Emerging trends in ICT security / / edited by Babak Akhgar, Hamid R. Arabnia |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, MA : , : Morgan Kaufmann, , 2014 |
Descrizione fisica | 1 online resource (xxix, 631 pages) : illustrations (some color) |
Disciplina | 005.8 |
Collana |
Emerging trends in computer science & applied computing
Gale eBooks |
Soggetto topico |
Information technology - Security measures
Computer crimes - Prevention Cyberterrorism - Prevention Electronic surveillance |
ISBN | 0-12-410487-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Emerging Trends in ICT Security; Copyright Page; Contents; Acknowledgments; Review Board; About the Editors; List of Contributors; Preface; 1 Information and Systems Security; 1 Theory/Reviews of the Field; 1 System Security Engineering for Information Systems; Introduction; System security engineering history; The system security engineering process; The revitalization of system security engineering; Established system security engineering methods, processes, and tools; Acquisition program protection planning; Information assurance; Systems engineering critical reviews
Modern and emerging system security engineering methods, processes, and tools Discovery and understanding of complex systems for security; Mission assurance; Formalized security requirements; Early design considerations; Plan for failure; Security and system patterns; Leveraging system architectures for security; Agile and self-organizing system security; Security metrics and evaluation; Identified SSE research areas; Conclusion; Recommendations; Disclaimer; Acknowledgments; References; Further reading; 2 Metrics and Indicators as Key Organizational Assets for ICT Security Assessment Introduction GOCAME strategy overview; GOCAME conceptual framework; GOCAME process and the W5H rule; Security evaluation for a web system: A proof of concept; Target entity and information need; Security characteristic specification; Metric and indicator specifications; Implementing the M&E; Risk and security vulnerability issues; Metrics and indicators for repeatable and consistent analysis: a discussion; Related work; Conclusion and future work; References; 3 A Fresh Look at Semantic Natural Language Information Assurance and Security: NL IAS from Watermarking and Downgrading to... Introduction Early breakthrough in NL IAS; The conceptual foundation of NL IAS; NL IA applications; NL watermarking; NL tamperproofing; NL sanitizing/downgrading; NL steganography and steganalysis; A sketch of ontological semantic technology; Mature semantic NL IAS; Semantic forensics; Unintended inferences and the meaning of the unsaid; Situational conceptual defaults; The term, its origins, and the canonical case; Default reversal; Are defaults really common sense knowledge?; Underdetermination of reality by language; Scripts; Anonymization; Summary; Acknowledgments; References; 2 Methods 4 An Approach to Facilitate Security Assurance for Information Sharing and Exchange in Big-Data Applications Introduction; UML extensions for XML security; Extensions for policy modeling and integration; Integrating local security policies into a global security policy; Assumptions and equivalence finding; Integration process for local SPSS; Resolving conflicts of integrated security rule sets; Creating the global SPSS; Related work; Conclusion; References; 5 Gamification of Information Security Awareness Training; Introduction; Literature review; General concepts; Serious games Games adoption in multiple domains |
Record Nr. | UNINA-9910790864603321 |
Waltham, MA : , : Morgan Kaufmann, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Emerging trends in ICT security / / edited by Babak Akhgar, Hamid R. Arabnia |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, MA : , : Morgan Kaufmann, , 2014 |
Descrizione fisica | 1 online resource (xxix, 631 pages) : illustrations (some color) |
Disciplina | 005.8 |
Collana |
Emerging trends in computer science & applied computing
Gale eBooks |
Soggetto topico |
Information technology - Security measures
Computer crimes - Prevention Cyberterrorism - Prevention Electronic surveillance |
ISBN | 0-12-410487-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Emerging Trends in ICT Security; Copyright Page; Contents; Acknowledgments; Review Board; About the Editors; List of Contributors; Preface; 1 Information and Systems Security; 1 Theory/Reviews of the Field; 1 System Security Engineering for Information Systems; Introduction; System security engineering history; The system security engineering process; The revitalization of system security engineering; Established system security engineering methods, processes, and tools; Acquisition program protection planning; Information assurance; Systems engineering critical reviews
Modern and emerging system security engineering methods, processes, and tools Discovery and understanding of complex systems for security; Mission assurance; Formalized security requirements; Early design considerations; Plan for failure; Security and system patterns; Leveraging system architectures for security; Agile and self-organizing system security; Security metrics and evaluation; Identified SSE research areas; Conclusion; Recommendations; Disclaimer; Acknowledgments; References; Further reading; 2 Metrics and Indicators as Key Organizational Assets for ICT Security Assessment Introduction GOCAME strategy overview; GOCAME conceptual framework; GOCAME process and the W5H rule; Security evaluation for a web system: A proof of concept; Target entity and information need; Security characteristic specification; Metric and indicator specifications; Implementing the M&E; Risk and security vulnerability issues; Metrics and indicators for repeatable and consistent analysis: a discussion; Related work; Conclusion and future work; References; 3 A Fresh Look at Semantic Natural Language Information Assurance and Security: NL IAS from Watermarking and Downgrading to... Introduction Early breakthrough in NL IAS; The conceptual foundation of NL IAS; NL IA applications; NL watermarking; NL tamperproofing; NL sanitizing/downgrading; NL steganography and steganalysis; A sketch of ontological semantic technology; Mature semantic NL IAS; Semantic forensics; Unintended inferences and the meaning of the unsaid; Situational conceptual defaults; The term, its origins, and the canonical case; Default reversal; Are defaults really common sense knowledge?; Underdetermination of reality by language; Scripts; Anonymization; Summary; Acknowledgments; References; 2 Methods 4 An Approach to Facilitate Security Assurance for Information Sharing and Exchange in Big-Data Applications Introduction; UML extensions for XML security; Extensions for policy modeling and integration; Integrating local security policies into a global security policy; Assumptions and equivalence finding; Integration process for local SPSS; Resolving conflicts of integrated security rule sets; Creating the global SPSS; Related work; Conclusion; References; 5 Gamification of Information Security Awareness Training; Introduction; Literature review; General concepts; Serious games Games adoption in multiple domains |
Record Nr. | UNINA-9910807239603321 |
Waltham, MA : , : Morgan Kaufmann, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Emerging trends in image processing, computer vision and pattern recognition / edited by Leonidas Deligiannidis, Hamid R. Arabnia |
Autore | DELIGIANNIDIS, Leonidas |
Pubbl/distr/stampa | Waltham, : Morgan Kaufmann, 2015 |
Descrizione fisica | Testo elettronico (PDF) (633 p.) |
Disciplina | 006.42 |
Collana | Emerging Trends in Computer Science & Applied Computing |
Soggetto topico | Visione artificiale |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996459752703316 |
DELIGIANNIDIS, Leonidas
![]() |
||
Waltham, : Morgan Kaufmann, 2015 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Engineering global e-commerce sites [electronic resource] : a guide to data capture, content, and transactions / James Bean ; foreword by Jorden Woods. |
Autore | Bean, James (James D.) |
Pubbl/distr/stampa | San Francisco, Calif. : Morgan Kaufmann |
Descrizione fisica | xv, 230 p. : ill. ; 24 cm. |
Disciplina | 005.74 |
Soggetto topico |
Electronic commerce
Web sites - Design XML (Document markup language) |
Soggetto genere / forma | Electronic books. |
ISBN |
9781558608924
1558608923 |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Global E-Commerce and the Web. Global, Regional, International, and Local. Global Standards. Globalized Data and Transactions. Globalization Process and Techniques. Transaction Engineering. Enterprise Application Integration. The Complexities of Mobile E-Commerce. Appendix. |
Record Nr. | UNISALENTO-991003249129707536 |
Bean, James (James D.)
![]() |
||
San Francisco, Calif. : Morgan Kaufmann | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
Ensuring digital accessibility through process and policy / / Jonathan Lazar, Daniel Goldstein, Anne Taylor ; acquiring editor, Todd Green ; editorial project manager, Lindsay Lawrence ; designer, Greg Harris |
Autore | Lazar Jonathan |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam, Netherlands : , : Morgan Kaufmann, , 2015 |
Descrizione fisica | 1 online resource (247 p.) |
Disciplina | 025.04087 |
Soggetto topico |
Assistive computer technology - United States
User interfaces (Computer systems) - United States |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Ensuring Digital Accessibility through Process and Policy; Copyright; Critical Acclaim for Ensuring Digital Accessibility through Process and Policy ; Contents; About the Authors; Preface; Chapter 1: Introduction to accessible technology; Introduction; Defining Accessible Technology; Various Types of Disabilities; Accessibility Helps Those Without Disabilities; Various Types of Technologies; Mobile Devices, Apps, and Accessibility; Accessibility in Desktop and Laptop Computers; How does Accessibility Work?; Accessibility in Kiosks and Voting Machines
Accessible Technology vs. Augmentative Communication and ProstheticsVarious Types of Policies; How Policies and Laws Can Lead to Improved Access to Digital Information; Summary; A Note About the Usage of Terms; References; Chapter 2: The history of access technology; Introduction; Early History of Assistive Technologies (through the 1960s); The Invention of the Typewriter; The Record Player and the Audiobook; TTYs for the Deaf and Hard of Hearing; The 1970s-Present; Optical Character Recognition, Synthetic Speech, and the Flatbed Scanner; Captioning; Speech Recognition Speech Recognition and Learning Disabled StudentsScreen Reader Technology; Assistive and Augmentative Communication; Power Wheelchairs and Prosthetics; Current Events and Trends; How Accessible Technology has Crossed Over into the Mainstream; Understanding Why/How People with Disabilities Adopt Technology; How the Changes in Technology Over Time Must Influence Changes in Solutions; Summary; References; Chapter 3: The discriminatory impact of digital inaccessibility; Introduction; Separate But Equal in the Context of Disability; Same Time; Same Price; Same Content Same Time, Same Content, Same Price, And Now . . . Same Hardware and SoftwareSummary; References; Chapter 4: Technical standards for accessibility; Accessibility Standards; The World Wide Web Consortium and the Web Accessibility Initiative; Web Accessibility Standards; The Web Content Accessibility Guidelines; Authoring Tool Accessibility Guidelines; Atag 2.0; User Agent Accessibility Guidelines; Relationship to the Web Content Accessibility Guidelines (WCAG) 2.0; Relationship to the Authoring Tool Accessibility Guidelines (ATAG) 2.0; Accessible Rich Internet Application; Epub Applying WCAG 2.0 to Non-Web Information and Communications TechnologiesSummary; References; Chapter 5: U.S. laws and lawsuits; Introduction; Applicability of American Laws to Technology Developers; The Pace of Change in the Development of Technology Affects the Design of Legal Definitions of Access; Federal Statutes that have an Impact on the Accessibility of Technology; Section 504 of the Rehabilitation Act and Title II of the ADA; Public Colleges: A Case Study in the Application of Title II and 504 to Change the Behavior of Tech and Digital Content Ven ... Title III of the ADA-Places of Public Accommodation |
Record Nr. | UNINA-9910788270203321 |
Lazar Jonathan
![]() |
||
Amsterdam, Netherlands : , : Morgan Kaufmann, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Ensuring digital accessibility through process and policy / / Jonathan Lazar, Daniel Goldstein, Anne Taylor ; acquiring editor, Todd Green ; editorial project manager, Lindsay Lawrence ; designer, Greg Harris |
Autore | Lazar Jonathan |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam, Netherlands : , : Morgan Kaufmann, , 2015 |
Descrizione fisica | 1 online resource (247 p.) |
Disciplina | 025.04087 |
Soggetto topico |
Assistive computer technology - United States
User interfaces (Computer systems) - United States |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Ensuring Digital Accessibility through Process and Policy; Copyright; Critical Acclaim for Ensuring Digital Accessibility through Process and Policy ; Contents; About the Authors; Preface; Chapter 1: Introduction to accessible technology; Introduction; Defining Accessible Technology; Various Types of Disabilities; Accessibility Helps Those Without Disabilities; Various Types of Technologies; Mobile Devices, Apps, and Accessibility; Accessibility in Desktop and Laptop Computers; How does Accessibility Work?; Accessibility in Kiosks and Voting Machines
Accessible Technology vs. Augmentative Communication and ProstheticsVarious Types of Policies; How Policies and Laws Can Lead to Improved Access to Digital Information; Summary; A Note About the Usage of Terms; References; Chapter 2: The history of access technology; Introduction; Early History of Assistive Technologies (through the 1960s); The Invention of the Typewriter; The Record Player and the Audiobook; TTYs for the Deaf and Hard of Hearing; The 1970s-Present; Optical Character Recognition, Synthetic Speech, and the Flatbed Scanner; Captioning; Speech Recognition Speech Recognition and Learning Disabled StudentsScreen Reader Technology; Assistive and Augmentative Communication; Power Wheelchairs and Prosthetics; Current Events and Trends; How Accessible Technology has Crossed Over into the Mainstream; Understanding Why/How People with Disabilities Adopt Technology; How the Changes in Technology Over Time Must Influence Changes in Solutions; Summary; References; Chapter 3: The discriminatory impact of digital inaccessibility; Introduction; Separate But Equal in the Context of Disability; Same Time; Same Price; Same Content Same Time, Same Content, Same Price, And Now . . . Same Hardware and SoftwareSummary; References; Chapter 4: Technical standards for accessibility; Accessibility Standards; The World Wide Web Consortium and the Web Accessibility Initiative; Web Accessibility Standards; The Web Content Accessibility Guidelines; Authoring Tool Accessibility Guidelines; Atag 2.0; User Agent Accessibility Guidelines; Relationship to the Web Content Accessibility Guidelines (WCAG) 2.0; Relationship to the Authoring Tool Accessibility Guidelines (ATAG) 2.0; Accessible Rich Internet Application; Epub Applying WCAG 2.0 to Non-Web Information and Communications TechnologiesSummary; References; Chapter 5: U.S. laws and lawsuits; Introduction; Applicability of American Laws to Technology Developers; The Pace of Change in the Development of Technology Affects the Design of Legal Definitions of Access; Federal Statutes that have an Impact on the Accessibility of Technology; Section 504 of the Rehabilitation Act and Title II of the ADA; Public Colleges: A Case Study in the Application of Title II and 504 to Change the Behavior of Tech and Digital Content Ven ... Title III of the ADA-Places of Public Accommodation |
Record Nr. | UNINA-9910811478703321 |
Lazar Jonathan
![]() |
||
Amsterdam, Netherlands : , : Morgan Kaufmann, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Enterprise business intelligence and data warehousing : program management essentials / / Alan Simon |
Autore | Simon Alan <1958-> |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Morgan Kaufmann, , 2015 |
Descrizione fisica | 1 online resource (101 p.) |
Disciplina | 658.472 |
Soggetto topico |
Business intelligence
Data warehousing Business enterprises - Decision making |
Soggetto genere / forma | Electronic books. |
ISBN |
0-12-801540-3
0-12-801746-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""Cover""; ""Title Page""; ""Copyright Page""; ""Contents""; ""About the author""; ""Preface""; ""Introduction: a provocative question""; ""This book�s premises""; ""References""; ""Chapter 1 - The Challenge of Managing and Leading the Enterprise BI/DW Program""; ""Chapter introduction""; ""The challenges of enterprise-scale bi and data warehousing""; ""Immature Technology""; ""Backlash From Early EDW Failures""; ""Many Competing Enterprise Initiatives (and the Impact of Packaged Software)""; ""“The Need for Speed�""; ""Individual Business Unit BI Often More Valued Than Enterprise BI""
""The Cost and Difficulty of Unwinding Fragmented Data Marts""""Lack of “A Voice of Authority� Champion""; ""Postrecession Retrenchment""; ""Why we can be successful in today�s and tomorrow�s ebi/edw efforts""; ""A Rich, Easily Accessible Body of Knowledge""; ""A New Generation of Game-Changing Technology""; ""Greater Appreciation for the Value of Cross-Functional Business Intelligence""; ""Broader Appreciation for Predictive and Discovery Analytics""; ""“Back on the Table� Capabilities (and New Excitement)""; ""Cost Pressures on the Status Quo"" ""Looking ahead: the ebi/edw program manager""""Reference""; ""Chapter 2 - The Role and Charter of the Enterprise Business Intelligence and Data Warehousing Program Manager""; ""Chapter introduction""; ""The program manager job description""; ""Organizational reporting relationship""; ""The program management team""; ""The Program Architect""; ""The Program Administrator/Controller""; ""Portfolio Project Managers""; ""When a multilayered program management team is necessary""; ""Looking ahead: the project portfolio""; ""Chapter 3 - Building the EBI/EDW Program�s Initial Project Portfolio"" ""Chapter introduction""""Identifying the program�s portfolio of projects: alternatives and recommendations""; ""The project portfolio “metadata�""; ""Looking ahead: refining the ebi/edw project portfolio""; ""Reference""; ""Chapter 4 - Putting the Finishing Touches on the EBI/EDW Program�s Project Portfolio""; ""Chapter introduction""; ""Identifying overlapping capabilities and potential economies of scale""; ""Prioritizing the list of portfolio projects""; ""Finalizing the program�s architecture""; ""Updating and finalizing the program budget"" ""Risk mitigation and contingency planning""""Preparing the program time line and project work plans""; ""Conducting the Critical Design and Schedule Review""; ""Securing buy-in and sponsorship""; ""Looking ahead: risk mitigation and contingency planning""; ""Chapter 5 - Program-Level Risk Management""; ""Chapter introduction""; ""Technology and architecture""; ""Mitigation Strategies""; ""“Many moving parts� interdependencies""; ""Mitigation Strategies""; ""Apathetic and detached leadership""; ""Mitigation Strategies""; ""Nondedicated resources""; ""Mitigation Strategies"" ""Delayed budget cuts"" |
Record Nr. | UNINA-9910463648903321 |
Simon Alan <1958->
![]() |
||
Waltham, Massachusetts : , : Morgan Kaufmann, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Enterprise business intelligence and data warehousing : program management essentials / / Alan Simon |
Autore | Simon Alan <1958-> |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Morgan Kaufmann, , 2015 |
Descrizione fisica | 1 online resource (101 p.) |
Disciplina | 658.472 |
Soggetto topico |
Business intelligence
Data warehousing Business enterprises - Decision making |
ISBN |
0-12-801540-3
0-12-801746-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""Cover""; ""Title Page""; ""Copyright Page""; ""Contents""; ""About the author""; ""Preface""; ""Introduction: a provocative question""; ""This book�s premises""; ""References""; ""Chapter 1 - The Challenge of Managing and Leading the Enterprise BI/DW Program""; ""Chapter introduction""; ""The challenges of enterprise-scale bi and data warehousing""; ""Immature Technology""; ""Backlash From Early EDW Failures""; ""Many Competing Enterprise Initiatives (and the Impact of Packaged Software)""; ""“The Need for Speed�""; ""Individual Business Unit BI Often More Valued Than Enterprise BI""
""The Cost and Difficulty of Unwinding Fragmented Data Marts""""Lack of “A Voice of Authority� Champion""; ""Postrecession Retrenchment""; ""Why we can be successful in today�s and tomorrow�s ebi/edw efforts""; ""A Rich, Easily Accessible Body of Knowledge""; ""A New Generation of Game-Changing Technology""; ""Greater Appreciation for the Value of Cross-Functional Business Intelligence""; ""Broader Appreciation for Predictive and Discovery Analytics""; ""“Back on the Table� Capabilities (and New Excitement)""; ""Cost Pressures on the Status Quo"" ""Looking ahead: the ebi/edw program manager""""Reference""; ""Chapter 2 - The Role and Charter of the Enterprise Business Intelligence and Data Warehousing Program Manager""; ""Chapter introduction""; ""The program manager job description""; ""Organizational reporting relationship""; ""The program management team""; ""The Program Architect""; ""The Program Administrator/Controller""; ""Portfolio Project Managers""; ""When a multilayered program management team is necessary""; ""Looking ahead: the project portfolio""; ""Chapter 3 - Building the EBI/EDW Program�s Initial Project Portfolio"" ""Chapter introduction""""Identifying the program�s portfolio of projects: alternatives and recommendations""; ""The project portfolio “metadata�""; ""Looking ahead: refining the ebi/edw project portfolio""; ""Reference""; ""Chapter 4 - Putting the Finishing Touches on the EBI/EDW Program�s Project Portfolio""; ""Chapter introduction""; ""Identifying overlapping capabilities and potential economies of scale""; ""Prioritizing the list of portfolio projects""; ""Finalizing the program�s architecture""; ""Updating and finalizing the program budget"" ""Risk mitigation and contingency planning""""Preparing the program time line and project work plans""; ""Conducting the Critical Design and Schedule Review""; ""Securing buy-in and sponsorship""; ""Looking ahead: risk mitigation and contingency planning""; ""Chapter 5 - Program-Level Risk Management""; ""Chapter introduction""; ""Technology and architecture""; ""Mitigation Strategies""; ""“Many moving parts� interdependencies""; ""Mitigation Strategies""; ""Apathetic and detached leadership""; ""Mitigation Strategies""; ""Nondedicated resources""; ""Mitigation Strategies"" ""Delayed budget cuts"" |
Record Nr. | UNINA-9910787908903321 |
Simon Alan <1958->
![]() |
||
Waltham, Massachusetts : , : Morgan Kaufmann, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Enterprise business intelligence and data warehousing : program management essentials / / Alan Simon |
Autore | Simon Alan <1958-> |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Morgan Kaufmann, , 2015 |
Descrizione fisica | 1 online resource (101 p.) |
Disciplina | 658.472 |
Soggetto topico |
Business intelligence
Data warehousing Business enterprises - Decision making |
ISBN |
0-12-801540-3
0-12-801746-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""Cover""; ""Title Page""; ""Copyright Page""; ""Contents""; ""About the author""; ""Preface""; ""Introduction: a provocative question""; ""This book�s premises""; ""References""; ""Chapter 1 - The Challenge of Managing and Leading the Enterprise BI/DW Program""; ""Chapter introduction""; ""The challenges of enterprise-scale bi and data warehousing""; ""Immature Technology""; ""Backlash From Early EDW Failures""; ""Many Competing Enterprise Initiatives (and the Impact of Packaged Software)""; ""“The Need for Speed�""; ""Individual Business Unit BI Often More Valued Than Enterprise BI""
""The Cost and Difficulty of Unwinding Fragmented Data Marts""""Lack of “A Voice of Authority� Champion""; ""Postrecession Retrenchment""; ""Why we can be successful in today�s and tomorrow�s ebi/edw efforts""; ""A Rich, Easily Accessible Body of Knowledge""; ""A New Generation of Game-Changing Technology""; ""Greater Appreciation for the Value of Cross-Functional Business Intelligence""; ""Broader Appreciation for Predictive and Discovery Analytics""; ""“Back on the Table� Capabilities (and New Excitement)""; ""Cost Pressures on the Status Quo"" ""Looking ahead: the ebi/edw program manager""""Reference""; ""Chapter 2 - The Role and Charter of the Enterprise Business Intelligence and Data Warehousing Program Manager""; ""Chapter introduction""; ""The program manager job description""; ""Organizational reporting relationship""; ""The program management team""; ""The Program Architect""; ""The Program Administrator/Controller""; ""Portfolio Project Managers""; ""When a multilayered program management team is necessary""; ""Looking ahead: the project portfolio""; ""Chapter 3 - Building the EBI/EDW Program�s Initial Project Portfolio"" ""Chapter introduction""""Identifying the program�s portfolio of projects: alternatives and recommendations""; ""The project portfolio “metadata�""; ""Looking ahead: refining the ebi/edw project portfolio""; ""Reference""; ""Chapter 4 - Putting the Finishing Touches on the EBI/EDW Program�s Project Portfolio""; ""Chapter introduction""; ""Identifying overlapping capabilities and potential economies of scale""; ""Prioritizing the list of portfolio projects""; ""Finalizing the program�s architecture""; ""Updating and finalizing the program budget"" ""Risk mitigation and contingency planning""""Preparing the program time line and project work plans""; ""Conducting the Critical Design and Schedule Review""; ""Securing buy-in and sponsorship""; ""Looking ahead: risk mitigation and contingency planning""; ""Chapter 5 - Program-Level Risk Management""; ""Chapter introduction""; ""Technology and architecture""; ""Mitigation Strategies""; ""“Many moving parts� interdependencies""; ""Mitigation Strategies""; ""Apathetic and detached leadership""; ""Mitigation Strategies""; ""Nondedicated resources""; ""Mitigation Strategies"" ""Delayed budget cuts"" |
Record Nr. | UNINA-9910823565103321 |
Simon Alan <1958->
![]() |
||
Waltham, Massachusetts : , : Morgan Kaufmann, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Entity information life cycle for big data : master data management and information integration / / John R. Talburt, Yinle Zhou |
Autore | Talburt John R. |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam, [Netherlands] : , : Morgan Kaufmann, , 2015 |
Descrizione fisica | 1 online resource (255 p.) |
Disciplina | 005.7 |
Soggetto topico |
Big data
Pattern recognition systems Semantic Web Data mining |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Entity Information Life Cycle for Big Data; Copyright; Contents; Foreword; Preface; THE CHANGING LANDSCAPE OF INFORMATION QUALITY; MOTIVATION FOR THIS BOOK; AUDIENCE; ORGANIZATION OF THE MATERIAL; Acknowledgements; Chapter 1 - The Value Proposition for MDM and Big Data; DEFINITION AND COMPONENTS OF MDM; THE BUSINESS CASE FOR MDM; DIMENSIONS OF MDM; THE CHALLENGE OF BIG DATA; MDM AND BIG DATA - THE N-SQUARED PROBLEM; CONCLUDING REMARKS; Chapter 2 - Entity Identity Information and the CSRUD Life Cycle Model; ENTITIES AND ENTITY REFERENCES; MANAGING ENTITY IDENTITY INFORMATION
ENTITY IDENTITY INFORMATION LIFE CYCLE MANAGEMENT MODELSCONCLUDING REMARKS; Chapter 3 - A Deep Dive into the Capture Phase; AN OVERVIEW OF THE CAPTURE PHASE; BUILDING THE FOUNDATION; UNDERSTANDING THE DATA; DATA PREPARATION; SELECTING IDENTITY ATTRIBUTES; ASSESSING ER RESULTS; DATA MATCHING STRATEGIES; CONCLUDING REMARKS; Chapter 4 - Store and Share - Entity Identity Structures; ENTITY IDENTITY INFORMATION MANAGEMENT STRATEGIES; DEDICATED MDM SYSTEMS; THE IDENTITY KNOWLEDGE BASE; MDM ARCHITECTURES; CONCLUDING REMARKS; Chapter 5 - Update and Dispose Phases - Ongoing Data Stewardship DATA STEWARDSHIPTHE AUTOMATED UPDATE PROCESS; THE MANUAL UPDATE PROCESS; ASSERTED RESOLUTION; EIS VISUALIZATION TOOLS; MANAGING ENTITY IDENTIFIERS; CONCLUDING REMARKS; Chapter 6 - Resolve and Retrieve Phase - Identity Resolution; IDENTITY RESOLUTION; IDENTITY RESOLUTION ACCESS MODES; CONFIDENCE SCORES; CONCLUDING REMARKS; Chapter 7 - Theoretical Foundations; THE FELLEGI-SUNTER THEORY OF RECORD LINKAGE; THE STANFORD ENTITY RESOLUTION FRAMEWORK; ENTITY IDENTITY INFORMATION MANAGEMENT; CONCLUDING REMARKS; Chapter 8 - The Nuts and Bolts of Entity Resolution; THE ER CHECKLIST CLUSTER-TO-CLUSTER CLASSIFICATIONSELECTING AN APPROPRIATE ALGORITHM; CONCLUDING REMARKS; Chapter 9 - Blocking; BLOCKING; BLOCKING BY MATCH KEY; DYNAMIC BLOCKING VERSUS PRERESOLUTION BLOCKING; BLOCKING PRECISION AND RECALL; MATCH KEY BLOCKING FOR BOOLEAN RULES; MATCH KEY BLOCKING FOR SCORING RULES; CONCLUDING REMARKS; Chapter 10 - CSRUD for Big Data; LARGE-SCALE ER FOR MDM; THE TRANSITIVE CLOSURE PROBLEM; DISTRIBUTED, MULTIPLE-INDEX, RECORD-BASED RESOLUTION; AN ITERATIVE, NONRECURSIVE ALGORITHM FOR TRANSITIVE CLOSURE; ITERATION PHASE: SUCCESSIVE CLOSURE BY REFERENCE IDENTIFIER DEDUPLICATION PHASE: FINAL OUTPUT OF COMPONENTSER USING THE NULL RULE; THE CAPTURE PHASE AND IKB; THE IDENTITY UPDATE PROBLEM; PERSISTENT ENTITY IDENTIFIERS; THE LARGE COMPONENT AND BIG ENTITY PROBLEMS; IDENTITY CAPTURE AND UPDATE FOR ATTRIBUTE-BASED RESOLUTION; CONCLUDING REMARKS; Chapter 11 - ISO Data Quality Standards for Master Data; BACKGROUND; GOALS AND SCOPE OF THE ISO 8000-110 STANDARD; FOUR MAJOR COMPONENTS OF THE ISO 8000-110 STANDARD; SIMPLE AND STRONG COMPLIANCE WITH ISO 8000-110; ISO 22745 INDUSTRIAL SYSTEMS AND INTEGRATION; BEYOND ISO 8000-110; CONCLUDING REMARKS Appendix A - Some Commonly Used ER Comparators |
Record Nr. | UNINA-9910788125003321 |
Talburt John R.
![]() |
||
Amsterdam, [Netherlands] : , : Morgan Kaufmann, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|