Blockchain Scalability [[electronic resource] /] / edited by Wuhui Chen, Zibin Zheng, Huawei Huang |
Autore | Zheng Zibin |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (243 pages) |
Disciplina | 005.74 |
Altri autori (Persone) |
ChenWuhui
HuangHuawei |
Soggetto topico |
Blockchains (Databases)
Electronic digital computers - Evaluation Computer security Computer networks Blockchain System Performance and Evaluation Principles and Models of Security Computer Communication Networks |
ISBN | 981-9910-59-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Blockchain Scalability Fundamentals -- Chapter 2. Overview to Blockchain Scalability Challenges and Solutions -- Chapter 3. On-Chain and Off-Chain Scalability Techniques -- Chapter 4. Layered Sharding on Open Blockchain -- Chapter 5. Sharding-Based Scalable Consortium Blockchain -- Chapter 6. State Sharding for Permissioned Blockchain -- Chapter 7. Elastic Resource Allocation in Sharding-Based Blockchains -- Chapter 8. Dynamic Sharding: A Trade-OFF Between Security and Scalability -- Chapter 9. A Scalable and Secure Framework for 5G Networks Applications. |
Record Nr. | UNINA-9910734875903321 |
Zheng Zibin
![]() |
||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Blockchain Scalability [[electronic resource] /] / edited by Wuhui Chen, Zibin Zheng, Huawei Huang |
Autore | Zheng Zibin |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (243 pages) |
Disciplina | 005.74 |
Altri autori (Persone) |
ChenWuhui
HuangHuawei |
Soggetto topico |
Blockchains (Databases)
Electronic digital computers - Evaluation Computer security Computer networks Blockchain System Performance and Evaluation Principles and Models of Security Computer Communication Networks |
ISBN | 981-9910-59-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Blockchain Scalability Fundamentals -- Chapter 2. Overview to Blockchain Scalability Challenges and Solutions -- Chapter 3. On-Chain and Off-Chain Scalability Techniques -- Chapter 4. Layered Sharding on Open Blockchain -- Chapter 5. Sharding-Based Scalable Consortium Blockchain -- Chapter 6. State Sharding for Permissioned Blockchain -- Chapter 7. Elastic Resource Allocation in Sharding-Based Blockchains -- Chapter 8. Dynamic Sharding: A Trade-OFF Between Security and Scalability -- Chapter 9. A Scalable and Secure Framework for 5G Networks Applications. |
Record Nr. | UNISA-996546845103316 |
Zheng Zibin
![]() |
||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
The coupling of safety and security : exploring interrelations in theory and practice / / edited by Corinne Bieder, Kenneth Pettersen Gould |
Autore | Bieder Corinne |
Pubbl/distr/stampa | Springer Nature, 2020 |
Descrizione fisica | 1 online resource (viii, 113 pages) : illustrations; digital, PDF file(s) |
Disciplina | 658.56 |
Collana |
SpringerBriefs in Applied Sciences and Technology
SpringerBriefs in Safety Management |
Soggetto topico |
Quality control
Reliability Industrial safety Computer security Public safety System safety Industrial organization Quality Control, Reliability, Safety and Risk Principles and Models of Security Crime Control and Security Security Science and Technology Industrial Organization |
Soggetto non controllato |
Quality Control, Reliability, Safety and Risk
Principles and Models of Security Crime Control and Security Security Science and Technology Industrial Organization Industrial and Production Engineering Safety Management Security Management Safety and Security High Risk Organizations Risk Management Safety Security Efficiency Security Interfaces Open Access Reliability engineering Computer security Crime & criminology Security & fire alarm systems Economics of industrial organisation |
ISBN | 3-030-47229-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Safety and Security: The Challenges of Bringing them Together -- 2. The Concepts of Risk, Safety and Security: A Fundamental Exploration and Understanding of Similarities and Differences -- 3. Safety and Security are Two Sides of the Same Coin -- 4. Safety vs Security in Aviation -- 6. Security and Safety Culture - Dual or Distinct Phenomena? |
Record Nr. | UNINA-9910416527703321 |
Bieder Corinne
![]() |
||
Springer Nature, 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity Teaching in Higher Education [[electronic resource] /] / edited by Leslie F. Sikos, Paul Haskell-Dowland |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (144 pages) |
Disciplina | 005.8071 |
Soggetto topico |
Education—Data processing
Computer security Computer networks—Security measures Data protection Computers and Education Principles and Models of Security Mobile and Network Security Data and Information Security |
Soggetto non controllato | Mathematics |
ISBN |
9783031242168
9783031242151 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter. 1. Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes -- Chapter. 2. Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management -- Chapter. 3. Designing and Developing a Scenario-Based Curriculum for Cyber Education in HE -- Chapter. 4. Enabling teamwork in Cybersecurity courses -- Chapter. 5. Towards a Light-Weight Certification Scheme for Cybersecurity MOOCs -- Chapter. 6. Learning Environments for Digital Forensics Teaching in Higher Education. |
Record Nr. | UNISA-996547960803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cybersecurity Teaching in Higher Education / / edited by Leslie F. Sikos, Paul Haskell-Dowland |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (144 pages) |
Disciplina |
005.8071
005.80711 |
Soggetto topico |
Education—Data processing
Computer security Computer networks—Security measures Data protection Computers and Education Principles and Models of Security Mobile and Network Security Data and Information Security |
Soggetto non controllato | Mathematics |
ISBN |
9783031242168
9783031242151 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter. 1. Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes -- Chapter. 2. Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management -- Chapter. 3. Designing and Developing a Scenario-Based Curriculum for Cyber Education in HE -- Chapter. 4. Enabling teamwork in Cybersecurity courses -- Chapter. 5. Towards a Light-Weight Certification Scheme for Cybersecurity MOOCs -- Chapter. 6. Learning Environments for Digital Forensics Teaching in Higher Education. |
Record Nr. | UNINA-9910725095103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The Design of Rijndael [[electronic resource] ] : The Advanced Encryption Standard (AES) / / by Joan Daemen, Vincent Rijmen |
Autore | Daemen Joan |
Edizione | [2nd ed. 2020.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (xviii, 282 pages) : illustrations |
Disciplina | 005.82 |
Collana | Information Security and Cryptography |
Soggetto topico |
Data encryption (Computer science)
Computer security System safety Cryptology Principles and Models of Security Systems and Data Security Security Science and Technology |
ISBN | 3-662-60769-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The Advanced Encryption Standard Process -- Preliminaries -- Specification of Rijndael -- Implementation Aspects -- Design Philosophy -- The Data Encryption Standard -- Correlation Matrices -- Difference Propagation -- The Wide Trail Strategy -- Cryptanalysis -- The Road to Rijndael -- Correlation Analysis in GF(2n) -- On the EDP of Two- and Four-Round Differentials and the ELP of Two- and Four-Round Hulls -- Two-Round Differential Trail Clustering -- Plateau Trails -- App. A, Substitution Tables -- App. B, Test Vectors -- App. C, Reference Code -- Bibliography -- Index. |
Record Nr. | UNINA-9910409667503321 |
Daemen Joan
![]() |
||
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The Design of Rijndael [[electronic resource] ] : The Advanced Encryption Standard (AES) / / by Joan Daemen, Vincent Rijmen |
Autore | Daemen Joan |
Edizione | [2nd ed. 2020.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (xviii, 282 pages) : illustrations |
Disciplina | 005.82 |
Collana | Information Security and Cryptography |
Soggetto topico |
Data encryption (Computer science)
Computer security System safety Cryptology Principles and Models of Security Systems and Data Security Security Science and Technology |
ISBN | 3-662-60769-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The Advanced Encryption Standard Process -- Preliminaries -- Specification of Rijndael -- Implementation Aspects -- Design Philosophy -- The Data Encryption Standard -- Correlation Matrices -- Difference Propagation -- The Wide Trail Strategy -- Cryptanalysis -- The Road to Rijndael -- Correlation Analysis in GF(2n) -- On the EDP of Two- and Four-Round Differentials and the ELP of Two- and Four-Round Hulls -- Two-Round Differential Trail Clustering -- Plateau Trails -- App. A, Substitution Tables -- App. B, Test Vectors -- App. C, Reference Code -- Bibliography -- Index. |
Record Nr. | UNISA-996465342203316 |
Daemen Joan
![]() |
||
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security Planning [[electronic resource] ] : A Practical Approach / / by Susan Lincke |
Autore | Lincke Susan |
Edizione | [2nd ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (446 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Data protection Data protection - Law and legislation Business information services Computers - Law and legislation Information technology - Law and legislation Principles and Models of Security Data and Information Security Privacy Business Information Systems Legal Aspects of Computing |
ISBN | 3-031-43118-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part. I. The Problem of Security -- Chapter. 1. Security Awareness: Brave New World -- Chapter. 2. Combatting Fraud -- Chapter. 3. Complying with the PCI DSS Standard -- Part. II. Strategic Security Planning -- Chapter. 4. Managing Risk -- Chapter. 5. Addressing Business Impact Analysis and Business Continuity -- Chapter. 6. Governing: Policy, Maturity Models and Planning -- Part. III. Tactical Security Planning -- Chapter. 7. Designing Information Security -- Chapter. 8. Planning for Network Security -- Chapter. 9. Designing Physical Security -- Chapter. 10. Attending to Information Privacy -- Chapter. 11. Planning for Alternative Networks: Cloud Security and Zero Trust -- Chapter. 12. Organizing Personnel Security -- Part. IV. Planning for Detect, Respond, Recover -- Chapter. 13. Planning for Incident Response -- Chapter. 14. Defining Security Metrics -- Chapter. 15. Performing an Audit or Security Test -- Chapter. 16. Preparing for Forensic Analysis -- Part. V. Complying with National Regulations and Ethics -- Chapter. 17. Complying with the European Union General Data Protection Regulation (GDPR) -- Chapter. 18. Complying with U.S. Security Regulations -- Chapter. 19. Complying with HIPAA and HITECH -- Chapter. 20. Maturing Ethical Risk -- Part. VI. Developing Secure Software -- Chapter. 21. Understanding Software Threats and Vulnerabilities -- Chapter. 22. Defining a Secure Software Process -- Chapter. 23. Planning for Secure Software Requirements and Design with UML. |
Record Nr. | UNINA-9910800115103321 |
Lincke Susan
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Systems : 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, Dubai, United Arab Emirates, December 11-12, 2023, Proceedings, Part II / / edited by Maria Papadaki, Marinos Themistocleous, Khalid Al Marri, Marwan Al Zarouni |
Autore | Papadaki Maria |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (347 pages) |
Disciplina | 005.3 |
Altri autori (Persone) |
ThemistocleousMarinos
Al MarriKhalid Al ZarouniMarwan |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Application software
Business information services Computer security Electronic data processing - Management Big data Social media Computer and Information Systems Applications IT in Business Principles and Models of Security IT Operations Big Data Social Media |
ISBN | 3-031-56481-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Big Data and Analytics -- Data Analytics and Data Science: Unlocking the Open Data Potential of Smart Cities -- 1 Introduction -- 2 Theoretical Assumptions -- 2.1 Open Data Background -- 2.2 Smart Cities Background -- 3 Methodology -- 4 Results -- 4.1 Related and Rising Concepts -- 4.2 Gaps and Challenges of Smart Cities Open Data Approach to Data Analytics -- 5 Conclusion, Limitations, and Future Research -- References -- Data Mesh Adoption: A Multi-case and Multi-method Readiness Approach -- 1 Introduction -- 2 Related Work -- 3 Methodological Approach -- 3.1 The TOE Framework -- 3.2 The Research Design: A Multi-case Study -- 4 Step 1: Data Mesh Survey -- 5 Step 2: Deep Dive Interviews for Data Mesh Adoption -- 6 Conclusions -- References -- Distributed Representational Analysis in Support of Multi-perspective Decision-Making -- 1 Introduction -- 2 Related Work -- 3 Theoretical Perspective -- 4 Method -- 4.1 Single Case Study -- 4.2 Data Collection -- 4.3 Data Analysis -- 5 Findings -- 5.1 User -- 5.2 Distributed Functional Analysis -- 5.3 Distributed Decision Task -- 5.4 Distributed Representational Analysis -- 6 Conclusion -- References -- Digital Services and Social Media -- Mobile Application Diffusion: An Exploration of Trust and Privacy Amongst Rural Enterprises in South Africa -- 1 Introduction -- 2 Literature Review -- 2.1 Trust Concerns Among Rural Enterprises -- 2.2 Privacy Concerns Among Rural Enterprises -- 3 Methodology -- 3.1 Selection -- 3.2 Specification -- 3.3 Summarizing -- 4 Findings -- 4.1 Implications for Rural Entrepreneurs -- 4.2 Implications for Theory -- 5 Conclusion -- References -- How Can Favorite Digital Services Enhance Users' Digital Well-Being? A Qualitative Study -- 1 Introduction -- 2 Digital Services and Digital Well-Being.
3 Methodology -- 4 Findings -- 4.1 Psychological Level -- 4.2 Social Level -- 4.3 Cognitive Level -- 5 Discussion and Conclusions -- Appendix. Participants' Background Information -- References -- Utilizing Degree Centrality Measures for Product Advertisement in Social Networks -- 1 Introduction -- 2 Related Work -- 3 Centrality Measures in Social Networks -- 3.1 Graph Representation -- 3.2 Degree -- 3.3 Centrality -- 3.4 Degree Centrality -- 3.5 Closeness Centrality -- 3.6 Betweenness Centrality -- 4 Proposed Method -- 4.1 Utilizing Degree Centrality in Social Networks for Product Advertisement: A Practical Approach -- 4.2 Assumption -- 4.3 Logistic Regression -- 5 Results -- 6 Conclusions and Future Work -- References -- Innovative Research Projects -- Business Models for Mobility Data Sharing Platforms: Stakeholders' Perceptions -- 1 Introduction -- 2 Theoretical Background -- 2.1 Mobility Data Sharing -- 2.2 Business Models -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Analysis -- 4 Findings and Discussion -- 4.1 Evaluation Criteria -- 4.2 Ranking of Business Models -- 5 Conclusion -- References -- Innovation Process Integration Challenges and Their Influence on Project Management Performance in Oil and Gas Field- A Conceptual Framework Development -- 1 Introduction -- 2 Theoretical Background -- 2.1 Literature Review Background -- 2.2 Innovation Concept and Process -- 2.3 Innovation Theories and Models -- 2.4 Individual Behavior Acceptance -- 3 Research Framing -- 3.1 Theoretical Framework -- 3.2 Conceptual Framework -- 4 Discussion -- 5 Conclusion -- References -- The Role of Adaptive and Transformational Leadership in the Successful Adoption and Implementation of New Technologies and Innovations in Organizations -- 1 Introduction -- 1.1 Aim of the Research -- 1.2 Research Questions -- 2 Literature Review and Related Theories. 2.1 Transformational Leadership -- 2.2 Adaptive Leadership -- 2.3 The Unified Theory of Acceptance and Use of Technology (UTAUT) -- 3 Conceptual Model -- 4 Methodology -- 4.1 Limitations and Recommendation for Further Research -- 5 Discussion -- 6 Conclusion -- References -- Managing Information Systems -- Information and Communication Technology Enabled Collaboration: Understanding the Critical Role of Computer Collective-Efficacy -- 1 Introduction -- 2 Theory -- 2.1 Social Cognitive Theory -- 2.2 Self-efficacy -- 3 Collective Efficacy -- 3.1 Collective Efficacy Assessment -- 4 Computer Collective-Efficacy -- 4.1 Computer Collective-Efficacy - Nomological Network -- 4.2 Measuring Computer Collective-Efficacy -- 5 General Discussion -- 6 Theoretical and Practical Implications -- 6.1 Theoretical Implications -- 6.2 Practical Implications -- 7 Conclusion -- Appendix -- References -- Communication is Key: A Systematic Literature Review of Transformation Competencies -- 1 Introduction -- 2 Theoretical Background -- 2.1 Organizational Transformation -- 2.2 The Concept of Competency -- 3 Research Design -- 3.1 Systematic Literature Review -- 3.2 Identification of Transformation Competencies -- 4 Findings -- 4.1 Sample Characteristics -- 4.2 Transformation Competencies -- 5 Discussion -- 5.1 Relevance of the Topic -- 5.2 Research Focus of the Studies -- 5.3 Competency Data Sources -- 5.4 Understanding of Competencies -- 5.5 Understanding of Transformation -- 5.6 Identified Transformation Competencies -- 6 Conclusion, Limitations, and Research Agenda -- References -- Evaluating the Success of Digital Transformation Strategy in Greek SMEs -- 1 Introduction -- 2 Theoretical Background -- 2.1 IS Strategizing and Organizational Issues -- 2.2 The Role of Practice in IS Strategizing -- 2.3 IS Strategizing and Success -- 3 Methodology -- 4 Results -- 5 Discussion. 6 Conclusions -- References -- Managing IS Adoption Challenges in Emerging Technologies: A Longitudinal Case Study of Financial Management Services Automation in a Medium-Sized Enterprise -- 1 Introduction -- 2 Adopting Robotic Process Automation in Organizations -- 3 Technology Adoption and Resistance to Change -- 4 Data Gathering and Analysis -- 5 Findings -- 5.1 Fear Fades Over Time, and Resistance Becomes More of a Principle -- 5.2 Success Stories Support Positive Attitude Towards Automation -- 5.3 Adopting Several Automation Technologies Supports Overall Rate of Automation but Lowers Adoption Rate of RPA -- 5.4 Dithering with Implementations Caused by Lack of Feasible Business Cases -- 5.5 Main Challenges Culminate in a Lack of Resources -- 6 Conclusion, Recommendations, and Limitations -- Appendix A DCP2 Interviews -- Appendix B Restraints, Challenges and Accelerators of Adoption: Summary of Harmonized Open Coding Within Key-Themes in DCP2 -- References -- Factors Amplifying or Inhibiting Cyber Threat Intelligence Sharing -- 1 Introduction -- 2 Related Work -- 2.1 Overview of Cyber Threat Intelligence Sharing -- 2.2 Cyber Security Frameworks -- 2.3 Cyber Threat Intelligence Sharing Platforms -- 3 Methodology -- 3.1 Research Site -- 3.2 Data Collection -- 3.3 Data Analysis -- 4 Findings -- 4.1 Factors for Enthusiastic Cyber Threat Intelligence Sharing -- 4.2 Factors for Circumstantial Cyber Threat Intelligence Sharing -- 4.3 Factors Preventing Cyber Threat Intelligence Sharing -- 5 Discussion -- 6 Conclusion -- References -- Empirical Investigation of Practitioners' Perceptions of Agile Testing Coordination in Medical Information Systems Development -- 1 Introduction -- 2 Related Work -- 2.1 Overview of Agile Practice -- 2.2 Software Testing in Medical Information Systems Development -- 3 Method -- 3.1 Research Sites -- 3.2 Data Collection. 3.3 Data Analysis -- 4 Findings -- 4.1 Tailoring Agile Testing in Medical Information Systems Development -- 4.2 Unit Testing in Medical Information Systems Development -- 4.3 Integration Testing in Medical Information Systems Development -- 4.4 Coordination Among Testing Practitioners -- 5 Discussion -- 5.1 Practitioners' Perceptions of Agile Testing Practice in Medical Software Development (RQ1) -- 5.2 Coordination Among Practitioners to Enhance Quality Testing in Agile Software Processes (RQ2) -- 6 Conclusion -- References -- Assessing Main Factors Adopted within the EU Harmonised Online Public Engagement (EU HOPE) -- 1 Introduction -- 2 Methodology -- 3 Europe Closer to Citizens -- 3.1 Bottom-Up Approach (Intersubjective Management) -- 4 The Necessity of Harmonised Online Public Engagement (EU HOPE) -- 4.1 Digital Innovation Factors Within the EU HOPE -- 4.2 Digital Participatory Platforms (DPP) -- 4.3 Intersubjective Agreements of Actors -- 5 Single Digital Gateway, A Harmonised Cross-Border Solution -- 6 Cross-Borders Pilot Studies -- 6.1 Cross-Border Data Flow in The Digital Single Market: Study on Data Location Restrictions -- 6.2 European Experience of Citizens' Participation in Cross-Border Governance -- 6.3 Cross-Border Cooperation (CBC) in Southern Europe-A Case Study. The Eurocity Elvas-Badajoz -- 6.4 Engaging Citizens in Cohesion Policy, DG REGIO and OECD Pilot Project Final Report -- 6.5 Flanders - The Netherlands Citizens' Panel on Addressing Cross-Border Issues and Stimulating Cross- Border Contacts -- 6.6 The 23 Citizen-Based Topics for Future EU Research - Project Names: Fostering Equal Opportunities in the Digital Era -- 7 Discussion -- 8 Conclusion -- References -- How Can Innovation Systems be Sustainable? An Approach for Organizations in Times of Crises, Alongside Economic and Information Technology Issues -- 1 Introduction. 2 Research Method. |
Record Nr. | UNINA-9910847079303321 |
Papadaki Maria
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Systems : 18th European, Mediterranean, and Middle Eastern Conference, EMCIS 2021, Virtual Event, December 8–9, 2021, Proceedings / / edited by Marinos Themistocleous, Maria Papadaki |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (764 pages) |
Disciplina | 005.7 |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Application software
Business information services Computer security Medical informatics Electronic data processing - Management Computer and Information Systems Applications IT in Business Principles and Models of Security Health Informatics IT Operations |
ISBN | 3-030-95947-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Big Data and Analytics -- Phi: A Generic Microservices-based Big Data Architecture -- Designing Monitoring Systems for Complex Event Processing in Big Data Contexts -- Evaluation of Machine Learning Methods for the Experimental Classification and Clustering of Higher Education Institutions -- Multi-Language Sentiment Analysis – Lesson Learnt from NLP Case Study -- Modeling User Engagement Profiles for Detection of Digital Subscription Propensity -- Using result profiles to drive meta-learning -- Blockchain Technology and Applications -- Computation of Blockchain Readiness Under Partial Information -- Blockchain Application in Luxury Brand Strategy: What Does Blockchain Technology Mean to Luxury Brands? -- Exploring the Need for Blockchain-based National Population Census -- Blockchain Applications in Smart Grid - a Review and a Case Study -- EXPLORING ICOs PHENOMENON: Developing a Taxonomy of academic and not academic discourse -- How decentralized is decentralized governance really? - A Network Analysis of ERC20 Platforms -- Using a Hybrid Approach of Game Design, Blockchain Technology and Learning Analytics in Higher Education Institutions: A Case Study of the British University in Dubai -- Blockchain Technology and Waste Management: A Systematic Literature Review -- Cloud Computing -- The Adoption of Cloud Computing in South Africa’s Oil and Gas Industry -- A Semantic driven Approach for Efficient Cloud Service Composition -- Digital Governance -- Digital transformation strategy in the public sector: Evaluating e-government IS and user satisfaction -- Towards Smart Cities 4.0: Digital Participation in Smart Cities Solutions and the use of Disruptive Technologies -- E-GovSTP: An E-Government model for a small island state, the case of Sao Tome and Principe -- Mobile Government Service Delivery Challenges in Municipalities -- Digital Services and Social Media -- Why do people not install Corona-Warn-App? Evidence from social media -- "User Perception of Algorithmic DigitalMarketing in Conditions of Scarcity" -- The Influence of Locus of Control in the Actualisation of Mobile Dating Applications Affordances to Mitigate Privacy and Security Concerns -- Technology acceptance of MS Teams among university teachers during COVID-19 -- Sense of presence in VR mobile application -- Positive Online Customer Experience as an Antecedent of the Willingness to Share Information with an E-Commerce Retailer -- Introducing Sentient Requirements for Information Systems and Digital Technologies -- Emerging Computing Technologies and Trends for Business Process Management -- Counterfactual Explanations for Predictive Business Process Monitoring -- Factors that Affects the Use of AI Agents for Adaptive Learning: A Sociomaterial and Mcdonaldization Approach to the Higher Education Sector -- Artificial intelligence in the innovation process - do we pay attention to this participant in innovative projects? -- Healthcare Information Systems -- Assessment of Machine Learning Classifiers for Heart Diseases Discovery -- Technology Acceptance Model for Business Intelligence applications: Digital Transformation Approach to Public Hospitals Environment -- Health is Wealth: A Conceptual Overview of Virtual Healthcare & Future Research Directions [1995 – 2021] -- Using 3D-technology to support facial treatment -- Online Health Communities: The Impact of AI Conversational Agents on Users -- Information Systems Security and Information Privacy Protection -- GDPR-compliant Data Processing: Practical Considerations -- Naïve Bayes Based Classifier for Credit Card Fraud Discovery -- Investigating cyber security awareness among preservice teachers during COVID-19 pandemic -- Diversity of Students' Unethical Behaviors in Online Learning Amid COVID-19 Pandemic: An Exploratory Analysis -- An Empirical Investigation of Agile Information Systems Development for Cybersecurity -- Innovative Research Projects -- Increasing the security of smart cities of the future thanks to UWB technology -- Exploring the impacts of Artificial Intelligence (AI) implementation at individual and team levels: A case study in the UAE government sector -- IT Governance and Alignment -- Smart Government and Smart Citizens as a Smart Cities Building Blocks. A Survey -- Management and Organisational Issues in Information Systems -- ICT and Creativity: How ICT Impacts Creativity in a Saudi University -- Democratizing Enterprise AI Success Factors and Challenges: A Systematic Literature Review & a Proposed Framework -- Organizational Aspects in Achieving a Successful Digital Transformation: Case of an ERP System Change -- Understanding Well-being in Virtual Teams: A Comparative Case Study -- Technology as driver, enabler and barrier of digital transformation: A review -- Towards a New Value Chain for the Audio Industry -- Knowledge management significance in agile organization in lights of COVID-19 pandemic changes -- An Agile Approach for Managing Microservices-based Software Development: Case Study in FinTech -- The Continued Innovation-Decision Process – A Case Study Research of Continued Robotic Process Automation Adoption -- The Role of Agile Pockets in Agile Transformation. |
Record Nr. | UNINA-9910544860403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|