0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (125)
  • R250 - R500 (372)
  • R500+ (2,277)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer software packages > General

Privacy Technologies and Policy - Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings... Privacy Technologies and Policy - Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings (Paperback, 2014 ed.)
Bart Preneel, Demosthenes Ikonomou
R1,899 Discovery Miles 18 990 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second Annual Privacy Forum, APF 2014, held in Athens, Greece, in May 2014. The 12 revised papers presented in this volume were carefully reviewed and selected from 21 submissions. The topics include: the concept and implementation of "privacy by design," with applications to encrypted databases; the study of video surveillance architectures and new networking concepts and innovative solutions for identity management. The papers address the technical, legal, and economic aspects of these problems.

Certification and Security in Inter-Organizational E-Services - IFIP 18th World Computer Congress, August 22-27, 2004,... Certification and Security in Inter-Organizational E-Services - IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France (Paperback, 2005 ed.)
Enrico Nardelli, Maurizio Talamo
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Certification and Security in Inter-Organizational E-Services presents the proceedings of CSES 2004 - the 2nd International Workshop on Certification and Security in Inter-Organizational E-Services held within IFIP WCC in August 2004 in Toulouse, France. Certification and security share a common technological basis in the reliable and efficient monitoring of executed and running processes; they likewise depend on the same fundamental organizational and economic principles. As the range of services managed and accessed through communication networks grows throughout society, and given the legal value that is often attached to data treated or exchanged, it is critical to be able to certify the network transactions and ensure that the integrity of the involved computer-based systems is maintained. This collection of papers documents several important developments, and offers real-life application experiences, research results and methodological proposals of direct interest to systems experts and users in governmental, industrial and academic communities.

Making Social Technologies Work - Leveraging the Power and Managing Perils of Social Technologies in Business (Paperback, 1st... Making Social Technologies Work - Leveraging the Power and Managing Perils of Social Technologies in Business (Paperback, 1st ed. 2015)
Ronan Gruenbaum
R796 Discovery Miles 7 960 Ships in 18 - 22 working days

Embracing social media at work is not just a corporate page on Facebook or a blog from the CEO. It is about understanding all the opportunities where social media activities could improve your company from marketing to operations. A practical guide for managers and an informative window into the world of social media in business.

Privacy Technologies and Policy - First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected... Privacy Technologies and Policy - First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers (Paperback, 2014 ed.)
Bart Preneel, Demosthenes Ikonomou
R1,849 Discovery Miles 18 490 Ships in 18 - 22 working days

This book constitutes revised selected papers from the First Annual Privacy Forum, APF 2012, held in Limassol, Cyprus, in October 2012. The 13 revised papers presented in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections named: modelling; privacy by design; identity management and case studies.

Interactive Decision Aids in E-Commerce (Paperback, 2012 ed.): Jella Pfeiffer Interactive Decision Aids in E-Commerce (Paperback, 2012 ed.)
Jella Pfeiffer
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book gives recommendations on which interactive decision aids to offer in webstores. Interactive decision aids are tools that help online shoppers to compare and evaluate product information. Consumers can, for instance, exclude products that do not meet certain criteria, they can highlight certain information or they can assign ratings of different kinds. Interactive decision aids are important, because finding the preferred product in a short amount of time increases both the customers' satisfaction and, in turn, the sales volume.This book includes a detailed description of decision aids, closely studies how decision aids are related to the decision behavior of customers, and develops a comprehensive system of decision aids, which is very flexible, increases both customer satisfaction and confidence, and can be used intuitively. The close link between typical behaviors and the decision aids allows webstores to learn about customers' decision-making behavior by using a simple click stream analysis. The book is written in an easy-to-read style and provides both practical recommendations and knowledge about consumer behavior

Cybercrimes: A Multidisciplinary Analysis (Paperback, 2011 ed.): Sumit Ghosh, Elliot Turrini Cybercrimes: A Multidisciplinary Analysis (Paperback, 2011 ed.)
Sumit Ghosh, Elliot Turrini
R5,181 Discovery Miles 51 810 Ships in 18 - 22 working days

Designed to serve as a reference work for practitioners, academics, and scholars worldwide, this book is the first of its kind to explain complex cybercrimes from the perspectives of multiple disciplines (computer science, law, economics, psychology, etc.) and scientifically analyze their impact on individuals, society, and nations holistically and comprehensively. In particular, the book shows: How multiple disciplines concurrently bring out the complex, subtle, and elusive nature of cybercrimes How cybercrimes will affect every human endeavor, at the level of individuals, societies, and nations How to legislate proactive cyberlaws, building on a fundamental grasp of computers and networking, and stop reacting to every new cyberattack How conventional laws and traditional thinking fall short in protecting us from cybercrimes How we may be able to transform the destructive potential of cybercrimes into amazing innovations in cyberspace that can lead to explosive technological growth and prosperity

Practical Studies in E-Government - Best Practices from Around the World (Paperback, 2011 ed.): Said Assar, Imed Boughzala,... Practical Studies in E-Government - Best Practices from Around the World (Paperback, 2011 ed.)
Said Assar, Imed Boughzala, Isabelle Boydens
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Information and communication technology (ICT) is permeating all aspects of service management; in the public sector, ICT is improving the capacity of government agencies to provide a wide array of innovative services that benefit citizens. E-Government is emerging as a multidisciplinary field of research based initially on empirical insights from practice. Efforts to theoretically anchor the field have opened perspectives from multiple research domains, as demonstrated in Practical Studies in E-Government. In this volume, the editors and contributors consider the evolution of the e-government field from both practical and research perspectives. Featuring in-depth case studies of initiatives in eight countries, the book deals with such technology-oriented issues as interoperability, prototyping, data quality, and advanced interfaces, and management-oriented issues as e-procurement, e-identification, election results verification, and information privacy. The book features best practices, tools for measuring and improving performance, and analytical methods for researchers.

ICT Critical Infrastructures and Society - 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012,... ICT Critical Infrastructures and Society - 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, The Netherlands, September 27-28, 2012, Proceedings (Paperback, 2012 ed.)
Magda David Hercheui, Diane Whitehouse, William McIver Jr, Jackie Phahlamohlaka
R2,684 Discovery Miles 26 840 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, held in Amsterdam, The Netherlands, in September 2012. The 37 revised full papers presented were carefully reviewed and selected for inclusion in the volume. The papers are organized in topical sections on national and international policies, sustainable and responsible innovation, ICT for peace and war, and citizens' involvement, citizens' rights and ICT.

Digital Transformation 2021 - 10 capabilities your organisation should master-and 3 you need (Hardcover): Pernille Kraemmergaard Digital Transformation 2021 - 10 capabilities your organisation should master-and 3 you need (Hardcover)
Pernille Kraemmergaard
R1,241 Discovery Miles 12 410 Ships in 9 - 17 working days

Digital and technological development requires new ways of thinking, and it is the capability to adapt and seek better solutions for customers and citizens that are central. Not the technologies themselves.'Digital transformation - 10 capabilities your organisation should master-and 3 you need' reviews how companies and organisations increase their digital maturity and organise themselves so that they can effortlessly apply the technologies to both optimise the existing and create radically new ones-always with the customer's and citizen's needs in mind in an everchanging competitive landscape. . Pernille Kraemmergaard uses her more than 25 years of academic research, as well as leading international research and practical experience from hundreds of courses and workshops with private companies and public organisations in this book, which is intended as a user manual for managers at all levels. The book contains lots of examples, and each chapter offers actionable advice on areas of which leaders must be aware; which questions to ask themselves; and how to engage with colleagues, including IT, when working to digitally transform their organisations. . The book was first published in Denmark mid-2019 and has since been used in numerous workshops for board of directors, executives, and managers from larger private and public organisations as well as SMEs. The book has featured as part of the curriculum in graduate, masters, and executive education programs. As Denmark ranks in the top on EU's Digital Economy and Society Index 2020 and in UN's e-government survey 2020, the book also represents a unique contribution from a high-maturity, digital society. . To complement the book, Pernille Kraemmergaard has developed a unique web-based dialogue tool, built on the theoretical frameworks introduced in the book, allowing leaders to assess their own organisation in detail and start work to advance their digital maturity. The tool can be found at www.dinst.dk/en/dialogue-tools/

Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings (Paperback,... Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings (Paperback, 2013 ed.)
Willy Susilo, Reza Reyhanitabar
R1,425 Discovery Miles 14 250 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption.

Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany,... Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings (Paperback, 2013 ed.)
Konrad Rieck, Patrick Stewin, Jean-Pierre Seifert
R1,828 Discovery Miles 18 280 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.

Algorithmic Game Theory - 7th International Symposium, SAGT 2014, Haifa, Israel, September 30 -- October 2, 2014, Proceedings... Algorithmic Game Theory - 7th International Symposium, SAGT 2014, Haifa, Israel, September 30 -- October 2, 2014, Proceedings (Paperback, 2014 ed.)
Ron Lavi
R2,185 Discovery Miles 21 850 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Symposium on Algorithmic Game Theory, SAGT 2014, held in Haifa, Israel, in October 2014. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 65 submissions. They cover various important aspects of algorithmic game theory, such as matching theory, game dynamics, games of coordination, networks and social choice, markets and auctions, price of anarchy, computational aspects of games, mechanism design and auctions.

Information Systems: People, Organizations, Institutions, and Technologies - ItAIS:The Italian Association for Information... Information Systems: People, Organizations, Institutions, and Technologies - ItAIS:The Italian Association for Information Systems (Paperback, 2010 ed.)
Alessandro D'Atri, Domenico Sacca
R4,095 Discovery Miles 40 950 Ships in 18 - 22 working days

1 2 D. Avison andS. Conger Wewerehonoredtobeaskedtoopenthe5thConferenceoftheItalianChapterof theAssociationforInformationSystems(ItAIS)inPariswhichtookplaceovertwo daysinDecember2008. Thegoalofthechapteristopromotetheexchangeof ideas,experiences,andknowledgeamongscholarsandprofessionalsengagedin thedevelopment,management,anduseofinformationandcommunicationss- temsandtechnology. Thisconferencewasoneofaround30conferences,consortia andworkshopsthattookplaceimmediatelybeforetheInternationalConferencein InformationSystems(ICIS2008). AsPresidentoftheAISandtheVice-PresidentAISforChaptersandSpecial InterestGroups,wewereparticularlydelightedtoparticipateastheItalianChapter oftheAIShasprovensosuccessful. Howeverwewerenotreadyfortheexcellent attendance and outstanding presentations that are re?ected in this volume that represents the best of the conference. Further, the conference highlighted both researchandpractice. Toooften,conferencesinISdonotevidencetheimpactof research on practice. The conference chairs, Alessandro D'Atri and Domenico ' Sacca,alongwiththeorganizingandprogramcommittees,deserveourgratitude forthesuccessoftheeventandtheexcellenceofthisvolume. TheconferencetracksthatincludedE-ServicesinPublicandPrivateSectors, Governance,MetricsandEconomicsofIT,InformationandKnowledgeMana- ment,ISDevelopmentandDesignMethodologies,ISTheoryandResearchMe- odologies,LegalandethicalaspectsofIS,NewthemesandfrontiersinISStudies, Organizational change and Impact of IT, Human Computer Interaction and the StrategicroleofIS,notonlyprovideacrosssectionofItalianresearchinISbut researchinISmoregenerally. Itiscommonthatourresearchinformsourcla- rooms,andifthisconferenceisanyevidence,ItalianITprogramsshould?ourish. ItisimportantfortheAISthatregionalandcountrygroupsarefosteredandgrow asthishelpstoensurethatthedisciplinedevelopsnewideasandisin?uencedby diverseresearchandscholarshipcontributions. TheItalianchapterisamodelfor 1 PresidentoftheAIS2008-2009,ESSECBusinessSchool,France,avi-son@essec. fr 2 AISVicePresidentSIGsandChapters2007-2010,UniversityofDallas,USA,sconger@aol. com v vi Foreword chaptersuccessandwehopetheItalianchaptercanhelpleadthewayindeveloping regionalgroupsaswell. Inexaminingthisvolume,thereadermightaskwhether thereissomethingdifferentaboutItalianresearchand,moregenerally,research fromtheMediterraneanarea(thereisafourthMediterraneanConferenceinInf- mationSystems(MCIS)inAthensinOctober2009). Thisvolumeofpapersisa goodplacetostartansweringthatquestion. Contents Introduction...1 AlessandroD'1 2 D. Avison andS. Conger Wewerehonoredtobeaskedtoopenthe5thConferenceoftheItalianChapterof theAssociationforInformationSystems(ItAIS)inPariswhichtookplaceovertwo daysinDecember2008. Thegoalofthechapteristopromotetheexchangeof ideas,experiences,andknowledgeamongscholarsandprofessionalsengagedin thedevelopment,management,anduseofinformationandcommunicationss- temsandtechnology. Thisconferencewasoneofaround30conferences,consortia andworkshopsthattookplaceimmediatelybeforetheInternationalConferencein InformationSystems(ICIS2008). AsPresidentoftheAISandtheVice-PresidentAISforChaptersandSpecial InterestGroups,wewereparticularlydelightedtoparticipateastheItalianChapter oftheAIShasprovensosuccessful. Howeverwewerenotreadyfortheexcellent attendance and outstanding presentations that are re?ected in this volume that represents the best of the conference. Further, the conference highlighted both researchandpractice. Toooften,conferencesinISdonotevidencetheimpactof research on practice. The conference chairs, Alessandro D'Atri and Domenico ' Sacca,alongwiththeorganizingandprogramcommittees,deserveourgratitude forthesuccessoftheeventandtheexcellenceofthisvolume. TheconferencetracksthatincludedE-ServicesinPublicandPrivateSectors, Governance,MetricsandEconomicsofIT,InformationandKnowledgeMana- ment,ISDevelopmentandDesignMethodologies,ISTheoryandResearchMe- odologies,LegalandethicalaspectsofIS,NewthemesandfrontiersinISStudies, Organizational change and Impact of IT, Human Computer Interaction and the StrategicroleofIS,notonlyprovideacrosssectionofItalianresearchinISbut researchinISmoregenerally. Itiscommonthatourresearchinformsourcla- rooms,andifthisconferenceisanyevidence,ItalianITprogramsshould?ourish. ItisimportantfortheAISthatregionalandcountrygroupsarefosteredandgrow asthishelpstoensurethatthedisciplinedevelopsnewideasandisin?uencedby diverseresearchandscholarshipcontributions. TheItalianchapterisamodelfor 1 PresidentoftheAIS2008-2009,ESSECBusinessSchool,France,avi-son@essec. fr 2 AISVicePresidentSIGsandChapters2007-2010,UniversityofDallas,USA,sconger@aol. com v vi Foreword chaptersuccessandwehopetheItalianchaptercanhelpleadthewayindeveloping regionalgroupsaswell. Inexaminingthisvolume,thereadermightaskwhether thereissomethingdifferentaboutItalianresearchand,moregenerally,research fromtheMediterraneanarea(thereisafourthMediterraneanConferenceinInf- mationSystems(MCIS)inAthensinOctober2009). Thisvolumeofpapersisa goodplacetostartansweringthatquestion. Contents Introduction...1 AlessandroD'AtriandDomenicoSacca' PartI E-ServicesinPublicandPrivateSectors InformationTechnology,MarketingandOrganizationalFactor inCorporatee-banking:AQualitativeResearch ...7 DanielaPettinao TheRoleofCustomerInvolvementinLibraryE?services ...15 AdaScupolaandHanneWesthNicolajsen TechnologyasaToolofTransformation:e-Cities andtheRuleofLaw ...23 JohnM. EgerandAndreaMaggipinto UserRealitiesandtheFutureofe-governmentServices ...31 KonstadinosKutsikosandGerasimosKontos TheUseofWebServicesforInclusiveDecisionProcess: TowardstheEnhancementofe-Democracy ...39 FrancescaCabiddu TheChallengesofe-governmentEvaluation ...49 MaddalenaSorrentino IntegrationofDifferentOrganizationsandStakeholders inE-servicesDesignandImplementation:theCase oftheSpiderCard ...5 7 MariaChiaraDiGuardoandIoneZuccarello vii viii Contents B2GElectronicInvoicingasEnforcedHighImpact Service:OpenIssues...65 PietroLucaAgostiniandRaffaellaNaggi NetworkOutcomeasTriggerfortheEvolutionofaDesign Network:CoordinationProcessesBetweenActors andObjects...73 FrancescoBoliciandFrancescoVirili GovernanceandOrganizationalAspectsofanExperimental GroupwareintheItalianPublicAdministrationtoSupport Multi-InstitutionalPartnerships...81 NunzioCasalinoandMauroDraoli BusinessProcessModellingWithintheCycleofContinuous Improvement ...91 LindaPacicco,AurelioRavarini,andFedericoPigni InformationExtractionfromMultimediaDocuments fore-GovernmentApplications...101 F. Amato,A. Mazzeo,V. Moscato,andA. Picariello PartII Governance,MetricsandEconomicsofIT OperationsStrategyofSmallSoftwareFirmsUsingOpen SourceSoftware...111 BernhardGlatt,AlbertoSillitti,andGiancarloSucci ITValueinPublicAdministrations:AModelProposal fore-Procurement ...121 AlessioMariaBracciniandTommasoFederici ValueAssessmentofEnterpriseContentManagement Systems:AProcess-OrientedApproach ...131 J. vomBrocke,A. Simons,C. Sonnenberg,P. L. Agostini,andA. Zardini AMaintenanceMetricModelforOpenSourceGovernance ...1 39 PasqualeArdimento,GiovanniBruno,DaniloCaivano,andMartaCimitile KeyPerformanceIndicatorstoRelateKnowledge GovernancewithKnowledgeProcess ...147 P. Ardimento,M. T. Baldassarre,M. Cimitile,andG. Mastelloni Contents ix MeasuringDataQualityWhenApplyingDataSwappingand Perturbation...157 G. CanforaandC. A. Visaggio VirtualEnterpriseTransactions:ACostModel ...165 A. D'1 2 D. Avison andS. Conger Wewerehonoredtobeaskedtoopenthe5thConferenceoftheItalianChapterof theAssociationforInformationSystems(ItAIS)inPariswhichtookplaceovertwo daysinDecember2008. Thegoalofthechapteristopromotetheexchangeof ideas,experiences,andknowledgeamongscholarsandprofessionalsengagedin thedevelopment,management,anduseofinformationandcommunicationss- temsandtechnology. Thisconferencewasoneofaround30conferences,consortia andworkshopsthattookplaceimmediatelybeforetheInternationalConferencein InformationSystems(ICIS2008). AsPresidentoftheAISandtheVice-PresidentAISforChaptersandSpecial InterestGroups,wewereparticularlydelightedtoparticipateastheItalianChapter oftheAIShasprovensosuccessful. Howeverwewerenotreadyfortheexcellent attendance and outstanding presentations that are re?ected in this volume that represents the best of the conference. Further, the conference highlighted both researchandpractice. Toooften,conferencesinISdonotevidencetheimpactof research on practice. The conference chairs, Alessandro D'Atri and Domenico ' Sacca,alongwiththeorganizingandprogramcommittees,deserveourgratitude forthesuccessoftheeventandtheexcellenceofthisvolume. TheconferencetracksthatincludedE-ServicesinPublicandPrivateSectors, Governance,MetricsandEconomicsofIT,InformationandKnowledgeMana- ment,ISDevelopmentandDesignMethodologies,ISTheoryandResearchMe- odologies,LegalandethicalaspectsofIS,NewthemesandfrontiersinISStudies, Organizational change and Impact of IT, Human Computer Interaction and the StrategicroleofIS,notonlyprovideacrosssectionofItalianresearchinISbut researchinISmoregenerally. Itiscommonthatourresearchinformsourcla- rooms,andifthisconferenceisanyevidence,ItalianITprogramsshould?ourish. ItisimportantfortheAISthatregionalandcountrygroupsarefosteredandgrow asthishelpstoensurethatthedisciplinedevelopsnewideasandisin?uencedby diverseresearchandscholarshipcontributions. TheItalianchapterisamodelfor 1 PresidentoftheAIS2008-2009,ESSECBusinessSchool,France,avi-son@essec. fr 2 AISVicePresidentSIGsandChapters2007-2010,UniversityofDallas,USA,sconger@aol. com v vi Foreword chaptersuccessandwehopetheItalianchaptercanhelpleadthewayindeveloping regionalgroupsaswell. Inexaminingthisvolume,thereadermightaskwhether thereissomethingdifferentaboutItalianresearchand,moregenerally,research fromtheMediterraneanarea(thereisafourthMediterraneanConferenceinInf- mationSystems(MCIS)inAthensinOctober2009). Thisvolumeofpapersisa goodplacetostartansweringthatquestion. Contents Introduction...1 AlessandroD'AtriandDomenicoSacca' PartI E-ServicesinPublicandPrivateSectors InformationTechnology,MarketingandOrganizationalFactor inCorporatee-banking:AQualitativeResearch ...7 DanielaPettinao TheRoleofCustomerInvolvementinLibraryE?services ...15 AdaScupolaandHanneWesthNicolajsen TechnologyasaToolofTransformation:e-Cities andtheRuleofLaw ...23 JohnM. EgerandAndreaMaggipinto UserRealitiesandtheFutureofe-governmentServices ...31 KonstadinosKutsikosandGerasimosKontos TheUseofWebServicesforInclusiveDecisionProcess: TowardstheEnhancementofe-Democracy ...39 FrancescaCabiddu TheChallengesofe-governmentEvaluation ...49 MaddalenaSorrentino IntegrationofDifferentOrganizationsandStakeholders inE-servicesDesignandImplementation:theCase oftheSpiderCard ...5 7 MariaChiaraDiGuardoandIoneZuccarello vii viii Contents B2GElectronicInvoicingasEnforcedHighImpact Service:OpenIssues...65 PietroLucaAgostiniandRaffaellaNaggi NetworkOutcomeasTriggerfortheEvolutionofaDesign Network:CoordinationProcessesBetweenActors andObjects...73 FrancescoBoliciandFrancescoVirili GovernanceandOrganizationalAspectsofanExperimental GroupwareintheItalianPublicAdministrationtoSupport Multi-InstitutionalPartnerships...81 NunzioCasalinoandMauroDraoli BusinessProcessModellingWithintheCycleofContinuous Improvement ...91 LindaPacicco,AurelioRavarini,andFedericoPigni InformationExtractionfromMultimediaDocuments fore-GovernmentApplications...101 F. Amato,A. Mazzeo,V. Moscato,andA. Picariello PartII Governance,MetricsandEconomicsofIT OperationsStrategyofSmallSoftwareFirmsUsingOpen SourceSoftware...111 BernhardGlatt,AlbertoSillitti,andGiancarloSucci ITValueinPublicAdministrations:AModelProposal fore-Procurement ...121 AlessioMariaBracciniandTommasoFederici ValueAssessmentofEnterpriseContentManagement Systems:AProcess-OrientedApproach ...131 J. vomBrocke,A. Simons,C. Sonnenberg,P. L. Agostini,andA. Zardini AMaintenanceMetricModelforOpenSourceGovernance ...1 39 PasqualeArdimento,GiovanniBruno,DaniloCaivano,andMartaCimitile KeyPerformanceIndicatorstoRelateKnowledge GovernancewithKnowledgeProcess ...147 P. Ardimento,M. T. Baldassarre,M. Cimitile,andG. Mastelloni Contents ix MeasuringDataQualityWhenApplyingDataSwappingand Perturbation...157 G. CanforaandC. A. Visaggio VirtualEnterpriseTransactions:ACostModel ...165 A. D'AtriandDomenicoSacca' PartI E-ServicesinPublicandPrivateSectors InformationTechnology,MarketingandOrganizationalFactor inCorporatee-banking:AQualitativeResearch ...7 DanielaPettinao TheRoleofCustomerInvolvementinLibraryE?services ...15 AdaScupolaandHanneWesthNicolajsen TechnologyasaToolofTransformation:e-Cities andtheRuleofLaw ...23 JohnM. EgerandAndreaMaggipinto UserRealitiesandtheFutureofe-governmentServices ...31 KonstadinosKutsikosandGerasimosKontos TheUseofWebServicesforInclusiveDecisionProcess: TowardstheEnhancementofe-Democracy ...39 FrancescaCabiddu TheChallengesofe-governmentEvaluation ...49 MaddalenaSorrentino IntegrationofDifferentOrganizationsandStakeholders inE-servicesDesignandImplementation:theCase oftheSpiderCard ...5 7 MariaChiaraDiGuardoandIoneZuccarello vii viii Contents B2GElectronicInvoicingasEnforcedHighImpact Service:OpenIssues...65 PietroLucaAgostiniandRaffaellaNaggi NetworkOutcomeasTriggerfortheEvolutionofaDesign Network:CoordinationProcessesBetweenActors andObjects...73 FrancescoBoliciandFrancescoVirili GovernanceandOrganizationalAspectsofanExperimental GroupwareintheItalianPublicAdministrationtoSupport Multi-InstitutionalPartnerships...81 NunzioCasalinoandMauroDraoli BusinessProcessModellingWithintheCycleofContinuous Improvement ...91 LindaPacicco,AurelioRavarini,andFedericoPigni InformationExtractionfromMultimediaDocuments fore-GovernmentApplications...101 F. Amato,A. Mazzeo,V. Moscato,andA. Picariello PartII Governance,MetricsandEconomicsofIT OperationsStrategyofSmallSoftwareFirmsUsingOpen SourceSoftware...111 BernhardGlatt,AlbertoSillitti,andGiancarloSucci ITValueinPublicAdministrations:AModelProposal fore-Procurement ...121 AlessioMariaBracciniandTommasoFederici ValueAssessmentofEnterpriseContentManagement Systems:AProcess-OrientedApproach ...131 J. vomBrocke,A. Simons,C. Sonnenberg,P. L. Agostini,andA. Zardini AMaintenanceMetricModelforOpenSourceGovernance ...1 39 PasqualeArdimento,GiovanniBruno,DaniloCaivano,andMartaCimitile KeyPerformanceIndicatorstoRelateKnowledge GovernancewithKnowledgeProcess ...147 P. Ardimento,M. T. Baldassarre,M. Cimitile,andG. Mastelloni Contents ix MeasuringDataQualityWhenApplyingDataSwappingand Perturbation...157 G. CanforaandC. A. Visaggio VirtualEnterpriseTransactions:ACostModel ...165 A. D'AtriandA. Motro PartIII InformationandKnowledgeManagement EffectiveStorageofSemanticWebData...177 RobertoDeVirgilio,PierluigiDelNostro,GiorgioGianforme, StefanoPaolozzi,andRiccardoTorlone AReferenceArchitectureforSemanticKnowledge Coordination ...185 S. Castano,A. Ferrara,andS. Montanelli Service-BasedNetworkedCollaboration...195 DevisBianchini,ValeriaDeAntonellis,andMicheleMelchiori HowtoExploitDataMiningWithoutBecomingAwareofit ...203 N. Ciaramella,andA. Albano AMethodologicalApproachtoEnableCooperative ProcessDesignThroughWebServices...211 D. Bianchini,C. Cappiello,V. DeAntonellis,andB. Pernici TowardanEffectiveandEf?cientQueryProcessing intheNeP4BProject ...

The RFID Roadmap: The Next Steps for Europe (Hardcover, 2008 ed.): Gerd Wolfram, Birgit Gampl, Peter Gabriel The RFID Roadmap: The Next Steps for Europe (Hardcover, 2008 ed.)
Gerd Wolfram, Birgit Gampl, Peter Gabriel
R2,663 Discovery Miles 26 630 Ships in 18 - 22 working days

RFID is a key technology for Europe. Today there is a noticeable shift away from the days of RFID pilot projects, and towards a time where organisations are looking to RFID to drive efficiency and innovation. Although Europe is a leading player in the world of RFID technology, several challenges which are preventing RFID from reaching its full potential need to be addressed.

To further the advancement of this technology, coordinated European efforts need to be promoted, specifically in the areas of standardisation, user guidelines, legislation, technology development, and research and development. These themes have been analysed, and clear recommendations have been derived, stating what the different RFID stakeholders can do to support the technology. This book is aimed at decision makers in all fields of society, e.g. in companies, politics, business associations, etc.

The publication is a summary of the results of the coordination action CE RFID - "Coordinating European Efforts in the RFID Value Chain" - and is a network of European RFID technology providers, vendors and end users. It aims at promoting the use of RFID technology and supporting further development. The project was funded by the European Commission under the 6th Framework Programme.

Digital Communities in a Networked Society - e-Commerce, e-Business and e-Government (Paperback, Softcover reprint of the... Digital Communities in a Networked Society - e-Commerce, e-Business and e-Government (Paperback, Softcover reprint of the original 1st ed. 2004)
Manuel J. Mendes, Reima Suomi, Carlos Passos
R2,702 Discovery Miles 27 020 Ships in 18 - 22 working days

Digital Communities in a Networked Society: e-Commerce, e-Business and e-Government deals with the accelerating evolution in the computerization of society. This evolution, or should we call it a revolution, is dominantly driven by the Internet, and documented by the novelties introduced, year by year, by Information and Communication Technologies. The book contains recent results of research and development in the areas of: -E-government, -Business models of e-applications, -Innovative structures in the internet, -Auctions and e-payment, -Future aspects of communication, -Internet and the web, -Advanced platforms and grid computing, -Cooperation and integration, -Modeling and construction of e-services.

Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings... Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings (Paperback, 2014 ed.)
Sjouke Mauw, Christian Damsgaard Jensen
R1,941 Discovery Miles 19 410 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014. The 11 revised full papers were carefully reviewed and selected from 29 submissions and cover topics as access control, data protection, digital rights, security and trust policies, security and trust in social networks.

Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security... Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium (Paperback, Softcover reprint of the original 1st ed. 2002)
Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
R3,991 Discovery Miles 39 910 Ships in 18 - 22 working days

The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP),focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government,...Themoreour societyrelies on electronicforms ofcommunication,themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence,researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines,organisationsandcountries,todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering,mobileagentsecurity,e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies,one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion,and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website:http://www.ifip.at.org/. Finally,wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers,whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety,willprovea drivingforce for futureconferencestocome.

Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014,... Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014, Proceedings (Paperback, 2014 ed.)
Emiliano De Cristofaro, Steven J. Murdoch
R2,269 Discovery Miles 22 690 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Symposium on Privacy Enhancing Technologies, PETS 2014, held in Amsterdam, The Netherlands, in July 2014.The 16 full papers presented were carefully selected from 86 submissions. Topics addressed by the papers published in these proceedings include study of privacy erosion, designs of privacy-preserving systems, censorship resistance, social networks and location privacy."

Mobile Web Information Systems - 11th International Conference, MobiWIS 2014, Barcelona, Spain, August 27-29, 2014. Proceedings... Mobile Web Information Systems - 11th International Conference, MobiWIS 2014, Barcelona, Spain, August 27-29, 2014. Proceedings (Paperback, 2014 ed.)
Irfan Awan, Muhammad Younas, Xavier Franch, Carme Quer
R2,227 Discovery Miles 22 270 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Conference on Mobile Web and Information Systems, MobiWIS 2014, held in Barcelona, Spain, in August 2014. The 24 papers presented were carefully reviewed and selected from 75 submissions and cover topics such as: mobile software systems, middleware/SOA for mobile systems, context- and location-aware services, data management in the mobile web, mobile cloud services, mobile web of things, mobile web security, trust and privacy, mobile networks, protocols and applications, mobile commerce and business services, HCI in mobile applications, social media, and adaptive approaches for mobile computing.

Mobile Computing - Implementing Pervasive Information and Communications Technologies (Paperback, Softcover reprint of the... Mobile Computing - Implementing Pervasive Information and Communications Technologies (Paperback, Softcover reprint of the original 1st ed. 2002)
Shambhu Upadhyaya, Abhijit Chaudhury, Kevin Kwiat, Mark Weiser
R2,637 Discovery Miles 26 370 Ships in 18 - 22 working days

Mobil Computing: Implementing Pervasive Information and Communication Technologies is designed to address some of the business and technical challenges of pervasive computing that encompass current and emerging technology standards, infrastructures and architectures, and innovative and high impact applications of mobile technologies in virtual enterprises. The various articles examine a host of issues including: the challenges and current solutions in mobile connectivity and coordination; management infrastructures; innovative architectures for fourth generation wireless and Ad-hoc networks; error-free frequency assignments for wireless communication; cost-effective wavelength assignments in optical communication networks; data and transaction modeling in a mobile environment, and bandwidth issues and data routing in mobile Ad-hoc networks.

Frontiers in Internet Technologies - Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China. Revised Selected... Frontiers in Internet Technologies - Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China. Revised Selected Papers (Paperback, 2013 ed.)
Jinshu Su, Zhigang Sun, Baokang Zhao, Xiaofeng Wang, Fei Wang
R2,132 Discovery Miles 21 320 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second CCF Internet Conference of China, ICoC 2013, held in Zhangjiajie, China, in July 2013. The 24 revised full papers presented were carefully reviewed and selected from 63 submissions. The papers address issues such as future Internet architecture, Internet routing, network security, network management, data center networks, green networks, wireless networks, P2P networks, mobile Internet and the Internet of Things.

Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences... Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013, Proceedings (Paperback, 2013 ed.)
David Basin, John C. Mitchell
R1,411 Discovery Miles 14 110 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume were carefully reviewed and selected from 59 submissions. They deal with the theoretical and foundational aspects of security and trust such as new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems.

Agile Transformation - Using the Integral Agile Transformation Framework to Think and Lead Differently (Paperback): Michael... Agile Transformation - Using the Integral Agile Transformation Framework to Think and Lead Differently (Paperback)
Michael Spayd, Michele Madore
R712 Discovery Miles 7 120 Ships in 10 - 15 working days

Lead Agile Transformations that Scale and Succeed across the Entire Organization Most organizational leaders know agility is paramount to survival in a world of unprecedented volatility, uncertainty, complexity, and ambiguity (VUCA). This is why so many keep attempting Agile transformations even after previous initiatives have failed. But the truth is, both organizations and leaders need new ways of thinking--they need to upgrade their organizational "operating system." Built on the proven Integral Agile Transformation Framework (TM) (IATF), Agile Transformation offers a fresh perspective and systemic approach that can operate on all levels, from individual to enterprise. Learn how to use IATF to combine what you know subjectively ("heart") with what you can measure objectively ("data"). Even if you are already using leadership or culture models, scaled frameworks, or other techniques, IATF helps you place them in context, overcome their limitations, and gain more value from them. As it has in many other organizations, IATF can help you become an authentic Transformational Leader and finally build an organization that is truly Agile. Gain crucial new perspective for leading your Agile transformation: insight into your world, organization, work, and yourself Understand what your current Agile methods do and don't do, how they interact or conflict, and where you need something more Structure existing models and frameworks into an understandable meta-framework Master a unified and practical system for mapping what's going on and what needs to change Discover practical ways to successfully lead both human and organizational aspects of change Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Web Information Systems and Technologies - 8th International Conference, WEBIST 2012, Porto, Portugal, April 18-21, 2012,... Web Information Systems and Technologies - 8th International Conference, WEBIST 2012, Porto, Portugal, April 18-21, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Jose Cordeiro, Karl-Heinz Krempels
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

This book contains the thoroughly refereed and revised best papers from the 8th International Conference on Web Information Systems and Technologies, WEBIST 2012, held in Porto, Portugal, in April 2012, and organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), in collaboration with ACM SIGMIS.

The 23 papers presented in this book were carefully reviewed and selected from 184 submissions. The papers were selected from those with the best reviews also taking into account the quality of their presentation at the conference. The papers are grouped into parts on Internet Technology; Web Interfaces and Applications; Society, e-Business, and e-Government; Web Intelligence; and Mobile Information Systems.

Topics in Cryptology - CT- RSA 2013 - The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25-... Topics in Cryptology - CT- RSA 2013 - The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings (Paperback, 2013 ed.)
Ed Dawson
R1,441 Discovery Miles 14 410 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Affiliate Marketing for Beginners - 12…
Smm Publishing Hardcover R579 R528 Discovery Miles 5 280
Pedagogy, Presence, and Motivation in…
Aaron Michael Perez, ?Enol Orakc? Hardcover R5,333 Discovery Miles 53 330
College Technology Survival Kit
Marianne Daugharthy, Alanna Duley Paperback R4,449 R3,786 Discovery Miles 37 860
Influencer Secrets - How to Build Your…
Smm Publishing Hardcover R540 R499 Discovery Miles 4 990
E-Commerce: Business Models and Service…
Anthony Rocus Hardcover R3,282 R2,972 Discovery Miles 29 720
Java - Java Programming for beginners…
Adam Dodson Hardcover R549 R503 Discovery Miles 5 030
The Practice of Enterprise Architecture…
Svyatoslav Kotusev Hardcover R1,571 Discovery Miles 15 710
Ready, Set, Growth hack - A beginners…
Nader Sabry Hardcover R676 R605 Discovery Miles 6 050
Pedagogical Creativity, Culture…
Ambika Gopal Raj Hardcover R6,170 Discovery Miles 61 700
Current Trends in Cybersecurity and…
Remberto Jimenez, Veronica E O'Neill Hardcover R6,810 Discovery Miles 68 100

 

Partners