top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Blockchain Scalability [[electronic resource] /] / edited by Wuhui Chen, Zibin Zheng, Huawei Huang
Blockchain Scalability [[electronic resource] /] / edited by Wuhui Chen, Zibin Zheng, Huawei Huang
Autore Zheng Zibin
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (243 pages)
Disciplina 005.74
Altri autori (Persone) ChenWuhui
HuangHuawei
Soggetto topico Blockchains (Databases)
Electronic digital computers - Evaluation
Computer security
Computer networks
Blockchain
System Performance and Evaluation
Principles and Models of Security
Computer Communication Networks
ISBN 981-9910-59-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Blockchain Scalability Fundamentals -- Chapter 2. Overview to Blockchain Scalability Challenges and Solutions -- Chapter 3. On-Chain and Off-Chain Scalability Techniques -- Chapter 4. Layered Sharding on Open Blockchain -- Chapter 5. Sharding-Based Scalable Consortium Blockchain -- Chapter 6. State Sharding for Permissioned Blockchain -- Chapter 7. Elastic Resource Allocation in Sharding-Based Blockchains -- Chapter 8. Dynamic Sharding: A Trade-OFF Between Security and Scalability -- Chapter 9. A Scalable and Secure Framework for 5G Networks Applications.
Record Nr. UNISA-996546845103316
Zheng Zibin  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Blockchain Scalability / / edited by Wuhui Chen, Zibin Zheng, Huawei Huang
Blockchain Scalability / / edited by Wuhui Chen, Zibin Zheng, Huawei Huang
Autore Zheng Zibin
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (243 pages)
Disciplina 005.74
Altri autori (Persone) ChenWuhui
HuangHuawei
Soggetto topico Blockchains (Databases)
Electronic digital computers - Evaluation
Computer security
Computer networks
Blockchain
System Performance and Evaluation
Principles and Models of Security
Computer Communication Networks
ISBN 981-9910-59-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Blockchain Scalability Fundamentals -- Chapter 2. Overview to Blockchain Scalability Challenges and Solutions -- Chapter 3. On-Chain and Off-Chain Scalability Techniques -- Chapter 4. Layered Sharding on Open Blockchain -- Chapter 5. Sharding-Based Scalable Consortium Blockchain -- Chapter 6. State Sharding for Permissioned Blockchain -- Chapter 7. Elastic Resource Allocation in Sharding-Based Blockchains -- Chapter 8. Dynamic Sharding: A Trade-OFF Between Security and Scalability -- Chapter 9. A Scalable and Secure Framework for 5G Networks Applications.
Record Nr. UNINA-9910734875903321
Zheng Zibin  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The coupling of safety and security : exploring interrelations in theory and practice / / edited by Corinne Bieder, Kenneth Pettersen Gould
The coupling of safety and security : exploring interrelations in theory and practice / / edited by Corinne Bieder, Kenneth Pettersen Gould
Autore Bieder Corinne
Pubbl/distr/stampa Springer Nature, 2020
Descrizione fisica 1 online resource (viii, 113 pages) : illustrations; digital, PDF file(s)
Disciplina 658.56
Collana SpringerBriefs in Applied Sciences and Technology
SpringerBriefs in Safety Management
Soggetto topico Quality control
Reliability
Industrial safety
Computer security
Public safety
System safety
Industrial organization
Quality Control, Reliability, Safety and Risk
Principles and Models of Security
Crime Control and Security
Security Science and Technology
Industrial Organization
Soggetto non controllato Quality Control, Reliability, Safety and Risk
Principles and Models of Security
Crime Control and Security
Security Science and Technology
Industrial Organization
Industrial and Production Engineering
Safety Management
Security Management
Safety and Security
High Risk Organizations
Risk Management
Safety Security Efficiency
Security Interfaces
Open Access
Reliability engineering
Computer security
Crime & criminology
Security & fire alarm systems
Economics of industrial organisation
ISBN 3-030-47229-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Safety and Security: The Challenges of Bringing them Together -- 2. The Concepts of Risk, Safety and Security: A Fundamental Exploration and Understanding of Similarities and Differences -- 3. Safety and Security are Two Sides of the Same Coin -- 4. Safety vs Security in Aviation -- 6. Security and Safety Culture - Dual or Distinct Phenomena?
Record Nr. UNINA-9910416527703321
Bieder Corinne  
Springer Nature, 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Resilience System Engineering Empowered by Endogenous Security and Safety / / by Jiangxing Wu
Cyber Resilience System Engineering Empowered by Endogenous Security and Safety / / by Jiangxing Wu
Autore Wu Jiangxing
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (533 pages)
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Computer security
Cryptography
Data encryption (Computer science)
Mobile and Network Security
Principles and Models of Security
Cryptology
ISBN 981-9701-16-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Cyberspace Endogenous Security and Safety Problems -- Chapter 2. Cyberspace Endogenous Security and Safety Defense Vision -- Chapter 3. The Principle and Structure of Cyberspace Endogenous Security and Safety -- Chapter 4. Introduction to Functional Safety and Cyber Resilience -- Chapter 5. The Framework of Cyber Resilience Engineering Empowered by Endogenous Security and Safety -- Chapter 6. Metrics and Assessment of ESS-Empowered Cyber Resilience -- Chapter 7. Engineering Applications in Typical Fields of ESS Empowerment -- Chapter 8. Exploration of Emerging Fields Empowered by Endogenous Security and Safety -- Appendix.
Record Nr. UNINA-9910899890803321
Wu Jiangxing  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity Teaching in Higher Education [[electronic resource] /] / edited by Leslie F. Sikos, Paul Haskell-Dowland
Cybersecurity Teaching in Higher Education [[electronic resource] /] / edited by Leslie F. Sikos, Paul Haskell-Dowland
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (144 pages)
Disciplina 005.8071
Soggetto topico Education—Data processing
Computer security
Computer networks—Security measures
Data protection
Computers and Education
Principles and Models of Security
Mobile and Network Security
Data and Information Security
Soggetto non controllato Mathematics
ISBN 9783031242168
9783031242151
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter. 1. Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes -- Chapter. 2. Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management -- Chapter. 3. Designing and Developing a Scenario-Based Curriculum for Cyber Education in HE -- Chapter. 4. Enabling teamwork in Cybersecurity courses -- Chapter. 5. Towards a Light-Weight Certification Scheme for Cybersecurity MOOCs -- Chapter. 6. Learning Environments for Digital Forensics Teaching in Higher Education.
Record Nr. UNISA-996547960803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cybersecurity Teaching in Higher Education / / edited by Leslie F. Sikos, Paul Haskell-Dowland
Cybersecurity Teaching in Higher Education / / edited by Leslie F. Sikos, Paul Haskell-Dowland
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (144 pages)
Disciplina 005.8071
005.80711
Soggetto topico Education—Data processing
Computer security
Computer networks—Security measures
Data protection
Computers and Education
Principles and Models of Security
Mobile and Network Security
Data and Information Security
Soggetto non controllato Mathematics
ISBN 9783031242168
9783031242151
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter. 1. Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes -- Chapter. 2. Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management -- Chapter. 3. Designing and Developing a Scenario-Based Curriculum for Cyber Education in HE -- Chapter. 4. Enabling teamwork in Cybersecurity courses -- Chapter. 5. Towards a Light-Weight Certification Scheme for Cybersecurity MOOCs -- Chapter. 6. Learning Environments for Digital Forensics Teaching in Higher Education.
Record Nr. UNINA-9910725095103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Design of Rijndael [[electronic resource] ] : The Advanced Encryption Standard (AES) / / by Joan Daemen, Vincent Rijmen
The Design of Rijndael [[electronic resource] ] : The Advanced Encryption Standard (AES) / / by Joan Daemen, Vincent Rijmen
Autore Daemen Joan
Edizione [2nd ed. 2020.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xviii, 282 pages) : illustrations
Disciplina 005.82
Collana Information Security and Cryptography
Soggetto topico Data encryption (Computer science)
Computer security
System safety
Cryptology
Principles and Models of Security
Systems and Data Security
Security Science and Technology
ISBN 3-662-60769-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Advanced Encryption Standard Process -- Preliminaries -- Specification of Rijndael -- Implementation Aspects -- Design Philosophy -- The Data Encryption Standard -- Correlation Matrices -- Difference Propagation -- The Wide Trail Strategy -- Cryptanalysis -- The Road to Rijndael -- Correlation Analysis in GF(2n) -- On the EDP of Two- and Four-Round Differentials and the ELP of Two- and Four-Round Hulls -- Two-Round Differential Trail Clustering -- Plateau Trails -- App. A, Substitution Tables -- App. B, Test Vectors -- App. C, Reference Code -- Bibliography -- Index.
Record Nr. UNISA-996465342203316
Daemen Joan  
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
The Design of Rijndael : The Advanced Encryption Standard (AES) / / by Joan Daemen, Vincent Rijmen
The Design of Rijndael : The Advanced Encryption Standard (AES) / / by Joan Daemen, Vincent Rijmen
Autore Daemen Joan
Edizione [2nd ed. 2020.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xviii, 282 pages) : illustrations
Disciplina 005.82
Collana Information Security and Cryptography
Soggetto topico Data encryption (Computer science)
Computer security
System safety
Cryptology
Principles and Models of Security
Systems and Data Security
Security Science and Technology
ISBN 3-662-60769-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Advanced Encryption Standard Process -- Preliminaries -- Specification of Rijndael -- Implementation Aspects -- Design Philosophy -- The Data Encryption Standard -- Correlation Matrices -- Difference Propagation -- The Wide Trail Strategy -- Cryptanalysis -- The Road to Rijndael -- Correlation Analysis in GF(2n) -- On the EDP of Two- and Four-Round Differentials and the ELP of Two- and Four-Round Hulls -- Two-Round Differential Trail Clustering -- Plateau Trails -- App. A, Substitution Tables -- App. B, Test Vectors -- App. C, Reference Code -- Bibliography -- Index.
Record Nr. UNINA-9910409667503321
Daemen Joan  
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Planning : A Practical Approach / / by Susan Lincke
Information Security Planning : A Practical Approach / / by Susan Lincke
Autore Lincke Susan
Edizione [2nd ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (446 pages)
Disciplina 005.8
Soggetto topico Computer security
Data protection
Data protection - Law and legislation
Business information services
Computers - Law and legislation
Information technology - Law and legislation
Principles and Models of Security
Data and Information Security
Privacy
Business Information Systems
Legal Aspects of Computing
ISBN 3-031-43118-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part. I. The Problem of Security -- Chapter. 1. Security Awareness: Brave New World -- Chapter. 2. Combatting Fraud -- Chapter. 3. Complying with the PCI DSS Standard -- Part. II. Strategic Security Planning -- Chapter. 4. Managing Risk -- Chapter. 5. Addressing Business Impact Analysis and Business Continuity -- Chapter. 6. Governing: Policy, Maturity Models and Planning -- Part. III. Tactical Security Planning -- Chapter. 7. Designing Information Security -- Chapter. 8. Planning for Network Security -- Chapter. 9. Designing Physical Security -- Chapter. 10. Attending to Information Privacy -- Chapter. 11. Planning for Alternative Networks: Cloud Security and Zero Trust -- Chapter. 12. Organizing Personnel Security -- Part. IV. Planning for Detect, Respond, Recover -- Chapter. 13. Planning for Incident Response -- Chapter. 14. Defining Security Metrics -- Chapter. 15. Performing an Audit or Security Test.-Chapter. 16. Preparing for Forensic Analysis -- Part. V. Complying with National Regulations and Ethics -- Chapter. 17. Complying with the European Union General Data Protection Regulation (GDPR) -- Chapter. 18. Complying with U.S. Security Regulations -- Chapter. 19. Complying with HIPAA and HITECH -- Chapter. 20. Maturing Ethical Risk -- Part. VI. Developing Secure Software -- Chapter. 21. Understanding Software Threats and Vulnerabilities -- Chapter. 22. Defining a Secure Software Process -- Chapter. 23. Planning for Secure Software Requirements and Design with UML.
Record Nr. UNINA-9910800115103321
Lincke Susan  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Systems : 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, Dubai, United Arab Emirates, December 11-12, 2023, Proceedings, Part II / / edited by Maria Papadaki, Marinos Themistocleous, Khalid Al Marri, Marwan Al Zarouni
Information Systems : 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, Dubai, United Arab Emirates, December 11-12, 2023, Proceedings, Part II / / edited by Maria Papadaki, Marinos Themistocleous, Khalid Al Marri, Marwan Al Zarouni
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (347 pages)
Disciplina 005.7
Collana Lecture Notes in Business Information Processing
Soggetto topico Application software
Business information services
Computer security
Electronic data processing - Management
Big data
Social media
Computer and Information Systems Applications
IT in Business
Principles and Models of Security
IT Operations
Big Data
Social Media
ISBN 3-031-56481-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Big Data and Analytics -- Data Analytics and Data Science: Unlocking the Open Data Potential of Smart Cities -- 1 Introduction -- 2 Theoretical Assumptions -- 2.1 Open Data Background -- 2.2 Smart Cities Background -- 3 Methodology -- 4 Results -- 4.1 Related and Rising Concepts -- 4.2 Gaps and Challenges of Smart Cities Open Data Approach to Data Analytics -- 5 Conclusion, Limitations, and Future Research -- References -- Data Mesh Adoption: A Multi-case and Multi-method Readiness Approach -- 1 Introduction -- 2 Related Work -- 3 Methodological Approach -- 3.1 The TOE Framework -- 3.2 The Research Design: A Multi-case Study -- 4 Step 1: Data Mesh Survey -- 5 Step 2: Deep Dive Interviews for Data Mesh Adoption -- 6 Conclusions -- References -- Distributed Representational Analysis in Support of Multi-perspective Decision-Making -- 1 Introduction -- 2 Related Work -- 3 Theoretical Perspective -- 4 Method -- 4.1 Single Case Study -- 4.2 Data Collection -- 4.3 Data Analysis -- 5 Findings -- 5.1 User -- 5.2 Distributed Functional Analysis -- 5.3 Distributed Decision Task -- 5.4 Distributed Representational Analysis -- 6 Conclusion -- References -- Digital Services and Social Media -- Mobile Application Diffusion: An Exploration of Trust and Privacy Amongst Rural Enterprises in South Africa -- 1 Introduction -- 2 Literature Review -- 2.1 Trust Concerns Among Rural Enterprises -- 2.2 Privacy Concerns Among Rural Enterprises -- 3 Methodology -- 3.1 Selection -- 3.2 Specification -- 3.3 Summarizing -- 4 Findings -- 4.1 Implications for Rural Entrepreneurs -- 4.2 Implications for Theory -- 5 Conclusion -- References -- How Can Favorite Digital Services Enhance Users' Digital Well-Being? A Qualitative Study -- 1 Introduction -- 2 Digital Services and Digital Well-Being.
3 Methodology -- 4 Findings -- 4.1 Psychological Level -- 4.2 Social Level -- 4.3 Cognitive Level -- 5 Discussion and Conclusions -- Appendix. Participants' Background Information -- References -- Utilizing Degree Centrality Measures for Product Advertisement in Social Networks -- 1 Introduction -- 2 Related Work -- 3 Centrality Measures in Social Networks -- 3.1 Graph Representation -- 3.2 Degree -- 3.3 Centrality -- 3.4 Degree Centrality -- 3.5 Closeness Centrality -- 3.6 Betweenness Centrality -- 4 Proposed Method -- 4.1 Utilizing Degree Centrality in Social Networks for Product Advertisement: A Practical Approach -- 4.2 Assumption -- 4.3 Logistic Regression -- 5 Results -- 6 Conclusions and Future Work -- References -- Innovative Research Projects -- Business Models for Mobility Data Sharing Platforms: Stakeholders' Perceptions -- 1 Introduction -- 2 Theoretical Background -- 2.1 Mobility Data Sharing -- 2.2 Business Models -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Analysis -- 4 Findings and Discussion -- 4.1 Evaluation Criteria -- 4.2 Ranking of Business Models -- 5 Conclusion -- References -- Innovation Process Integration Challenges and Their Influence on Project Management Performance in Oil and Gas Field- A Conceptual Framework Development -- 1 Introduction -- 2 Theoretical Background -- 2.1 Literature Review Background -- 2.2 Innovation Concept and Process -- 2.3 Innovation Theories and Models -- 2.4 Individual Behavior Acceptance -- 3 Research Framing -- 3.1 Theoretical Framework -- 3.2 Conceptual Framework -- 4 Discussion -- 5 Conclusion -- References -- The Role of Adaptive and Transformational Leadership in the Successful Adoption and Implementation of New Technologies and Innovations in Organizations -- 1 Introduction -- 1.1 Aim of the Research -- 1.2 Research Questions -- 2 Literature Review and Related Theories.
2.1 Transformational Leadership -- 2.2 Adaptive Leadership -- 2.3 The Unified Theory of Acceptance and Use of Technology (UTAUT) -- 3 Conceptual Model -- 4 Methodology -- 4.1 Limitations and Recommendation for Further Research -- 5 Discussion -- 6 Conclusion -- References -- Managing Information Systems -- Information and Communication Technology Enabled Collaboration: Understanding the Critical Role of Computer Collective-Efficacy -- 1 Introduction -- 2 Theory -- 2.1 Social Cognitive Theory -- 2.2 Self-efficacy -- 3 Collective Efficacy -- 3.1 Collective Efficacy Assessment -- 4 Computer Collective-Efficacy -- 4.1 Computer Collective-Efficacy - Nomological Network -- 4.2 Measuring Computer Collective-Efficacy -- 5 General Discussion -- 6 Theoretical and Practical Implications -- 6.1 Theoretical Implications -- 6.2 Practical Implications -- 7 Conclusion -- Appendix -- References -- Communication is Key: A Systematic Literature Review of Transformation Competencies -- 1 Introduction -- 2 Theoretical Background -- 2.1 Organizational Transformation -- 2.2 The Concept of Competency -- 3 Research Design -- 3.1 Systematic Literature Review -- 3.2 Identification of Transformation Competencies -- 4 Findings -- 4.1 Sample Characteristics -- 4.2 Transformation Competencies -- 5 Discussion -- 5.1 Relevance of the Topic -- 5.2 Research Focus of the Studies -- 5.3 Competency Data Sources -- 5.4 Understanding of Competencies -- 5.5 Understanding of Transformation -- 5.6 Identified Transformation Competencies -- 6 Conclusion, Limitations, and Research Agenda -- References -- Evaluating the Success of Digital Transformation Strategy in Greek SMEs -- 1 Introduction -- 2 Theoretical Background -- 2.1 IS Strategizing and Organizational Issues -- 2.2 The Role of Practice in IS Strategizing -- 2.3 IS Strategizing and Success -- 3 Methodology -- 4 Results -- 5 Discussion.
6 Conclusions -- References -- Managing IS Adoption Challenges in Emerging Technologies: A Longitudinal Case Study of Financial Management Services Automation in a Medium-Sized Enterprise -- 1 Introduction -- 2 Adopting Robotic Process Automation in Organizations -- 3 Technology Adoption and Resistance to Change -- 4 Data Gathering and Analysis -- 5 Findings -- 5.1 Fear Fades Over Time, and Resistance Becomes More of a Principle -- 5.2 Success Stories Support Positive Attitude Towards Automation -- 5.3 Adopting Several Automation Technologies Supports Overall Rate of Automation but Lowers Adoption Rate of RPA -- 5.4 Dithering with Implementations Caused by Lack of Feasible Business Cases -- 5.5 Main Challenges Culminate in a Lack of Resources -- 6 Conclusion, Recommendations, and Limitations -- Appendix A DCP2 Interviews -- Appendix B Restraints, Challenges and Accelerators of Adoption: Summary of Harmonized Open Coding Within Key-Themes in DCP2 -- References -- Factors Amplifying or Inhibiting Cyber Threat Intelligence Sharing -- 1 Introduction -- 2 Related Work -- 2.1 Overview of Cyber Threat Intelligence Sharing -- 2.2 Cyber Security Frameworks -- 2.3 Cyber Threat Intelligence Sharing Platforms -- 3 Methodology -- 3.1 Research Site -- 3.2 Data Collection -- 3.3 Data Analysis -- 4 Findings -- 4.1 Factors for Enthusiastic Cyber Threat Intelligence Sharing -- 4.2 Factors for Circumstantial Cyber Threat Intelligence Sharing -- 4.3 Factors Preventing Cyber Threat Intelligence Sharing -- 5 Discussion -- 6 Conclusion -- References -- Empirical Investigation of Practitioners' Perceptions of Agile Testing Coordination in Medical Information Systems Development -- 1 Introduction -- 2 Related Work -- 2.1 Overview of Agile Practice -- 2.2 Software Testing in Medical Information Systems Development -- 3 Method -- 3.1 Research Sites -- 3.2 Data Collection.
3.3 Data Analysis -- 4 Findings -- 4.1 Tailoring Agile Testing in Medical Information Systems Development -- 4.2 Unit Testing in Medical Information Systems Development -- 4.3 Integration Testing in Medical Information Systems Development -- 4.4 Coordination Among Testing Practitioners -- 5 Discussion -- 5.1 Practitioners' Perceptions of Agile Testing Practice in Medical Software Development (RQ1) -- 5.2 Coordination Among Practitioners to Enhance Quality Testing in Agile Software Processes (RQ2) -- 6 Conclusion -- References -- Assessing Main Factors Adopted within the EU Harmonised Online Public Engagement (EU HOPE) -- 1 Introduction -- 2 Methodology -- 3 Europe Closer to Citizens -- 3.1 Bottom-Up Approach (Intersubjective Management) -- 4 The Necessity of Harmonised Online Public Engagement (EU HOPE) -- 4.1 Digital Innovation Factors Within the EU HOPE -- 4.2 Digital Participatory Platforms (DPP) -- 4.3 Intersubjective Agreements of Actors -- 5 Single Digital Gateway, A Harmonised Cross-Border Solution -- 6 Cross-Borders Pilot Studies -- 6.1 Cross-Border Data Flow in The Digital Single Market: Study on Data Location Restrictions -- 6.2 European Experience of Citizens' Participation in Cross-Border Governance -- 6.3 Cross-Border Cooperation (CBC) in Southern Europe-A Case Study. The Eurocity Elvas-Badajoz -- 6.4 Engaging Citizens in Cohesion Policy, DG REGIO and OECD Pilot Project Final Report -- 6.5 Flanders - The Netherlands Citizens' Panel on Addressing Cross-Border Issues and Stimulating Cross- Border Contacts -- 6.6 The 23 Citizen-Based Topics for Future EU Research - Project Names: Fostering Equal Opportunities in the Digital Era -- 7 Discussion -- 8 Conclusion -- References -- How Can Innovation Systems be Sustainable? An Approach for Organizations in Times of Crises, Alongside Economic and Information Technology Issues -- 1 Introduction.
2 Research Method.
Record Nr. UNINA-9910847079303321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui