Advances in Global Sourcing. Models, Governance, and Relationships : 7th Global Sourcing Workshop 2013, Val d’Isère, France, March 11-14, 2013, Revised Selected Papers / / edited by Ilan Oshri, Julia Kotlarsky, Leslie P. Willcocks |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 223 p. 23 illus.) |
Disciplina | 658.054 |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Electronic data processing - Management
Software engineering Industrial organization Industrial procurement IT Operations Software Engineering Organization Procurement |
ISBN | 3-642-40951-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | IT Global Delivery Model Efficiency: An Exploratory Case Study to Identify Input and Output Factors -- Relative and Joint Dependence in IS Outsourcing Relationships – A Model of Effects on Relational Facets and Exchange Performance -- The Role of Organizational Standards in IT Outsourcing Relations -- Vendor Capabilities in ITO Research: A Systematization and Critical Review -- The Middle Management of Offshoring: Understanding Offshoring Strategy Implementation at a Meso Level -- Offshore BPO Decisions and Institutional Influence on Senior Managers -- Cloud Computing as Innovation: Studying Diffusion -- Towards Improvement of Information Systems Governance: Reorganization of Software Applications Hosting -- Coordinating Tensions in Orchestrating Blended Modes of Sharing and Outsourcing of Services -- Can Agile Software Tools Bring the Benefits of a Task Board to Globally Distributed Teams? -- KAIWA: Towards a Method for Knowledge Transfer in the Transition Phase of Offshore Outsourced Projects -- Opaque Indifference and Corporate Social Responsibility: A Moral License for Offshore BPO? -- Business Process Outsourcing in Suriname: Call Center Services. |
Record Nr. | UNINA-9910437958303321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applications and algorithms in business : module A / Frances G. Gustavson, C. William Gear |
Autore | Gustavson, Frances G. |
Pubbl/distr/stampa | Chicago : Science Research Associates, c1978 |
Descrizione fisica | VIII, 134 p. : ill. ; 24 cm |
Disciplina | 658.054 |
Altri autori (Persone) | Gear, C. William |
Collana | Introduction to computers, structured programming, and applications |
ISBN | 0-574-21190-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Titolo uniforme | |
Record Nr. | UNIPARTHENOPE-000020438 |
Gustavson, Frances G. | ||
Chicago : Science Research Associates, c1978 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Parthenope | ||
|
Artifact-Driven Business Process Monitoring : A Novel Approach to Transparently Monitor Business Processes, Supported by Methods, Tools, and Real-World Applications / / by Giovanni Meroni |
Autore | Meroni Giovanni |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (170 pages) |
Disciplina | 658.054 |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Application software
Information technology - Management Cooperating objects (Computer systems) Computer and Information Systems Applications Business Process Management Cyber-Physical Systems |
ISBN | 3-030-32412-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1 Introduction -- 1.1 Motivations -- 1.2 Research Challenges -- 1.3 Research Questions -- 1.4 Major Contributions -- 1.5 Book Structure -- 2 Related Work -- 2.1 Business Process Monitoring -- 2.1.1 Process Monitoring Based on Sensor Data -- 2.1.2 Event Data Logging -- 2.1.3 Business Activity Monitoring -- 2.1.4 Conformance and Compliance Checking -- 2.2 Declarative Languages -- 2.2.1 Constraint-based Languages -- 2.2.2 Artifact-centric Languages -- 2.2.3 Case Management Languages -- 2.2.4 Imperative to Declarative Model Translators -- 2.3 The Internet of Things -- 2.3.1 Enabling technologies of the IoT -- 2.3.2 Ontologies for the IoT -- 2.3.3 Synergies between the IoT and BPM -- 3 Artifact-driven Process Monitoring Overview -- 3.1 Motivating Example -- 3.2 Introducing Artifact-driven Process Monitoring -- 3.3 Reference Architecture -- 3.4 Summary -- 4 E-GSM: an Artifact-centric Language for Process Monitoring -- 4.1 The Guard-Stage-Milestone Artifact-centric Language -- 4.2 Extending GSM -- 4.3 Assessing the severity of Constraints Violations -- 4.4 E-GSM Expressiveness -- 4.4.1 Activity Exclusion -- 4.4.2 Activity Overlap -- 4.4.3 Responded Existence -- 4.4.4 Constrained Iteration -- 4.5 Summary -- 5 A Method to Easily Configure the Monitoring Platform -- 5.1 Steps -- 5.1.1 Enriching the BPMN Process Model With Artifacts -- 5.1.2 Extracting the Artifact-oriented Process View -- 5.1.3 Generating the E-GSM Process Model -- 5.1.4 Generating the E-GSM Artifact Lifecycle Model -- 5.1.5 Generating the Artifact-to-object Mapping Criteria -- 5.2 Proof of Correctness -- 5.2.1 Trace Conformance -- 5.2.2 Execution Flow Alignment -- 5.2.3 Artifact Lifecycle Alignment -- 5.3 Summary -- 6 Assessing and Improving Process Monitorability -- 6.1 Formalizing the Capabilities of the Smart Objects -- 6.1.1 Smart Objects Ontology -- 6.1.2 State Detection Rules Ontology -- 6.2 Problem Setting -- 6.3 Process Monitorability Assessment -- 6.4 Process Monitorability Improvement -- 6.4.1 Process model improvement -- 6.4.2 State detection rules improvement -- 6.4.3 Infrastructure improvement -- 6.5 Summary -- 7 Implementing and Evaluating Artifact-driven Process Monitoring -- 7.1 SMARTifact: an Artifact-driven Monitoring Platform -- 7.2 Simulated Environment -- 7.3 Field Evaluation -- 7.4 Summary -- 8 Conclusions -- 8.1 Answers to the Research Questions -- 8.2 Achievements in Runtime Process Monitoring -- 8.3 Achievements in the Integration Among BPM and IoT -- 8.4 Current Limitations and Future Work -- A Criteria to Evaluate the Integration Among BPM and IoT -- A.1 Placing sensors in a process-oriented way (IC1) -- A.2 Monitoring manual activities (IC2) -- A.3 Connecting analytical processes with the IoT (IC3) -- A.4 Exploiting the IoT to do process correctness check (IC4) -- A.5 Dealing with unstructured environments (IC5) -- A.6 Managing the links between micro processes (IC6) -- A.7 Breaking down end-to-end processes (IC7) -- A.8 Detecting new processes from data (IC8) -- A.9 Specifying the autonomy level of smart objects (IC9) -- A.10 Specifying the socialroles of smart objects (IC10) -- A.11 Concretizing abstract process models (IC11) -- A.12 Dealing with new situations (IC12) -- A.13 Bridging the gap between process-based and event-based systems (IC13) -- A.14 Improving online conformance checking (IC14) -- A.15 Improving resource utilization optimization (IC15) -- A.16 Improving resource monitoring and quality of task execution (IC16) -- B BPMN to E-GSM Translation Proof of Correctness -- B.1 Process Model -- B.1.1 Data Component -- B.1.2 Blocks -- B.1.3 Process Model -- B.2 Trace Conformance -- B.3 Conformance Preservation of the Translation -- References. |
Record Nr. | UNINA-9910349269903321 |
Meroni Giovanni | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Asia Pacific Business Process Management : Third Asia Pacific Conference, AP-BPM 2015, Busan, South Korea, June 24-26, 2015, Proceedings / / edited by Joonsoo Bae, Suriadi Suriadi, Lijie Wen |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XII, 199 p. 84 illus.) |
Disciplina | 658.054 |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Information technology - Management
Application software Data mining Business information services Computer Application in Administrative Data Processing Business Process Management Computer and Information Systems Applications Data Mining and Knowledge Discovery Business Information Systems |
ISBN | 3-319-19509-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Advancement in Workflow Technologies -- Realisation of Cost-Informed Process Support Within the YAWL Workflow Environment -- A Cloud Workflow Modeling Framework Using Extended Proclets -- A Gateway-Centered Workflow Rollback-Points Ancestry Model for Sustainable Workflow Enactments -- jBPM4S: A Multi-tenant Extension of jBPM to Support BPaaS -- Resources Allocation Strategies -- An Efficient Resource Allocation Mechanism Based on Dynamic Pricing Reverse Auction for Cloud Workflow Systems -- On-the-Fly Performance-Aware Human Resource Allocation in the Business Process Management Systems Environment Using Naïve Bayes -- Algorithms for Process Analysis -- Run JTA in JTang: Modeling in Artifact-Centric Model and Running in Activity-Centric Environment -- TAR++: A New Process Model Similarity Algorithm Based on the Importance of TARs -- Process Mining -- Material Movement Analysis for Warehouse Business Process Improvement with Process Mining: A Case Study -- An Analytic Framework of Design for Semiconductor Manufacturing -- Workload and Delay Analysis in Manufacturing Process Using Process Mining -- Emerging Topics in BPM -- Social-Network-Based Personal Processes -- Discovering Information Diffusion Processes Based on Hidden Markov Models for Social Network Services -- Process Visualization Techniques for Multi-perspective Process Comparisons. |
Record Nr. | UNINA-9910299236703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Bedrijfsinformatica / / Claude Doom |
Autore | Doom Claude |
Edizione | [Tweede editie.] |
Pubbl/distr/stampa | Brussel, [Belgium] : , : ASP, , 2013 |
Descrizione fisica | 1 online resource (191 pages) : illustrations |
Disciplina | 658.054 |
Soggetto topico | Business - Data processing |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | dut |
Record Nr. | UNINA-9910792763303321 |
Doom Claude | ||
Brussel, [Belgium] : , : ASP, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Bedrijfsinformatica / / Claude Doom |
Autore | Doom Claude |
Edizione | [Tweede editie.] |
Pubbl/distr/stampa | Brussel, [Belgium] : , : ASP, , 2013 |
Descrizione fisica | 1 online resource (191 pages) : illustrations |
Disciplina | 658.054 |
Soggetto topico | Business - Data processing |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | dut |
Record Nr. | UNINA-9910820508403321 |
Doom Claude | ||
Brussel, [Belgium] : , : ASP, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Beginning DAX with Power BI : The SQL Pro’s Guide to Better Business Intelligence / / by Philip Seamark |
Autore | Seamark Philip |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2018 |
Descrizione fisica | 1 online resource (270 pages) |
Disciplina | 658.054 |
Soggetto topico |
Microsoft software
Microsoft .NET Framework Big data Microsoft and .NET Big Data/Analytics |
ISBN | 1-4842-3477-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Introduction to DAX -- Chapter 2: Variables -- Chapter 3: Context -- Chapter 4: Summarizing and Aggregating -- Chapter 5: Joins -- Chapter 6: Filtering -- Chapter 7: Dates -- Chapter 8: Debugging and Optimizing -- Chapter 9: Practical DAX. |
Record Nr. | UNINA-9910300361103321 |
Seamark Philip | ||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Business Analytics Using R - A Practical Approach [[electronic resource] /] / by Umesh R Hodeghatta, Umesha Nayak |
Autore | Hodeghatta Umesh R |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017 |
Descrizione fisica | 1 online resource (XVII, 280 p. 278 illus.) |
Disciplina | 658.054 |
Soggetto topico |
Big data
Computer programming Programming languages (Electronic computers) Data mining Information storage and retrieval Mathematical statistics R (Computer program language) Big Data Programming Techniques Programming Languages, Compilers, Interpreters Data Mining and Knowledge Discovery Information Storage and Retrieval Probability and Statistics in Computer Science |
ISBN | 1-4842-2514-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Overview of business analytics -- Introduction to R -- R for data analysis -- Introduction to descriptive analytics -- Business analytics process and data exploration -- Supervised machine learning : classification -- Unsupervised machine learning -- Simple linear regression -- Multiple linear regression -- Logistic regression -- Big data analysis : introduction and future trends. |
Record Nr. | UNINA-9910157379203321 |
Hodeghatta Umesh R | ||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Business data communications : infrastructure, networking and security / / William Stallings, Thomas Case |
Autore | Stallings William |
Edizione | [Seventh, international edition.] |
Pubbl/distr/stampa | Boston : , : Pearson, , [2013] |
Descrizione fisica | 1 online resource |
Disciplina | 658.054 |
Collana | Always learning |
Soggetto topico | Business - Data processing |
ISBN | 0-273-77530-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Contents -- Online Resources -- Preface -- About the Authors -- Chapter 0 Reader's and Instructor's Guide -- 0.1 Outline of This Book -- 0.2 Topic Ordering -- 0.3 Internet and Web Resources -- 0.4 Useful Publications -- Chapter 1 Introduction -- 1.1 Information and Communication -- 1.2 Data Communications and Networking for Today's Enterprise -- 1.3 Convergence and Unified Communications -- 1.4 The Nature of Business Information Requirements -- 1.5 The Transmission of Information -- 1.6 Distributed Data Processing -- 1.7 The Internet and Distributed Applications -- 1.8 Networks -- 1.9 Management Issues -- 1.10 Standards -- 1.11 Key Terms, Review Questions, and Problems -- Appendix 1A Prefixes for Numerical Units -- PART ONE: REQUIREMENTS -- Chapter 2 Business Information -- 2.1 Audio -- 2.2 Data -- 2.3 Image -- 2.4 Video -- 2.5 Performance Measures -- Application Note: File Sizes -- 2.6 Summary -- 2.7 Key Terms, Review Questions, and Problems -- Chapter 3 Distributed Data Processing -- 3.1 Centralized Versus Distributed Processing -- 3.2 Forms of Distributed Data Processing -- 3.3 Distributed Data -- 3.4 Networking Implications of DDP -- 3.5 Big Data Infrastructure Considerations -- Application Note: Distributed Computing Support -- 3.6 Summary -- 3.7 Key Terms, Review Questions, and Problems -- PART TWO: DATA COMMUNICATIONS -- Chapter 4 Data Transmission -- 4.1 Signals for Conveying Information -- 4.2 Transmission Impairments and Channel Capacity -- Application Note: Analog Signals -- 4.3 Summary -- 4.4 Key Terms, Review Questions, and Problems -- Chapter 5 Data Communication Fundamentals -- 5.1 Analog and Digital Data Communications -- 5.2 Data Encoding Techniques -- 5.3 Asynchronous and Synchronous Transmission -- 5.4 Error Detection -- Application Note: Devices, Encoding, Communication Parameters, and Protocols -- 5.5 Summary.
5.6 Key Terms, Review Questions, and Problems -- Chapter 6 Data Link Control and Multiplexing -- 6.1 Flow Control and Error Control -- 6.2 Motivation for Multiplexing -- 6.3 Frequency-Division Multiplexing -- 6.4 Synchronous Time-Division Multiplexing -- Application Note: Changing Communications -- 6.5 Summary -- 6.6 Key Terms, Review Questions, and Problems -- Appendix 6A: High Level Data Link Control Protocol -- PART THREE: THE INTERNET AND DISTRIBUTED APPLICATIONS -- Chapter 7 The Internet -- 7.1 The Structure of the Internet -- 7.2 Internet Domains -- 7.3 Dynamic Host Configuration Protocol -- Application Note: Fitting DNS into Your Organizational Structure -- 7.4 Summary -- 7.5 Key Terms, Review Questions, and Problems -- Chapter 8 TCP/IP -- 8.1 A Simple Protocol Architecture -- 8.2 The TCP/IP Architecture -- 8.3 Internetworking -- 8.4 Virtual Private Networks and IP Security -- Application Note: Practical Guide to Networking -- 8.5 Summary -- 8.6 Key Terms, Review Questions, and Problems -- Appendix 8A: TCP, UDP, and IP Details -- Appendix 8B: The Trivial File Transfer Protocol -- Chapter 9 Client/Server, Intranet, and Cloud Computing -- 9.1 The Growth of Client/Server Computing -- 9.2 Client/Server Applications -- 9.3 Middleware -- 9.4 Intranets -- 9.5 Extranets -- 9.6 Service-Oriented Architecture -- 9.7 Cloud Computing -- Application Note: To Be Fat or Thin-That Is the Question -- 9.8 Summary -- 9.9 Key Terms, Review Questions, and Problems -- Chapter 10 Internet-Based Applications -- 10.1 Electronic Mail -- 10.2 Web Access and HTTP -- 10.3 Web Security -- 10.4 Multimedia Applications -- 10.5 Acceptable Use Policies -- Application Note: To Serve or Not to Serve -- 10.6 Summary -- 10.7 Key Terms, Review Questions, and Problems -- Chapter 11 Internet Operation -- 11.1 Internet Addressing -- 11.2 Internet Routing Protocols -- 11.3 Multicasting. 11.4 Quality of Service -- 11.5 Differentiated Services -- 11.6 Service Level Agreements -- 11.7 IP Performance Metrics -- Application Note: Where Does My Network Address Come From? -- 11.8 Summary -- 11.9 Key Terms, Review Questions, and Problems -- PART FOUR: LOCAL AREA NETWORKS -- Chapter 12 LAN Architecture and Infrastructure -- 12.1 Background -- 12.2 LAN Configuration -- 12.3 Guided Transmission Media -- 12.4 LAN Protocol Architecture -- Application Note: Cabling Infrastructure -- 12.5 Summary -- 12.6 Key Terms, Review Questions, and Problems -- Appendix 12A: Decibels and Signal Strength -- Chapter 13 Ethernet, Switches, and Virtual LANs -- 13.1 Traditional Ethernet -- 13.2 Bridges, Hubs, and Switches -- 13.3 High-Speed Ethernet -- 13.4 Virtual LANs -- 13.5 Power over Ethernet -- Application Note: Networking with Ethernet -- 13.6 Summary -- 13.7 Key Terms, Review Questions, and Problems -- Chapter 14 Wireless LANs -- 14.1 Overview -- 14.2 Wi-Fi Architecture and Services -- 14.3 IEEE 802.11 MAC and Physical Layer Standards -- 14.4 Gigabit WLANs -- 14.5 IEEE 802.11 Security Considerations -- Application Note: Deploying WLANs -- 14.6 Summary -- 14.7 Key Terms, Review Questions, and Problems -- PART FIVE: WIDE AREA NETWORKS -- Chapter 15 WAN Technology and Protocols -- 15.1 Switching Techniques -- 15.2 Circuit-Switching Networks -- 15.3 Packet-Switching Networks -- 15.4 Traditional Wide Area Network Alternatives -- 15.5 Voice Over IP -- 15.6 Presence -- 15.7 Summary -- 15.8 Key Terms, Review Questions, and Problems -- Chapter 16 WAN Services -- 16.1 Wide Area Networking Alternatives -- 16.2 Frame Relay -- 16.3 Asynchronous Transfer Mode (ATM) -- 16.4 Multiprotocol Label Switching (MPLS) -- 16.5 Wide Area Ethernet -- Application Note: Off-Site Connectivity Solutions -- 16.6 Summary -- 16.7 Key Terms, Review Questions, and Problems. Chapter 17 Wireless WANs -- 17.1 Cellular Wireless Network -- 17.2 Multiple Access -- 17.3 Third-Generation Wireless Communication -- 17.4 Fourth-Generation Wireless Communication -- 17.5 Satellite Communications -- Application Note: Laptops, Netbooks, PDAs, and Cell Phones -- 17.6 Summary -- 17.7 Key Terms, Review Questions, and Problems -- PART SIX: MANAGEMENT ISSUES -- Chapter 18 Computer and Network Security Threats -- 18.1 Computer Security Concepts -- 18.2 Threats, Attacks, and Assets -- 18.3 Intruders -- 18.4 Malicious Software Overview -- 18.5 Viruses, Worms, Bots, and Spam -- 18.6 Keyloggers, Phishing, Spyware -- 18.7 Computer Security Trends -- 18.8 Summary -- 18.9 Key Terms, Review Questions, and Problems -- Chapter 19 Computer and Network Security Techniques -- 19.1 Virtual Private Networks and IPsec -- 19.2 SSL and TLS -- 19.3 Wi-Fi Protected Access -- 19.4 Intrusion Detection -- 19.5 Firewalls -- 19.6 Malware Defense -- Application Note: Security Layers -- 19.7 Summary -- 19.8 Key Terms, Review Questions, and Problems -- Appendix A: Projects for Teaching Business Data Communications -- A.1 Animations and Animation Projects -- A.2 Practical Exercises -- A.3 Wireshark Projects -- A.4 Research Projects -- A.5 Security Case Studies -- A.6 Reading/Report Assignments -- A.7 Writing Assignments -- Glossary. |
Record Nr. | UNINA-9910150214403321 |
Stallings William | ||
Boston : , : Pearson, , [2013] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Business database systems / / Thomas Connolly, Carolyn Begg, Richard Holowczak |
Autore | Connolly Thomas M. |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Harlow, England : , : Pearson, , [2008] |
Descrizione fisica | 1 online resource (593 pages) : illustrations (some color), tables, graphs |
Disciplina | 658.054 |
Soggetto topico | Business |
ISBN |
1-282-07101-7
9786612071010 1-4058-7450-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910154814103321 |
Connolly Thomas M. | ||
Harlow, England : , : Pearson, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|