Browse Results

Showing 25,626 through 25,650 of 53,836 results

Information Systems Reengineering, Integration and Normalization

by Joseph Shi Piu Fong

Taking a very practical approach, the author describes in detail database conversion techniques, reverse engineering, forward engineering and re-engineering methodologies for information systems, offering a systematic software engineering approach for reusing existing database systems built with "old" technology. He demonstrates how the existing systems can be transformed into the new technologies with the preservation of semantic constraints and without loss of information. In this third edition, with a new chapter on Data Normalization the author shows once the databases have been converted, how to integrate them for consolidating information, and how to normalize them so that they are efficient and user friendly. Many examples, illustrations and case studies together with questions and answers ensure that the methodology is easy to follow. Ideal as a textbook for students studying information systems theories, Information Systems Reengineering Integration and Normalization will also be a valuable management reference book for Information Technology Practitioners. Additional material is available on www. extramaterials/978-3-319-12294-6

Information Systems Research: Foundations, Design and Theory

by Mohammed Ali

This textbook will delve into the philosophical foundation of contemporary IS research design with particular emphasis on the methodological tools that can be applied to conduct effective research in the multidisciplinary area of contemporary IS. What sets the book apart is that it will cover the current social paradigm shift, global changes and the need for new methodological tools, which have revolutionised the way we use IS to support our daily practices. It considers the entire methodological procedures applied to research projects that investigate or explore multifaceted areas of contemporary IS, such as information management, digital business, ICT and information science.Featuring learning objectives, case studies, assessment questions and exercises, this textbook offers a practical outline for IS research methodology that will be of use to students and researchers. It aims to satisfy researchers who are seeking literature on applying methodological procedures to their research projects that delve into the world of contemporary IS that other titles have only considered in a much broader sense.

Information Systems Research in Vietnam: A Shared Vision and New Frontiers

by Nguyen Hoang Thuan Duy Dang-Pham Hoanh-Su Le Tuan Q. Phan

This book provides a collection of advanced information systems research, cases and applications in the context of Vietnam, presented by experienced researchers in the field. It provides a comprehensive overview of the field and offers access to practical information systems applications, serving as a guide to comparing the context. Readers can also compare the context of information systems applications in Vietnam as a developing country against the context in developed countries. The book contributes to the body of knowledge in several ways. It provides comprehensive references for information systems research, promotes the recent progress in its applications in Vietnam and offers a shared understanding to serve as a blueprint for future research. From a practical point of view, the book helps organisations/companies in Vietnam to keep up with information systems cases, studies and applications.

Information Systems Research in Vietnam, Volume 2: A Shared Vision and New Frontiers

by Nguyen Hoang Thuan Duy Dang-Pham Hoanh-Su Le Tuan Q. Phan

This book continues the discussion on advanced information systems research, cases, and applications in the context of Vietnam, presented by experienced researchers in the field. It provides a comprehensive overview of the field and offers access to practical information systems applications, serving as a guide to comparing the context . Readers can also compare the context of information systems applications in Vietnam as a developing country against the context in developed countries. The book contributes to the body of knowledge in several ways. It provides comprehensive references for information systems research, promotes the recent progress in its applications in Vietnam, and offers a shared understanding to serve as a blueprint for future research. From a practical point of view, the book helps organizations/companies in Vietnam to keep up with information systems cases, studies, and applications.

Information Systems Security: 18th International Conference, ICISS 2022, Tirupati, India, December 16–20, 2022, Proceedings (Lecture Notes in Computer Science #13784)

by Venkata Ramana Badarla Surya Nepal Rudrapatna K. Shyamasundar

This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16–20, 2022The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ​ostinato: cross-host attack correlation through attack activity similaritydetection; DKS-PKI: a distributed key server architecture for public keyinfrastructure;generating-set evaluation of bloom filter hardening techniques in privaterecord linkage; etc

Information Systems Security: 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings (Lecture Notes in Computer Science #11281)

by Vinod Ganapathy Trent Jaeger R. K. Shyamasundar

This book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018.The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication.

Information Systems Security

by Sushil Jajodia Chandan Mazumdar

This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security, ICISS 2015, held in Kolkata, India, in December2015. The 24revised full papers and 8 short papers presented together with 4 invited paperswere carefully reviewed and selected from 133 submissions. The papers addressthe following topics: access control; attacks and mitigation; cloud security;crypto systems and protocols; information flow control; sensor networks andcognitive radio; and watermarking and steganography.

Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings (Lecture Notes in Computer Science #12553)

by Salil Kanhere Vishwas T Patil Shamik Sural Manoj S Gaur

This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020.The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.

Information Systems Security: 19th International Conference, ICISS 2023, Raipur, India, December 16–20, 2023, Proceedings (Lecture Notes in Computer Science #14424)

by Vallipuram Muthukkumarasamy Sithu D. Sudarsan Rudrapatna K. Shyamasundar

This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICISS 2023, held in Raipur, India, during December 16–20, 2023. The 18 full papers and 10 short papers included in this book were carefully reviewed and selected from 78 submissions. They are organized in topical sections as follows: systems security, network security, security in AI/ML, privacy, cryptography, blockchains.

Information Systems Security

by Indrajit Ray Manoj Singh Gaur Mauro Conti Dheeraj Sanghi V. Kamakoti

This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security.

Information Systems Security: 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings (Lecture Notes in Computer Science #11952)

by Rudrapatna K. Shyamasundar Deepak Garg N. V. Narendra Kumar

This book constitutes the proceedings of the 15th International Conference on Information Systems Security, ICISS 2019, held in Hyderabad, India, in December 2019.The 13 revised full papers and 4 short papers presented in this book together with 4 abstracts of invited talks were carefully reviewed and selected from 63 submissions.The papers cover topics such as: smart contracts; formal techniques; access control; machine learning; distributed systems; cryptography; online social networks; images and cryptography.

Information Systems Security

by Rudrapatna K. Shyamasundar Virendra Singh Jaideep Vaidya

This book constitutes the refereed proceedings of the 13th International Conference on Information Systems Security, ICISS 2017, held in Mumbai, India, in December 2017. The 17 revised full papers and 7 short papers presented together with 2 invited papers were carefully reviewed and selected from 73 submissions. The papers address the following topics: privacy/cryptography, systems security, security analysis, identity management and access control, security attacks and detection, network security.

Information Systems Security: 17th International Conference, ICISS 2021, Patna, India, December 16–20, 2021, Proceedings (Lecture Notes in Computer Science #13146)

by Somanath Tripathy Rudrapatna K. Shyamasundar Rajiv Ranjan

This book constitutes the proceedings of the 17th International Conference on Information Systems Security, ICISS 2021, held in Patna, India, during December 16-20, 2021. The 9 regular papers, 2 short papers and 4 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 48 submissions. The papers were organized in topical sections named: attack detection, malware identification, data security in distributed systems, and applied cryptography.

Information Systems Security and Privacy

by Olivier Camp Steven Furnell Paolo Mori

Slamming the door on security threats just got easier for IT professionals. This resource on security design and operations puts tools and techniques at their command, providing the expertise on things from access control to privacy enhancement.

Information Systems Security and Privacy

by Olivier Camp Edgar Weippl Christophe Bidan Esma Aïmeur

This bookconstitutes revised selected papers from the First International Conference onInformation Systems Security and Privacy, ICISSP 2015, held in Angers, France,in February 2015. The 12papers presented in this volume were carefully reviewed and selection from atotal of 56 submissions. They were organized in topical sections named: dataand software security; privacy and confidentiality; mobile systems security; andbiometric authentication. The book also contains two invited papers.

Information Systems Security and Privacy: 6th International Conference, ICISSP 2020, Valletta, Malta, February 25–27, 2020, Revised Selected Papers (Communications in Computer and Information Science #1545)

by Steven Furnell Olivier Camp Edgar Weippl Paolo Mori

This book constitutes the revised selected papers of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, held in Valletta, Malta, in February 2020. The 11 full papers presented were carefully reviewed and selected from a total of 125 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.

Information Systems Security and Privacy: Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers (Communications in Computer and Information Science #867)

by Paolo Mori Steven Furnell Olivier Camp

This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2017, held in Porto, Portugal, in February 2017. The 13 full papers presented were carefully reviewed and selected from a total of 100 submissions. They are dealing with topics such as vulnerability analysis and countermeasures, attack patterns discovery and intrusion detection, malware classification and detection, cryptography applications, data privacy and anonymization, security policy analysis, enhanced access control, and socio-technical aspects of security.

Information Systems Security and Privacy: 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers (Communications in Computer and Information Science #977)

by Paolo Mori Steven Furnell Olivier Camp

This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018.The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services.

Information Systems Security and Privacy: 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers (Communications in Computer and Information Science #1221)

by Paolo Mori Steven Furnell Olivier Camp

This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, held in Prague, Czech Republic, in February 2019. The 19 full papers presented were carefully reviewed and selected from a total of 100 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.

Information Systems Security and Privacy: 7th International Conference, ICISSP 2021, Virtual Event, February 11–13, 2021, and 8th International Conference, ICISSP 2022, Virtual Event, February 9–11, 2022, Revised Selected Papers (Communications in Computer and Information Science #1851)

by Paolo Mori Gabriele Lenzini Steven Furnell

This book includes extended and revised versions of selected papers from the 7th and 8th edition of the International Conference on Information Systems Security and Privacy (ICISSP 2021 and ICISSP 2022). ICISSP 2021 and 2022 was held as an online event due to the Covid-19 pandemic, from February 11–13, 2021 and February 9–11, 2022. respectively.The 6 full papers included in this book were carefully reviewed and selected from 217 submissions. The ICISSP 2021 and 2022 book contains extended and revised version of proceedings papers dealing with information systems security and privacy.

Information Systems Theory: Explaining and Predicting Our Digital Society, Vol. 1

by Scott L. Schneberger Yogesh K. Dwivedi Michael R. Wade

The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. Specifically, it aims to focus on the following key objectives: To describe the various theories and models applicable to studying IS/IT management issues. To outline and describe, for each of the various theories and models, independent and dependent constructs, reference discipline/originating area, originating author(s), seminal articles, level of analysis (i.e. firm, individual, industry) and links with other theories. To provide a critical review/meta-analysis of IS/IT management articles that have used a particular theory/model.To discuss how a theory can be used to better understand how information systems can be effectively deployed in today's digital world. This book contributes to our understanding of a number of theories and models. The theoretical contribution of this book is that it analyzes and synthesizes the relevant literature in order to enhance knowledge of IS theories and models from various perspectives. To cater to the information needs of a diverse spectrum of readers, this book is structured into two volumes, with each volume further broken down into two sections. The first section of Volume 1 presents detailed descriptions of a set of theories centered around the IS lifecycle, including the Success Model, Technology Acceptance Model, User Resistance Theories, and four others. The second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, Portfolio Theory, Discrepancy Theory Models, and eleven others. The first section of Volume 2 concerns socio-psychological theories. These include Personal Construct Theory, Psychological Ownership, Transactive Memory, Language-Action Approach, and nine others. The second section of Volume 2 deals with methodological theories, including Critical Realism, Grounded Theory, Narrative Inquiry, Work System Method, and four others. Together, these theories provide a rich tapestry of knowledge around the use of theory in IS research. Since most of these theories are from contributing disciplines, they provide a window into the world of external thought leadership.

Information Systems Theory, Explaining and Predicting Our Digital Society, Vol. 2

by Yogesh K. Dwivedi Michael R. Wade Scott L. Schneberger

The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. Specifically, it aims to focus on the following key objectives: To describe the various theories and models applicable to studying IS/IT management issues. To outline and describe, for each of the various theories and models, independent and dependent constructs, reference discipline/originating area, originating author(s), seminal articles, level of analysis (i.e. firm, individual, industry) and links with other theories. To provide a critical review/meta-analysis of IS/IT management articles that have used a particular theory/model.To discuss how a theory can be used to better understand how information systems can be effectively deployed in today's digital world. This book contributes to our understanding of a number of theories and models. The theoretical contribution of this book is that it analyzes and synthesizes the relevant literature in order to enhance knowledge of IS theories and models from various perspectives. To cater to the information needs of a diverse spectrum of readers, this book is structured into two volumes, with each volume further broken down into two sections. The first section of Volume 1 presents detailed descriptions of a set of theories centered around the IS lifecycle, including the Success Model, Technology Acceptance Model, User Resistance Theories, and four others. The second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, Portfolio Theory, Discrepancy Theory Models, and eleven others. The first section of Volume 2 concerns socio-psychological theories. These include Personal Construct Theory, Psychological Ownership, Transactive Memory, Language-Action Approach, and nine others. The second section of Volume 2 deals with methodological theories, including Critical Realism, Grounded Theory, Narrative Inquiry, Work System Method, and four others. Together, these theories provide a rich tapestry of knowledge around the use of theory in IS research. Since most of these theories are from contributing disciplines, they provide a window into the world of external thought leadership.

Information Technologies: Teaching to Use—Using to Teach

by Frank B Raymond Iii Leon Ginsberg Debra Gohagan

This insightful volume explores examples of the use of technology to teach social work knowledge, values, and skills across the curriculum. The chapters cover a wide range of perspectives, including international views of the role of information technology in Great Britain and Malaysia, training approaches for faculty development, and computer-based software that has the potential to transform the manner in which curriculum objectives are met. Prepare for technology-based instruction in social work education for the 21st century!Information Technologies: Teaching to Use--Using to Teach Information Technologies: Teaching to Use--Using to Teach, addresses your need to fully prepare today?s social work graduates to work and live in this rapidly changing, technology-enhanced environment. Based on the 1997 Information Technologies Conference: Using to Teach--Teaching to Use, held in Charleston, South Carolina, this book covers the multitude of topics that were presented on technology-based instruction as we head into the 21st century. Articles in Information Technologies range from the use of the Internet and computer applications to research projects that address the effectiveness of technology-based teaching and learning activities. It also dicusses international views on the role of information technology in Britian and Malaysia. Information Technologies gives particular attention to distance education, and it is the most thorough treatment to date of the use and teaching of technology in social work education. Specific areas you?ll gain valuable information from include:establishing a faculty development labstarting intensive faculty training sessionscomputer-based software that has the potential to transform the manner in which curriculum objectives are metinternational perspectives on information technologythe use of Geographic Information Systems technology in social work practice as a tool for improved visualization of social and economic inequalitiesmodels for teaching social work curriculum with technologyWith Information Technologies, you will gain a competetive edge in preparing your faculty and students with the latest world-wide information on studies pretaining to technology use in a social work setting. A conglomeration of diverse and well-researched articles on the use of technology to enhance social work education await you in this special volume.

Information Technologies and Intelligent Decision Making Systems: First International Conference, ITIDMS 2021, Virtual Event, January 25, 2021, Revised Selected Papers (Communications in Computer and Information Science #1703)

by Arthur Gibadullin

This book constitutes selected papers presented at the First International Scientific and Practical Conference on Information Technologies and Intelligent Decision Making Systems, ITIDMS 2021, held as Virtual Event in January, 2021.The 13 presented papers were thoroughly reviewed and selected from the 41 submissions. The conference was held with the aim of summarizing international experience in the field of information, digital and intellectual development, within which proposals were formulated for digital and information transformation, the development of computer models, information technologies, automated and computing processes. A distinctive feature of the conference is that it presented reports of authors from China, Uzbekistan, Lebanon, Poland, Kazakhstan, Bulgaria and Russia. Researchers from different countries presented the process of transition of the information and digital path of development, presented the main directions and developments that can improve the efficiency and development.

Information Technologies and Intelligent Decision Making Systems: Second International Conference, ITIDMS 2022, Virtual Event, December 12–14, 2022, Revised Selected Papers (Communications in Computer and Information Science #1821)

by Arthur Gibadullin

This book constitutes the proceedings of the Second International Conference on Information Technologies and Intelligent Decision Making Systems, ITIDMS 2022, held as a virtual event, December 12–14, 2022.The 14 papers presented in this volume were carefully reviewed and selected from 38 submissions. The conference was held with the aim of developing and exchanging international experience in the field of information, digital and intellectual technologies, within the framework of which proposals were formulated for digital, intellectual and infor-mation transformation, the development of computer models and the improvement of automated and computing processes. A distinctive feature of the conference is that it presented reports of authors from USA, Canada, Bangladesh, Uzbekistan and Russia. Researchers from different countries presented the process of transition of the information and digital path of development, presented the main directions and de-velopments that can improve the efficiency and development.

Refine Search

Showing 25,626 through 25,650 of 53,836 results