy systems and digital ethics examines how ethical and sustainable practices can be operationalized at the institutional level.
This book aims to examine the transition of firms from original equipment manufacturing (OEM) and original design manufacturing (ODM) to original brand manufacturing (OBM), focusing on how businesses can evolve to capture greater value in global markets.
As organizations strive to balance innovation with accountability, this second volume in a trilogy on fuzzy systems and digital ethics examines how ethical and sustainable practices can be operationalized at the institutional level.
This volume offers an in-depth analysis of the metaverse and its implications with other, more advanced technologies through an interdisciplinary approach that bridges the social sciences with the hard sciences.
This book investigates how academic and public libraries support entrepreneurs by offering diverse business support services in collaboration with other business support actors.
This book explores the architecture and framework for co-creating the most valuable and promising data in the future Internet, often referred to as Web 3.
This third volume of the book series “Domain-Specific Conceptual Modeling” presents new application cases for domain-specific modeling languages and for the engineering of modeling languages and tools.
This book offers a comprehensive overview of buildings' digital information security, focusing on various phases of building projects and their associated challenges.
This volume offers an in-depth analysis of the metaverse and its implications with other, more advanced technologies through an interdisciplinary approach that bridges the social sciences with the hard sciences.
As organizations strive to balance innovation with accountability, this second volume in a trilogy on fuzzy systems and digital ethics examines how ethical and sustainable practices can be operationalized at the institutional level.
This book offers a comprehensive guide to blockchain analytics, from foundational concepts to advanced applications, crafted for professionals, academics, policymakers, and students.
This book offers a comprehensive overview of buildings' digital information security, focusing on various phases of building projects and their associated challenges.
This third volume of the book series “Domain-Specific Conceptual Modeling” presents new application cases for domain-specific modeling languages and for the engineering of modeling languages and tools.
This book aims to examine the transition of firms from original equipment manufacturing (OEM) and original design manufacturing (ODM) to original brand manufacturing (OBM), focusing on how businesses can evolve to capture greater value in global markets.
This book offers novel insights into how expert fund managers—those who demonstrate superior performance over the long term—make their judgments and decisions.
This book offers a comprehensive guide to blockchain analytics, from foundational concepts to advanced applications, crafted for professionals, academics, policymakers, and students.
This book constitutes the proceedings of the BPM 2025 Responsible BPM Forum, Process Technology Forum, and Educators Forum held at the 23rd International Conference on Business Process Management, BPM 2025, which took place in Seville, Spain, during September 2025.
This two-part volume constitutes the refereed proceedings of the 11th International Conference on Information Management, ICIM 2025, held in London, UK, during March 28–30, 2025.
This book constitutes the proceedings of the BPM Forum held at the 23rd International Conference on Business Process Management, BPM 2025, which took place in Seville, Spain, during September 2025.
The two-volume set CCIS 2657 + 2658 constitutes the refereed proceedings of the 32nd European Conference on Systems, Software and Services Process Improvement, EuroSPI 2025, held in Riga, Latvia, during September 17-19, 2025.
The two-volume set CCIS 2657 + 2658 constitutes the refereed proceedings of the 32nd European Conference on Systems, Software and Services Process Improvement, EuroSPI 2025, held in Riga, Latvia, during September 17-19, 2025.
This book constitutes the proceedings of the BPM Forum held at the 23rd International Conference on Business Process Management, BPM 2025, which took place in Seville, Spain, during September 2025.
This two-part volume constitutes the refereed proceedings of the 11th International Conference on Information Management, ICIM 2025, held in London, UK, during March 28–30, 2025.
This two-part volume constitutes the refereed proceedings of the 11th International Conference on Information Management, ICIM 2025, held in London, UK, during March 28–30, 2025.
This two-part volume constitutes the refereed proceedings of the 11th International Conference on Information Management, ICIM 2025, held in London, UK, during March 28–30, 2025.
In einer Zeit, in der Daten in Echtzeit verfügbar sind und Entscheidungen immer schneller getroffen werden müssen, reicht es nicht mehr, Kommunikationsmaßnahmen rückblickend zu bewerten und manuell zu erledigen.
In einer Zeit, in der Daten in Echtzeit verfügbar sind und Entscheidungen immer schneller getroffen werden müssen, reicht es nicht mehr, Kommunikationsmaßnahmen rückblickend zu bewerten und manuell zu erledigen.
This book constitutes the proceedings of the BPM 2025 Responsible BPM Forum, Process Technology Forum, and Educators Forum held at the 23rd International Conference on Business Process Management, BPM 2025, which took place in Seville, Spain, during September 2025.
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.
Thetwo-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19thIACR International Conference on the Practiceand Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March2016.
This book constitutes the proceedings of the 6th International Conference on Principles of Security and Trust, POST 2017, which took place in Uppsala, Sweden in April 2017, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017.
The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.
The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.
This book constitutes the proceedings of the 13th International Conference on Service-Oriented Computing, ICSOC 2015, held in Goa, India, in November 2015.
The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.
The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.
This book constitutes the proceedings of the 6th International Conference on Principles of Security and Trust, POST 2017, which took place in Uppsala, Sweden in April 2017, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017.
The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016.