top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Blockchain Scalability [[electronic resource] /] / edited by Wuhui Chen, Zibin Zheng, Huawei Huang
Blockchain Scalability [[electronic resource] /] / edited by Wuhui Chen, Zibin Zheng, Huawei Huang
Autore Zheng Zibin
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (243 pages)
Disciplina 005.74
Altri autori (Persone) ChenWuhui
HuangHuawei
Soggetto topico Blockchains (Databases)
Electronic digital computers - Evaluation
Computer security
Computer networks
Blockchain
System Performance and Evaluation
Principles and Models of Security
Computer Communication Networks
ISBN 981-9910-59-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Blockchain Scalability Fundamentals -- Chapter 2. Overview to Blockchain Scalability Challenges and Solutions -- Chapter 3. On-Chain and Off-Chain Scalability Techniques -- Chapter 4. Layered Sharding on Open Blockchain -- Chapter 5. Sharding-Based Scalable Consortium Blockchain -- Chapter 6. State Sharding for Permissioned Blockchain -- Chapter 7. Elastic Resource Allocation in Sharding-Based Blockchains -- Chapter 8. Dynamic Sharding: A Trade-OFF Between Security and Scalability -- Chapter 9. A Scalable and Secure Framework for 5G Networks Applications.
Record Nr. UNINA-9910734875903321
Zheng Zibin  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Blockchain Scalability [[electronic resource] /] / edited by Wuhui Chen, Zibin Zheng, Huawei Huang
Blockchain Scalability [[electronic resource] /] / edited by Wuhui Chen, Zibin Zheng, Huawei Huang
Autore Zheng Zibin
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (243 pages)
Disciplina 005.74
Altri autori (Persone) ChenWuhui
HuangHuawei
Soggetto topico Blockchains (Databases)
Electronic digital computers - Evaluation
Computer security
Computer networks
Blockchain
System Performance and Evaluation
Principles and Models of Security
Computer Communication Networks
ISBN 981-9910-59-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Blockchain Scalability Fundamentals -- Chapter 2. Overview to Blockchain Scalability Challenges and Solutions -- Chapter 3. On-Chain and Off-Chain Scalability Techniques -- Chapter 4. Layered Sharding on Open Blockchain -- Chapter 5. Sharding-Based Scalable Consortium Blockchain -- Chapter 6. State Sharding for Permissioned Blockchain -- Chapter 7. Elastic Resource Allocation in Sharding-Based Blockchains -- Chapter 8. Dynamic Sharding: A Trade-OFF Between Security and Scalability -- Chapter 9. A Scalable and Secure Framework for 5G Networks Applications.
Record Nr. UNISA-996546845103316
Zheng Zibin  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
The coupling of safety and security : exploring interrelations in theory and practice / / edited by Corinne Bieder, Kenneth Pettersen Gould
The coupling of safety and security : exploring interrelations in theory and practice / / edited by Corinne Bieder, Kenneth Pettersen Gould
Autore Bieder Corinne
Pubbl/distr/stampa Springer Nature, 2020
Descrizione fisica 1 online resource (viii, 113 pages) : illustrations; digital, PDF file(s)
Disciplina 658.56
Collana SpringerBriefs in Applied Sciences and Technology
SpringerBriefs in Safety Management
Soggetto topico Quality control
Reliability
Industrial safety
Computer security
Public safety
System safety
Industrial organization
Quality Control, Reliability, Safety and Risk
Principles and Models of Security
Crime Control and Security
Security Science and Technology
Industrial Organization
Soggetto non controllato Quality Control, Reliability, Safety and Risk
Principles and Models of Security
Crime Control and Security
Security Science and Technology
Industrial Organization
Industrial and Production Engineering
Safety Management
Security Management
Safety and Security
High Risk Organizations
Risk Management
Safety Security Efficiency
Security Interfaces
Open Access
Reliability engineering
Computer security
Crime & criminology
Security & fire alarm systems
Economics of industrial organisation
ISBN 3-030-47229-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Safety and Security: The Challenges of Bringing them Together -- 2. The Concepts of Risk, Safety and Security: A Fundamental Exploration and Understanding of Similarities and Differences -- 3. Safety and Security are Two Sides of the Same Coin -- 4. Safety vs Security in Aviation -- 6. Security and Safety Culture - Dual or Distinct Phenomena?
Record Nr. UNINA-9910416527703321
Bieder Corinne  
Springer Nature, 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity Teaching in Higher Education [[electronic resource] /] / edited by Leslie F. Sikos, Paul Haskell-Dowland
Cybersecurity Teaching in Higher Education [[electronic resource] /] / edited by Leslie F. Sikos, Paul Haskell-Dowland
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (144 pages)
Disciplina 005.8071
Soggetto topico Education—Data processing
Computer security
Computer networks—Security measures
Data protection
Computers and Education
Principles and Models of Security
Mobile and Network Security
Data and Information Security
Soggetto non controllato Mathematics
ISBN 9783031242168
9783031242151
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter. 1. Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes -- Chapter. 2. Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management -- Chapter. 3. Designing and Developing a Scenario-Based Curriculum for Cyber Education in HE -- Chapter. 4. Enabling teamwork in Cybersecurity courses -- Chapter. 5. Towards a Light-Weight Certification Scheme for Cybersecurity MOOCs -- Chapter. 6. Learning Environments for Digital Forensics Teaching in Higher Education.
Record Nr. UNINA-9910725095103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity Teaching in Higher Education [[electronic resource] /] / edited by Leslie F. Sikos, Paul Haskell-Dowland
Cybersecurity Teaching in Higher Education [[electronic resource] /] / edited by Leslie F. Sikos, Paul Haskell-Dowland
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (144 pages)
Disciplina 005.8071
Soggetto topico Education—Data processing
Computer security
Computer networks—Security measures
Data protection
Computers and Education
Principles and Models of Security
Mobile and Network Security
Data and Information Security
Soggetto non controllato Mathematics
ISBN 9783031242168
9783031242151
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter. 1. Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes -- Chapter. 2. Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management -- Chapter. 3. Designing and Developing a Scenario-Based Curriculum for Cyber Education in HE -- Chapter. 4. Enabling teamwork in Cybersecurity courses -- Chapter. 5. Towards a Light-Weight Certification Scheme for Cybersecurity MOOCs -- Chapter. 6. Learning Environments for Digital Forensics Teaching in Higher Education.
Record Nr. UNISA-996547960803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
The Design of Rijndael [[electronic resource] ] : The Advanced Encryption Standard (AES) / / by Joan Daemen, Vincent Rijmen
The Design of Rijndael [[electronic resource] ] : The Advanced Encryption Standard (AES) / / by Joan Daemen, Vincent Rijmen
Autore Daemen Joan
Edizione [2nd ed. 2020.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xviii, 282 pages) : illustrations
Disciplina 005.82
Collana Information Security and Cryptography
Soggetto topico Data encryption (Computer science)
Computer security
System safety
Cryptology
Principles and Models of Security
Systems and Data Security
Security Science and Technology
ISBN 3-662-60769-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Advanced Encryption Standard Process -- Preliminaries -- Specification of Rijndael -- Implementation Aspects -- Design Philosophy -- The Data Encryption Standard -- Correlation Matrices -- Difference Propagation -- The Wide Trail Strategy -- Cryptanalysis -- The Road to Rijndael -- Correlation Analysis in GF(2n) -- On the EDP of Two- and Four-Round Differentials and the ELP of Two- and Four-Round Hulls -- Two-Round Differential Trail Clustering -- Plateau Trails -- App. A, Substitution Tables -- App. B, Test Vectors -- App. C, Reference Code -- Bibliography -- Index.
Record Nr. UNINA-9910409667503321
Daemen Joan  
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Design of Rijndael [[electronic resource] ] : The Advanced Encryption Standard (AES) / / by Joan Daemen, Vincent Rijmen
The Design of Rijndael [[electronic resource] ] : The Advanced Encryption Standard (AES) / / by Joan Daemen, Vincent Rijmen
Autore Daemen Joan
Edizione [2nd ed. 2020.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xviii, 282 pages) : illustrations
Disciplina 005.82
Collana Information Security and Cryptography
Soggetto topico Data encryption (Computer science)
Computer security
System safety
Cryptology
Principles and Models of Security
Systems and Data Security
Security Science and Technology
ISBN 3-662-60769-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Advanced Encryption Standard Process -- Preliminaries -- Specification of Rijndael -- Implementation Aspects -- Design Philosophy -- The Data Encryption Standard -- Correlation Matrices -- Difference Propagation -- The Wide Trail Strategy -- Cryptanalysis -- The Road to Rijndael -- Correlation Analysis in GF(2n) -- On the EDP of Two- and Four-Round Differentials and the ELP of Two- and Four-Round Hulls -- Two-Round Differential Trail Clustering -- Plateau Trails -- App. A, Substitution Tables -- App. B, Test Vectors -- App. C, Reference Code -- Bibliography -- Index.
Record Nr. UNISA-996465342203316
Daemen Joan  
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Planning [[electronic resource] ] : A Practical Approach / / by Susan Lincke
Information Security Planning [[electronic resource] ] : A Practical Approach / / by Susan Lincke
Autore Lincke Susan
Edizione [2nd ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (446 pages)
Disciplina 005.8
Soggetto topico Computer security
Data protection
Data protection - Law and legislation
Business information services
Computers - Law and legislation
Information technology - Law and legislation
Principles and Models of Security
Data and Information Security
Privacy
Business Information Systems
Legal Aspects of Computing
ISBN 3-031-43118-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part. I. The Problem of Security -- Chapter. 1. Security Awareness: Brave New World -- Chapter. 2. Combatting Fraud -- Chapter. 3. Complying with the PCI DSS Standard -- Part. II. Strategic Security Planning -- Chapter. 4. Managing Risk -- Chapter. 5. Addressing Business Impact Analysis and Business Continuity -- Chapter. 6. Governing: Policy, Maturity Models and Planning -- Part. III. Tactical Security Planning -- Chapter. 7. Designing Information Security -- Chapter. 8. Planning for Network Security -- Chapter. 9. Designing Physical Security -- Chapter. 10. Attending to Information Privacy -- Chapter. 11. Planning for Alternative Networks: Cloud Security and Zero Trust -- Chapter. 12. Organizing Personnel Security -- Part. IV. Planning for Detect, Respond, Recover -- Chapter. 13. Planning for Incident Response -- Chapter. 14. Defining Security Metrics -- Chapter. 15. Performing an Audit or Security Test -- Chapter. 16. Preparing for Forensic Analysis -- Part. V. Complying with National Regulations and Ethics -- Chapter. 17. Complying with the European Union General Data Protection Regulation (GDPR) -- Chapter. 18. Complying with U.S. Security Regulations -- Chapter. 19. Complying with HIPAA and HITECH -- Chapter. 20. Maturing Ethical Risk -- Part. VI. Developing Secure Software -- Chapter. 21. Understanding Software Threats and Vulnerabilities -- Chapter. 22. Defining a Secure Software Process -- Chapter. 23. Planning for Secure Software Requirements and Design with UML.
Record Nr. UNINA-9910800115103321
Lincke Susan  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Systems : 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, Dubai, United Arab Emirates, December 11-12, 2023, Proceedings, Part II / / edited by Maria Papadaki, Marinos Themistocleous, Khalid Al Marri, Marwan Al Zarouni
Information Systems : 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, Dubai, United Arab Emirates, December 11-12, 2023, Proceedings, Part II / / edited by Maria Papadaki, Marinos Themistocleous, Khalid Al Marri, Marwan Al Zarouni
Autore Papadaki Maria
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (347 pages)
Disciplina 005.3
Altri autori (Persone) ThemistocleousMarinos
Al MarriKhalid
Al ZarouniMarwan
Collana Lecture Notes in Business Information Processing
Soggetto topico Application software
Business information services
Computer security
Electronic data processing - Management
Big data
Social media
Computer and Information Systems Applications
IT in Business
Principles and Models of Security
IT Operations
Big Data
Social Media
ISBN 3-031-56481-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Big Data and Analytics -- Data Analytics and Data Science: Unlocking the Open Data Potential of Smart Cities -- 1 Introduction -- 2 Theoretical Assumptions -- 2.1 Open Data Background -- 2.2 Smart Cities Background -- 3 Methodology -- 4 Results -- 4.1 Related and Rising Concepts -- 4.2 Gaps and Challenges of Smart Cities Open Data Approach to Data Analytics -- 5 Conclusion, Limitations, and Future Research -- References -- Data Mesh Adoption: A Multi-case and Multi-method Readiness Approach -- 1 Introduction -- 2 Related Work -- 3 Methodological Approach -- 3.1 The TOE Framework -- 3.2 The Research Design: A Multi-case Study -- 4 Step 1: Data Mesh Survey -- 5 Step 2: Deep Dive Interviews for Data Mesh Adoption -- 6 Conclusions -- References -- Distributed Representational Analysis in Support of Multi-perspective Decision-Making -- 1 Introduction -- 2 Related Work -- 3 Theoretical Perspective -- 4 Method -- 4.1 Single Case Study -- 4.2 Data Collection -- 4.3 Data Analysis -- 5 Findings -- 5.1 User -- 5.2 Distributed Functional Analysis -- 5.3 Distributed Decision Task -- 5.4 Distributed Representational Analysis -- 6 Conclusion -- References -- Digital Services and Social Media -- Mobile Application Diffusion: An Exploration of Trust and Privacy Amongst Rural Enterprises in South Africa -- 1 Introduction -- 2 Literature Review -- 2.1 Trust Concerns Among Rural Enterprises -- 2.2 Privacy Concerns Among Rural Enterprises -- 3 Methodology -- 3.1 Selection -- 3.2 Specification -- 3.3 Summarizing -- 4 Findings -- 4.1 Implications for Rural Entrepreneurs -- 4.2 Implications for Theory -- 5 Conclusion -- References -- How Can Favorite Digital Services Enhance Users' Digital Well-Being? A Qualitative Study -- 1 Introduction -- 2 Digital Services and Digital Well-Being.
3 Methodology -- 4 Findings -- 4.1 Psychological Level -- 4.2 Social Level -- 4.3 Cognitive Level -- 5 Discussion and Conclusions -- Appendix. Participants' Background Information -- References -- Utilizing Degree Centrality Measures for Product Advertisement in Social Networks -- 1 Introduction -- 2 Related Work -- 3 Centrality Measures in Social Networks -- 3.1 Graph Representation -- 3.2 Degree -- 3.3 Centrality -- 3.4 Degree Centrality -- 3.5 Closeness Centrality -- 3.6 Betweenness Centrality -- 4 Proposed Method -- 4.1 Utilizing Degree Centrality in Social Networks for Product Advertisement: A Practical Approach -- 4.2 Assumption -- 4.3 Logistic Regression -- 5 Results -- 6 Conclusions and Future Work -- References -- Innovative Research Projects -- Business Models for Mobility Data Sharing Platforms: Stakeholders' Perceptions -- 1 Introduction -- 2 Theoretical Background -- 2.1 Mobility Data Sharing -- 2.2 Business Models -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Analysis -- 4 Findings and Discussion -- 4.1 Evaluation Criteria -- 4.2 Ranking of Business Models -- 5 Conclusion -- References -- Innovation Process Integration Challenges and Their Influence on Project Management Performance in Oil and Gas Field- A Conceptual Framework Development -- 1 Introduction -- 2 Theoretical Background -- 2.1 Literature Review Background -- 2.2 Innovation Concept and Process -- 2.3 Innovation Theories and Models -- 2.4 Individual Behavior Acceptance -- 3 Research Framing -- 3.1 Theoretical Framework -- 3.2 Conceptual Framework -- 4 Discussion -- 5 Conclusion -- References -- The Role of Adaptive and Transformational Leadership in the Successful Adoption and Implementation of New Technologies and Innovations in Organizations -- 1 Introduction -- 1.1 Aim of the Research -- 1.2 Research Questions -- 2 Literature Review and Related Theories.
2.1 Transformational Leadership -- 2.2 Adaptive Leadership -- 2.3 The Unified Theory of Acceptance and Use of Technology (UTAUT) -- 3 Conceptual Model -- 4 Methodology -- 4.1 Limitations and Recommendation for Further Research -- 5 Discussion -- 6 Conclusion -- References -- Managing Information Systems -- Information and Communication Technology Enabled Collaboration: Understanding the Critical Role of Computer Collective-Efficacy -- 1 Introduction -- 2 Theory -- 2.1 Social Cognitive Theory -- 2.2 Self-efficacy -- 3 Collective Efficacy -- 3.1 Collective Efficacy Assessment -- 4 Computer Collective-Efficacy -- 4.1 Computer Collective-Efficacy - Nomological Network -- 4.2 Measuring Computer Collective-Efficacy -- 5 General Discussion -- 6 Theoretical and Practical Implications -- 6.1 Theoretical Implications -- 6.2 Practical Implications -- 7 Conclusion -- Appendix -- References -- Communication is Key: A Systematic Literature Review of Transformation Competencies -- 1 Introduction -- 2 Theoretical Background -- 2.1 Organizational Transformation -- 2.2 The Concept of Competency -- 3 Research Design -- 3.1 Systematic Literature Review -- 3.2 Identification of Transformation Competencies -- 4 Findings -- 4.1 Sample Characteristics -- 4.2 Transformation Competencies -- 5 Discussion -- 5.1 Relevance of the Topic -- 5.2 Research Focus of the Studies -- 5.3 Competency Data Sources -- 5.4 Understanding of Competencies -- 5.5 Understanding of Transformation -- 5.6 Identified Transformation Competencies -- 6 Conclusion, Limitations, and Research Agenda -- References -- Evaluating the Success of Digital Transformation Strategy in Greek SMEs -- 1 Introduction -- 2 Theoretical Background -- 2.1 IS Strategizing and Organizational Issues -- 2.2 The Role of Practice in IS Strategizing -- 2.3 IS Strategizing and Success -- 3 Methodology -- 4 Results -- 5 Discussion.
6 Conclusions -- References -- Managing IS Adoption Challenges in Emerging Technologies: A Longitudinal Case Study of Financial Management Services Automation in a Medium-Sized Enterprise -- 1 Introduction -- 2 Adopting Robotic Process Automation in Organizations -- 3 Technology Adoption and Resistance to Change -- 4 Data Gathering and Analysis -- 5 Findings -- 5.1 Fear Fades Over Time, and Resistance Becomes More of a Principle -- 5.2 Success Stories Support Positive Attitude Towards Automation -- 5.3 Adopting Several Automation Technologies Supports Overall Rate of Automation but Lowers Adoption Rate of RPA -- 5.4 Dithering with Implementations Caused by Lack of Feasible Business Cases -- 5.5 Main Challenges Culminate in a Lack of Resources -- 6 Conclusion, Recommendations, and Limitations -- Appendix A DCP2 Interviews -- Appendix B Restraints, Challenges and Accelerators of Adoption: Summary of Harmonized Open Coding Within Key-Themes in DCP2 -- References -- Factors Amplifying or Inhibiting Cyber Threat Intelligence Sharing -- 1 Introduction -- 2 Related Work -- 2.1 Overview of Cyber Threat Intelligence Sharing -- 2.2 Cyber Security Frameworks -- 2.3 Cyber Threat Intelligence Sharing Platforms -- 3 Methodology -- 3.1 Research Site -- 3.2 Data Collection -- 3.3 Data Analysis -- 4 Findings -- 4.1 Factors for Enthusiastic Cyber Threat Intelligence Sharing -- 4.2 Factors for Circumstantial Cyber Threat Intelligence Sharing -- 4.3 Factors Preventing Cyber Threat Intelligence Sharing -- 5 Discussion -- 6 Conclusion -- References -- Empirical Investigation of Practitioners' Perceptions of Agile Testing Coordination in Medical Information Systems Development -- 1 Introduction -- 2 Related Work -- 2.1 Overview of Agile Practice -- 2.2 Software Testing in Medical Information Systems Development -- 3 Method -- 3.1 Research Sites -- 3.2 Data Collection.
3.3 Data Analysis -- 4 Findings -- 4.1 Tailoring Agile Testing in Medical Information Systems Development -- 4.2 Unit Testing in Medical Information Systems Development -- 4.3 Integration Testing in Medical Information Systems Development -- 4.4 Coordination Among Testing Practitioners -- 5 Discussion -- 5.1 Practitioners' Perceptions of Agile Testing Practice in Medical Software Development (RQ1) -- 5.2 Coordination Among Practitioners to Enhance Quality Testing in Agile Software Processes (RQ2) -- 6 Conclusion -- References -- Assessing Main Factors Adopted within the EU Harmonised Online Public Engagement (EU HOPE) -- 1 Introduction -- 2 Methodology -- 3 Europe Closer to Citizens -- 3.1 Bottom-Up Approach (Intersubjective Management) -- 4 The Necessity of Harmonised Online Public Engagement (EU HOPE) -- 4.1 Digital Innovation Factors Within the EU HOPE -- 4.2 Digital Participatory Platforms (DPP) -- 4.3 Intersubjective Agreements of Actors -- 5 Single Digital Gateway, A Harmonised Cross-Border Solution -- 6 Cross-Borders Pilot Studies -- 6.1 Cross-Border Data Flow in The Digital Single Market: Study on Data Location Restrictions -- 6.2 European Experience of Citizens' Participation in Cross-Border Governance -- 6.3 Cross-Border Cooperation (CBC) in Southern Europe-A Case Study. The Eurocity Elvas-Badajoz -- 6.4 Engaging Citizens in Cohesion Policy, DG REGIO and OECD Pilot Project Final Report -- 6.5 Flanders - The Netherlands Citizens' Panel on Addressing Cross-Border Issues and Stimulating Cross- Border Contacts -- 6.6 The 23 Citizen-Based Topics for Future EU Research - Project Names: Fostering Equal Opportunities in the Digital Era -- 7 Discussion -- 8 Conclusion -- References -- How Can Innovation Systems be Sustainable? An Approach for Organizations in Times of Crises, Alongside Economic and Information Technology Issues -- 1 Introduction.
2 Research Method.
Record Nr. UNINA-9910847079303321
Papadaki Maria  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Systems [[electronic resource] ] : 16th European, Mediterranean, and Middle Eastern Conference, EMCIS 2019, Dubai, United Arab Emirates, December 9–10, 2019, Proceedings / / edited by Marinos Themistocleous, Maria Papadaki
Information Systems [[electronic resource] ] : 16th European, Mediterranean, and Middle Eastern Conference, EMCIS 2019, Dubai, United Arab Emirates, December 9–10, 2019, Proceedings / / edited by Marinos Themistocleous, Maria Papadaki
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (364 pages)
Disciplina 004
Collana Lecture Notes in Business Information Processing
Soggetto topico Application software
Information technology
Business—Data processing
Computer security
Health informatics
Management information systems
Computer science
Information Systems Applications (incl. Internet)
IT in Business
Principles and Models of Security
Health Informatics
Management of Computing and Information Systems
ISBN 3-030-44322-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Big Data and Analytics -- A Practice Based Exploration on Electric Mobility as a Service in Smart Cities -- An experimental comparison of Machine Learning Classification Algorithms for Breast Cancer Diagnosis -- Taking Complexity into Account: A Structured Literature Review on Multi-Component Systems in the Context of Predictive Maintenance -- Smiling Earth - Raising Citizens' Awareness on Environmental Sustainability -- Knowledge and Human Development Authority in Dubai (KHDA) open data: what do researchers want -- An Immersive Web Visualization Platform for a Big Data Context in Bosch’s Industry 4.0 Movement -- A Data Modelling Method for Big Data Warehouses -- Block Chain Technology and Applications -- Towards a Better Understanding of the Value of Blockchains in Supply Chain Management -- Users’ Knowledge and Motivation on Using Cryptocurrency -- Cryptocurrency Usage Impact on Perceived Benefits and Users' Behaviour -- Cloud Computing -- Test Recommendation for Service Validation in 5G Networks -- Modelling 5G cloud-native applications by exploiting the service mesh paradigm -- Digital Services and Social Media -- Towards an Integrated Theoretical Model for Assessing Mobile Banking Acceptance among Consumers in Low Income African Economies -- Smart City adoption: An interplay of constructive and adverse factors -- Supervised Machine Learning Approach for Subjectivity/Objectivity Classification of Social data -- E-Government -- Smart Cities and Citizen Orientation: the Growing Importance of “Smart People” in Developing Modern Cities -- Digital Transformation in the Public Sector: Identifying Success Factors -- Employing the Once-Only Principle in the domain of the electronic public procurement -- Embracing Modern Technologies and Urban Development Trends: Initial Evaluation of a Smart City Enterprise Architecture Frameworks -- Enterprise Systems -- Process Chunks Selection in the context of Loose Inter-Organization Cooperation in Cloud Computing -- Agile Software Engineering Practices in ERP implementation -- Exploring Machine Learning Models to Predict Harmonized System Code -- Adopting Industry 4.0 Technologies in Citizens’ Electronic-Engagement considering Sustainability Development -- HealthCare Information Systems -- The Case for mHealth Standardization for Electronic Health Records in the German Healthcare System -- Assessing Digital Support for Smoking Cessation -- The Role of Gender in Supporting Active and Healthy Ageing by ICT Solutions: Learning from Latvian, Polish and Swedish Older Adults -- Information Systems Security and Information Privacy Protection -- Trust Management model based on Mutual Evaluation method for the Social Internet of Things -- A Model for Describing and Maximising Security Knowledge Sharing to Enhance Security Awareness -- A Formal Environment for Credibility and Accuracy Assessment of Safety Messages Exchanged in VANETs -- A Security Mechanism against the RSU Compromise Attack in a Ticket-based Authentication Scheme for VANETs -- Innovative Research Projects -- Monitoring the gait process during the rehabilitation of patients using computer vision techniques and UWB Technology -- Innovation and competitiveness of universities – an empirical research -- Application of Automated Trust Verification and Delegation Mechanisms in PEPPOL eProcurement Network -- A Smart Distributed Marketplace -- IT Governance -- Organisational Structure’s Influence on IT Alignment: The Case of a Public Organisation -- Factors for Successful IT Outsourcing Relationships in Large Companies in Sweden: A Service Buyer’s Perspective -- Barriers in Business-IT Alignment in the Banking Sector in a Developing Country: A Case Study of Commercial Banks in The Gambia -- The impact of knowledge sharing and innovation performance on the organization – moderating by innovation awards -- The Impact of Cognitive Process Types on the Success of Exploratory Projects -- Management and Organizational Issues in Information Systems -- IS Research Theoretical Foundation: Theories Used and the Future Path -- The Effect of E-Commerce on Financial Performance Measured by Return on Asset and Tobin’s Q of Jordanian Service Companies -- Facilitating ICT Adoption for Older Workers: Lessons Learned from Enterprise System Practitioners -- Adoption of Digital Technology in Corporate R&D Context -- ERP Implementation: Requirements Engineering for ERP Product Customization -- Conceptualising IT Project Portfolio Management in terms of Organisational State-Transition Approach -- The Effect of Big Data Analytics Capability on Firm Performance: A Pilot Study in China -- Digital Services for Industry 4.0: Assessing Collaborative Technology Readiness -- An Online Platform for ‘Black Swan’ Event Management in the Hospitality Industry. .
Record Nr. UNINA-9910409671003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui