Blockchain Scalability [[electronic resource] /] / edited by Wuhui Chen, Zibin Zheng, Huawei Huang |
Autore | Zheng Zibin |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (243 pages) |
Disciplina | 005.74 |
Altri autori (Persone) |
ChenWuhui
HuangHuawei |
Soggetto topico |
Blockchains (Databases)
Electronic digital computers - Evaluation Computer security Computer networks Blockchain System Performance and Evaluation Principles and Models of Security Computer Communication Networks |
ISBN | 981-9910-59-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Blockchain Scalability Fundamentals -- Chapter 2. Overview to Blockchain Scalability Challenges and Solutions -- Chapter 3. On-Chain and Off-Chain Scalability Techniques -- Chapter 4. Layered Sharding on Open Blockchain -- Chapter 5. Sharding-Based Scalable Consortium Blockchain -- Chapter 6. State Sharding for Permissioned Blockchain -- Chapter 7. Elastic Resource Allocation in Sharding-Based Blockchains -- Chapter 8. Dynamic Sharding: A Trade-OFF Between Security and Scalability -- Chapter 9. A Scalable and Secure Framework for 5G Networks Applications. |
Record Nr. | UNISA-996546845103316 |
Zheng Zibin | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Blockchain Scalability / / edited by Wuhui Chen, Zibin Zheng, Huawei Huang |
Autore | Zheng Zibin |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (243 pages) |
Disciplina | 005.74 |
Altri autori (Persone) |
ChenWuhui
HuangHuawei |
Soggetto topico |
Blockchains (Databases)
Electronic digital computers - Evaluation Computer security Computer networks Blockchain System Performance and Evaluation Principles and Models of Security Computer Communication Networks |
ISBN | 981-9910-59-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Blockchain Scalability Fundamentals -- Chapter 2. Overview to Blockchain Scalability Challenges and Solutions -- Chapter 3. On-Chain and Off-Chain Scalability Techniques -- Chapter 4. Layered Sharding on Open Blockchain -- Chapter 5. Sharding-Based Scalable Consortium Blockchain -- Chapter 6. State Sharding for Permissioned Blockchain -- Chapter 7. Elastic Resource Allocation in Sharding-Based Blockchains -- Chapter 8. Dynamic Sharding: A Trade-OFF Between Security and Scalability -- Chapter 9. A Scalable and Secure Framework for 5G Networks Applications. |
Record Nr. | UNINA-9910734875903321 |
Zheng Zibin | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The coupling of safety and security : exploring interrelations in theory and practice / / edited by Corinne Bieder, Kenneth Pettersen Gould |
Autore | Bieder Corinne |
Pubbl/distr/stampa | Springer Nature, 2020 |
Descrizione fisica | 1 online resource (viii, 113 pages) : illustrations; digital, PDF file(s) |
Disciplina | 658.56 |
Collana |
SpringerBriefs in Applied Sciences and Technology
SpringerBriefs in Safety Management |
Soggetto topico |
Quality control
Reliability Industrial safety Computer security Public safety System safety Industrial organization Quality Control, Reliability, Safety and Risk Principles and Models of Security Crime Control and Security Security Science and Technology Industrial Organization |
Soggetto non controllato |
Quality Control, Reliability, Safety and Risk
Principles and Models of Security Crime Control and Security Security Science and Technology Industrial Organization Industrial and Production Engineering Safety Management Security Management Safety and Security High Risk Organizations Risk Management Safety Security Efficiency Security Interfaces Open Access Reliability engineering Computer security Crime & criminology Security & fire alarm systems Economics of industrial organisation |
ISBN | 3-030-47229-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Safety and Security: The Challenges of Bringing them Together -- 2. The Concepts of Risk, Safety and Security: A Fundamental Exploration and Understanding of Similarities and Differences -- 3. Safety and Security are Two Sides of the Same Coin -- 4. Safety vs Security in Aviation -- 6. Security and Safety Culture - Dual or Distinct Phenomena? |
Record Nr. | UNINA-9910416527703321 |
Bieder Corinne | ||
Springer Nature, 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Resilience System Engineering Empowered by Endogenous Security and Safety / / by Jiangxing Wu |
Autore | Wu Jiangxing |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (533 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures
Computer security Cryptography Data encryption (Computer science) Mobile and Network Security Principles and Models of Security Cryptology |
ISBN | 981-9701-16-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Cyberspace Endogenous Security and Safety Problems -- Chapter 2. Cyberspace Endogenous Security and Safety Defense Vision -- Chapter 3. The Principle and Structure of Cyberspace Endogenous Security and Safety -- Chapter 4. Introduction to Functional Safety and Cyber Resilience -- Chapter 5. The Framework of Cyber Resilience Engineering Empowered by Endogenous Security and Safety -- Chapter 6. Metrics and Assessment of ESS-Empowered Cyber Resilience -- Chapter 7. Engineering Applications in Typical Fields of ESS Empowerment -- Chapter 8. Exploration of Emerging Fields Empowered by Endogenous Security and Safety -- Appendix. |
Record Nr. | UNINA-9910899890803321 |
Wu Jiangxing | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity Teaching in Higher Education [[electronic resource] /] / edited by Leslie F. Sikos, Paul Haskell-Dowland |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (144 pages) |
Disciplina | 005.8071 |
Soggetto topico |
Education—Data processing
Computer security Computer networks—Security measures Data protection Computers and Education Principles and Models of Security Mobile and Network Security Data and Information Security |
Soggetto non controllato | Mathematics |
ISBN |
9783031242168
9783031242151 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter. 1. Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes -- Chapter. 2. Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management -- Chapter. 3. Designing and Developing a Scenario-Based Curriculum for Cyber Education in HE -- Chapter. 4. Enabling teamwork in Cybersecurity courses -- Chapter. 5. Towards a Light-Weight Certification Scheme for Cybersecurity MOOCs -- Chapter. 6. Learning Environments for Digital Forensics Teaching in Higher Education. |
Record Nr. | UNISA-996547960803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cybersecurity Teaching in Higher Education / / edited by Leslie F. Sikos, Paul Haskell-Dowland |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (144 pages) |
Disciplina |
005.8071
005.80711 |
Soggetto topico |
Education—Data processing
Computer security Computer networks—Security measures Data protection Computers and Education Principles and Models of Security Mobile and Network Security Data and Information Security |
Soggetto non controllato | Mathematics |
ISBN |
9783031242168
9783031242151 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter. 1. Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes -- Chapter. 2. Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management -- Chapter. 3. Designing and Developing a Scenario-Based Curriculum for Cyber Education in HE -- Chapter. 4. Enabling teamwork in Cybersecurity courses -- Chapter. 5. Towards a Light-Weight Certification Scheme for Cybersecurity MOOCs -- Chapter. 6. Learning Environments for Digital Forensics Teaching in Higher Education. |
Record Nr. | UNINA-9910725095103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The Design of Rijndael [[electronic resource] ] : The Advanced Encryption Standard (AES) / / by Joan Daemen, Vincent Rijmen |
Autore | Daemen Joan |
Edizione | [2nd ed. 2020.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (xviii, 282 pages) : illustrations |
Disciplina | 005.82 |
Collana | Information Security and Cryptography |
Soggetto topico |
Data encryption (Computer science)
Computer security System safety Cryptology Principles and Models of Security Systems and Data Security Security Science and Technology |
ISBN | 3-662-60769-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The Advanced Encryption Standard Process -- Preliminaries -- Specification of Rijndael -- Implementation Aspects -- Design Philosophy -- The Data Encryption Standard -- Correlation Matrices -- Difference Propagation -- The Wide Trail Strategy -- Cryptanalysis -- The Road to Rijndael -- Correlation Analysis in GF(2n) -- On the EDP of Two- and Four-Round Differentials and the ELP of Two- and Four-Round Hulls -- Two-Round Differential Trail Clustering -- Plateau Trails -- App. A, Substitution Tables -- App. B, Test Vectors -- App. C, Reference Code -- Bibliography -- Index. |
Record Nr. | UNISA-996465342203316 |
Daemen Joan | ||
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
The Design of Rijndael : The Advanced Encryption Standard (AES) / / by Joan Daemen, Vincent Rijmen |
Autore | Daemen Joan |
Edizione | [2nd ed. 2020.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (xviii, 282 pages) : illustrations |
Disciplina | 005.82 |
Collana | Information Security and Cryptography |
Soggetto topico |
Data encryption (Computer science)
Computer security System safety Cryptology Principles and Models of Security Systems and Data Security Security Science and Technology |
ISBN | 3-662-60769-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The Advanced Encryption Standard Process -- Preliminaries -- Specification of Rijndael -- Implementation Aspects -- Design Philosophy -- The Data Encryption Standard -- Correlation Matrices -- Difference Propagation -- The Wide Trail Strategy -- Cryptanalysis -- The Road to Rijndael -- Correlation Analysis in GF(2n) -- On the EDP of Two- and Four-Round Differentials and the ELP of Two- and Four-Round Hulls -- Two-Round Differential Trail Clustering -- Plateau Trails -- App. A, Substitution Tables -- App. B, Test Vectors -- App. C, Reference Code -- Bibliography -- Index. |
Record Nr. | UNINA-9910409667503321 |
Daemen Joan | ||
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security Planning : A Practical Approach / / by Susan Lincke |
Autore | Lincke Susan |
Edizione | [2nd ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (446 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Data protection Data protection - Law and legislation Business information services Computers - Law and legislation Information technology - Law and legislation Principles and Models of Security Data and Information Security Privacy Business Information Systems Legal Aspects of Computing |
ISBN | 3-031-43118-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part. I. The Problem of Security -- Chapter. 1. Security Awareness: Brave New World -- Chapter. 2. Combatting Fraud -- Chapter. 3. Complying with the PCI DSS Standard -- Part. II. Strategic Security Planning -- Chapter. 4. Managing Risk -- Chapter. 5. Addressing Business Impact Analysis and Business Continuity -- Chapter. 6. Governing: Policy, Maturity Models and Planning -- Part. III. Tactical Security Planning -- Chapter. 7. Designing Information Security -- Chapter. 8. Planning for Network Security -- Chapter. 9. Designing Physical Security -- Chapter. 10. Attending to Information Privacy -- Chapter. 11. Planning for Alternative Networks: Cloud Security and Zero Trust -- Chapter. 12. Organizing Personnel Security -- Part. IV. Planning for Detect, Respond, Recover -- Chapter. 13. Planning for Incident Response -- Chapter. 14. Defining Security Metrics -- Chapter. 15. Performing an Audit or Security Test.-Chapter. 16. Preparing for Forensic Analysis -- Part. V. Complying with National Regulations and Ethics -- Chapter. 17. Complying with the European Union General Data Protection Regulation (GDPR) -- Chapter. 18. Complying with U.S. Security Regulations -- Chapter. 19. Complying with HIPAA and HITECH -- Chapter. 20. Maturing Ethical Risk -- Part. VI. Developing Secure Software -- Chapter. 21. Understanding Software Threats and Vulnerabilities -- Chapter. 22. Defining a Secure Software Process -- Chapter. 23. Planning for Secure Software Requirements and Design with UML. |
Record Nr. | UNINA-9910800115103321 |
Lincke Susan | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Systems : 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, Dubai, United Arab Emirates, December 11-12, 2023, Proceedings, Part II / / edited by Maria Papadaki, Marinos Themistocleous, Khalid Al Marri, Marwan Al Zarouni |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (347 pages) |
Disciplina | 005.7 |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Application software
Business information services Computer security Electronic data processing - Management Big data Social media Computer and Information Systems Applications IT in Business Principles and Models of Security IT Operations Big Data Social Media |
ISBN | 3-031-56481-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Big Data and Analytics -- Data Analytics and Data Science: Unlocking the Open Data Potential of Smart Cities -- 1 Introduction -- 2 Theoretical Assumptions -- 2.1 Open Data Background -- 2.2 Smart Cities Background -- 3 Methodology -- 4 Results -- 4.1 Related and Rising Concepts -- 4.2 Gaps and Challenges of Smart Cities Open Data Approach to Data Analytics -- 5 Conclusion, Limitations, and Future Research -- References -- Data Mesh Adoption: A Multi-case and Multi-method Readiness Approach -- 1 Introduction -- 2 Related Work -- 3 Methodological Approach -- 3.1 The TOE Framework -- 3.2 The Research Design: A Multi-case Study -- 4 Step 1: Data Mesh Survey -- 5 Step 2: Deep Dive Interviews for Data Mesh Adoption -- 6 Conclusions -- References -- Distributed Representational Analysis in Support of Multi-perspective Decision-Making -- 1 Introduction -- 2 Related Work -- 3 Theoretical Perspective -- 4 Method -- 4.1 Single Case Study -- 4.2 Data Collection -- 4.3 Data Analysis -- 5 Findings -- 5.1 User -- 5.2 Distributed Functional Analysis -- 5.3 Distributed Decision Task -- 5.4 Distributed Representational Analysis -- 6 Conclusion -- References -- Digital Services and Social Media -- Mobile Application Diffusion: An Exploration of Trust and Privacy Amongst Rural Enterprises in South Africa -- 1 Introduction -- 2 Literature Review -- 2.1 Trust Concerns Among Rural Enterprises -- 2.2 Privacy Concerns Among Rural Enterprises -- 3 Methodology -- 3.1 Selection -- 3.2 Specification -- 3.3 Summarizing -- 4 Findings -- 4.1 Implications for Rural Entrepreneurs -- 4.2 Implications for Theory -- 5 Conclusion -- References -- How Can Favorite Digital Services Enhance Users' Digital Well-Being? A Qualitative Study -- 1 Introduction -- 2 Digital Services and Digital Well-Being.
3 Methodology -- 4 Findings -- 4.1 Psychological Level -- 4.2 Social Level -- 4.3 Cognitive Level -- 5 Discussion and Conclusions -- Appendix. Participants' Background Information -- References -- Utilizing Degree Centrality Measures for Product Advertisement in Social Networks -- 1 Introduction -- 2 Related Work -- 3 Centrality Measures in Social Networks -- 3.1 Graph Representation -- 3.2 Degree -- 3.3 Centrality -- 3.4 Degree Centrality -- 3.5 Closeness Centrality -- 3.6 Betweenness Centrality -- 4 Proposed Method -- 4.1 Utilizing Degree Centrality in Social Networks for Product Advertisement: A Practical Approach -- 4.2 Assumption -- 4.3 Logistic Regression -- 5 Results -- 6 Conclusions and Future Work -- References -- Innovative Research Projects -- Business Models for Mobility Data Sharing Platforms: Stakeholders' Perceptions -- 1 Introduction -- 2 Theoretical Background -- 2.1 Mobility Data Sharing -- 2.2 Business Models -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Analysis -- 4 Findings and Discussion -- 4.1 Evaluation Criteria -- 4.2 Ranking of Business Models -- 5 Conclusion -- References -- Innovation Process Integration Challenges and Their Influence on Project Management Performance in Oil and Gas Field- A Conceptual Framework Development -- 1 Introduction -- 2 Theoretical Background -- 2.1 Literature Review Background -- 2.2 Innovation Concept and Process -- 2.3 Innovation Theories and Models -- 2.4 Individual Behavior Acceptance -- 3 Research Framing -- 3.1 Theoretical Framework -- 3.2 Conceptual Framework -- 4 Discussion -- 5 Conclusion -- References -- The Role of Adaptive and Transformational Leadership in the Successful Adoption and Implementation of New Technologies and Innovations in Organizations -- 1 Introduction -- 1.1 Aim of the Research -- 1.2 Research Questions -- 2 Literature Review and Related Theories. 2.1 Transformational Leadership -- 2.2 Adaptive Leadership -- 2.3 The Unified Theory of Acceptance and Use of Technology (UTAUT) -- 3 Conceptual Model -- 4 Methodology -- 4.1 Limitations and Recommendation for Further Research -- 5 Discussion -- 6 Conclusion -- References -- Managing Information Systems -- Information and Communication Technology Enabled Collaboration: Understanding the Critical Role of Computer Collective-Efficacy -- 1 Introduction -- 2 Theory -- 2.1 Social Cognitive Theory -- 2.2 Self-efficacy -- 3 Collective Efficacy -- 3.1 Collective Efficacy Assessment -- 4 Computer Collective-Efficacy -- 4.1 Computer Collective-Efficacy - Nomological Network -- 4.2 Measuring Computer Collective-Efficacy -- 5 General Discussion -- 6 Theoretical and Practical Implications -- 6.1 Theoretical Implications -- 6.2 Practical Implications -- 7 Conclusion -- Appendix -- References -- Communication is Key: A Systematic Literature Review of Transformation Competencies -- 1 Introduction -- 2 Theoretical Background -- 2.1 Organizational Transformation -- 2.2 The Concept of Competency -- 3 Research Design -- 3.1 Systematic Literature Review -- 3.2 Identification of Transformation Competencies -- 4 Findings -- 4.1 Sample Characteristics -- 4.2 Transformation Competencies -- 5 Discussion -- 5.1 Relevance of the Topic -- 5.2 Research Focus of the Studies -- 5.3 Competency Data Sources -- 5.4 Understanding of Competencies -- 5.5 Understanding of Transformation -- 5.6 Identified Transformation Competencies -- 6 Conclusion, Limitations, and Research Agenda -- References -- Evaluating the Success of Digital Transformation Strategy in Greek SMEs -- 1 Introduction -- 2 Theoretical Background -- 2.1 IS Strategizing and Organizational Issues -- 2.2 The Role of Practice in IS Strategizing -- 2.3 IS Strategizing and Success -- 3 Methodology -- 4 Results -- 5 Discussion. 6 Conclusions -- References -- Managing IS Adoption Challenges in Emerging Technologies: A Longitudinal Case Study of Financial Management Services Automation in a Medium-Sized Enterprise -- 1 Introduction -- 2 Adopting Robotic Process Automation in Organizations -- 3 Technology Adoption and Resistance to Change -- 4 Data Gathering and Analysis -- 5 Findings -- 5.1 Fear Fades Over Time, and Resistance Becomes More of a Principle -- 5.2 Success Stories Support Positive Attitude Towards Automation -- 5.3 Adopting Several Automation Technologies Supports Overall Rate of Automation but Lowers Adoption Rate of RPA -- 5.4 Dithering with Implementations Caused by Lack of Feasible Business Cases -- 5.5 Main Challenges Culminate in a Lack of Resources -- 6 Conclusion, Recommendations, and Limitations -- Appendix A DCP2 Interviews -- Appendix B Restraints, Challenges and Accelerators of Adoption: Summary of Harmonized Open Coding Within Key-Themes in DCP2 -- References -- Factors Amplifying or Inhibiting Cyber Threat Intelligence Sharing -- 1 Introduction -- 2 Related Work -- 2.1 Overview of Cyber Threat Intelligence Sharing -- 2.2 Cyber Security Frameworks -- 2.3 Cyber Threat Intelligence Sharing Platforms -- 3 Methodology -- 3.1 Research Site -- 3.2 Data Collection -- 3.3 Data Analysis -- 4 Findings -- 4.1 Factors for Enthusiastic Cyber Threat Intelligence Sharing -- 4.2 Factors for Circumstantial Cyber Threat Intelligence Sharing -- 4.3 Factors Preventing Cyber Threat Intelligence Sharing -- 5 Discussion -- 6 Conclusion -- References -- Empirical Investigation of Practitioners' Perceptions of Agile Testing Coordination in Medical Information Systems Development -- 1 Introduction -- 2 Related Work -- 2.1 Overview of Agile Practice -- 2.2 Software Testing in Medical Information Systems Development -- 3 Method -- 3.1 Research Sites -- 3.2 Data Collection. 3.3 Data Analysis -- 4 Findings -- 4.1 Tailoring Agile Testing in Medical Information Systems Development -- 4.2 Unit Testing in Medical Information Systems Development -- 4.3 Integration Testing in Medical Information Systems Development -- 4.4 Coordination Among Testing Practitioners -- 5 Discussion -- 5.1 Practitioners' Perceptions of Agile Testing Practice in Medical Software Development (RQ1) -- 5.2 Coordination Among Practitioners to Enhance Quality Testing in Agile Software Processes (RQ2) -- 6 Conclusion -- References -- Assessing Main Factors Adopted within the EU Harmonised Online Public Engagement (EU HOPE) -- 1 Introduction -- 2 Methodology -- 3 Europe Closer to Citizens -- 3.1 Bottom-Up Approach (Intersubjective Management) -- 4 The Necessity of Harmonised Online Public Engagement (EU HOPE) -- 4.1 Digital Innovation Factors Within the EU HOPE -- 4.2 Digital Participatory Platforms (DPP) -- 4.3 Intersubjective Agreements of Actors -- 5 Single Digital Gateway, A Harmonised Cross-Border Solution -- 6 Cross-Borders Pilot Studies -- 6.1 Cross-Border Data Flow in The Digital Single Market: Study on Data Location Restrictions -- 6.2 European Experience of Citizens' Participation in Cross-Border Governance -- 6.3 Cross-Border Cooperation (CBC) in Southern Europe-A Case Study. The Eurocity Elvas-Badajoz -- 6.4 Engaging Citizens in Cohesion Policy, DG REGIO and OECD Pilot Project Final Report -- 6.5 Flanders - The Netherlands Citizens' Panel on Addressing Cross-Border Issues and Stimulating Cross- Border Contacts -- 6.6 The 23 Citizen-Based Topics for Future EU Research - Project Names: Fostering Equal Opportunities in the Digital Era -- 7 Discussion -- 8 Conclusion -- References -- How Can Innovation Systems be Sustainable? An Approach for Organizations in Times of Crises, Alongside Economic and Information Technology Issues -- 1 Introduction. 2 Research Method. |
Record Nr. | UNINA-9910847079303321 |
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|