Browse Results

Showing 28,401 through 28,425 of 61,748 results

Information Systems Outsourcing: The Era of Digital Transformation (Progress in IS)

by Rudy Hirschheim Armin Heinzl Jens Dibbern

This book highlights research that contributes to a better understanding of emerging challenges in information systems (IS) outsourcing. Important topics covered include: how to digitally innovate through IS outsourcing; how to govern outsourced digitalization projects; how to cope with complex multi-vendor and micro-services arrangements; how to manage data sourcing and data partnerships, including issues of cybersecurity; and how to cope with the increasing demands of internationalization and new sourcing models, such as crowdsourcing, cloud sourcing and robotic process automation. These issues are approached from the client’s perspective, vendor’s perspective, or both. Given its scope, the book will be of interest to all researchers and students in the fields of Information Systems, Management, and Organization, as well as corporate executives and professionals seeking a more profound analysis of the underlying factors and mechanisms of outsourcing.

Information Systems Project Management

by David E. Avison Gholamreza Torkzadeh

View IS project management as an art as well as a science. . . . There are a number of books out there on project management. What is different and specific about this book? There is a balance between socio-cultural and technical aspects and there is a balance between qualitative and quantitative aspects – project management is seen as both an art and a science.It provides an information systems orientation for project management: neither information technology oriented on the one side nor production and operations oriented on the other, but of application to both within an organizational-wide view.It stresses information systems as a whole, not just software development – no project is successful if only software aspects are considered.It gives a truly international view of the domain – examples and experiences from different parts of the world add richness as well as context to the material. Globalization has ensured that most projects take on an international dimension.The book provides a coherent explanation of the concerns of the project manager as the project develops through the project life cycle – it does not follow a 'kitchen sink approach'.Each chapter has the following consistent structure: introduction and outline, an exhibit, the main text with examples, chapter summary, exercises, discussion questions, interview with project manager and appendix – this structure provides coherence and consistency.The exhibit, interview and appendix contain real-world examples, experiences, case studies, discussion material, software descriptions and professional codes – these provide material for class discussion and group work. The material has been used on our courses in the United States, Europe and Australia, given to practitioners as well as students (both undergraduate and postgraduate) – it has been well tested as part of our own project managemenThe material in this text has been proven successful through repeated use in courses in the United States, Europe, and Australia, by practitioners as well as undergraduate and postgraduate students.Intended AudienceThis core text is designed for advanced undergraduate and graduate courses such as Management Information Systems, Computer Information Systems, Information Systems, and Decision and Information Systems in the departments of information systems, information technology, and business.

Information Systems Reengineering, Integration and Normalization

by Joseph Shi Piu Fong

Taking a very practical approach, the author describes in detail database conversion techniques, reverse engineering, forward engineering and re-engineering methodologies for information systems, offering a systematic software engineering approach for reusing existing database systems built with "old" technology. He demonstrates how the existing systems can be transformed into the new technologies with the preservation of semantic constraints and without loss of information. In this third edition, with a new chapter on Data Normalization the author shows once the databases have been converted, how to integrate them for consolidating information, and how to normalize them so that they are efficient and user friendly. Many examples, illustrations and case studies together with questions and answers ensure that the methodology is easy to follow. Ideal as a textbook for students studying information systems theories, Information Systems Reengineering Integration and Normalization will also be a valuable management reference book for Information Technology Practitioners. Additional material is available on www. extramaterials/978-3-319-12294-6

Information Systems Reengineering, Integration and Normalization: Heterogeneous Database Connectivity

by Joseph S. Fong Kenneth Wong Ting Yan

Database technology is an important subject in Computer Science. Every large company and nation needs a database to store information. The technology has evolved from file systems in the 60’s, to Hierarchical and Network databases in the 70’s, to relational databases in the 80’s, object-oriented databases in the 90’s, and to XML documents and NoSQL today. As a result, there is a need to reengineer and update old databases into new databases. This book presents solutions for this task.In this fourth edition, Chapter 9 - Heterogeneous Database Connectivity (HDBC) offers a database gateway platform for companies to communicate with each other not only with their data, but also via their database. The ability of sharing a database can contribute to the applications of Big Data and surveys for decision support systems. The HDBC gateway solution collects input from the database, transfers the data into its middleware storage, converts it into a common data format such as XML documents, and then distributes them to the users. HDBC transforms the common data into the target database to meet the user’s requirements, acting like a voltage transformer hub. The voltage transformer converts the voltage to a voltage required by the users. Similarly, HDBC transforms the database to the target database required by the users.This book covers reengineering for data conversion, integration for combining databases and merging databases and expert system rules, normalization for eliminating duplicate data from the database, and above all, HDBC connects all legacy databases to one target database for the users.The authors provide a forum for readers to ask questions and the answers are given by the authors and the other readers on the Internet.

Information Systems Research in Vietnam, Volume 2: A Shared Vision and New Frontiers

by Nguyen Hoang Thuan Duy Dang-Pham Hoanh-Su Le Tuan Q. Phan

This book continues the discussion on advanced information systems research, cases, and applications in the context of Vietnam, presented by experienced researchers in the field. It provides a comprehensive overview of the field and offers access to practical information systems applications, serving as a guide to comparing the context . Readers can also compare the context of information systems applications in Vietnam as a developing country against the context in developed countries. The book contributes to the body of knowledge in several ways. It provides comprehensive references for information systems research, promotes the recent progress in its applications in Vietnam, and offers a shared understanding to serve as a blueprint for future research. From a practical point of view, the book helps organizations/companies in Vietnam to keep up with information systems cases, studies, and applications.

Information Systems Research in Vietnam, Volume 3: A Shared Vision and New Frontiers

by Nguyen Hoang Thuan Hoanh-Su Le Tuan Q. Phan Dang-Pham Duy

This book, the third volume of Information Systems Research in Vietnam, presents a special theme that focuses on two emerging and critical topics of the twenty-first century: “Digital Transformation” and “Sustainable Development”. Digital transformation, which consists of digitization of products and digitalization of work processes, has brought forth exciting new business models that disrupt traditional industries. Digital transformation has been embedded in the 2030 National Digital Transformation Programme of the Vietnamese government, leading to numerous digital businesses that offer significant value in various sectors, including retail, manufacturing, education, and health care. Partly due to the United Nations (UN) 17 Sustainable Development Goals (SDGs) specifying the key development areas and outlining collective actions to ensure continuing peace and prosperity for people and the planet, organizations in Vietnam are becoming increasingly aware of the importance of sustainable development and the adoption of sustainability governance frameworks such as ESG to gain strategic advantages in the turbulent markets. Information systems (IS), in particular, has profound impacts on achieving Sustainable Development. However, best practices and case studies about Digital Transformation and how this transformation and IS applications influence Sustainable Development in Vietnam have not been documented and studied, in spite of the rapid developments in these areas in both public and private sectors. This book, therefore, contributes to the existing body of knowledge and benefits a wide range of readers in several ways. Firstly, the book benefits scholars and students, both in Vietnam and globally, by advancing knowledge and presenting research on the latest trends in contemporary topics such as Digital Transformation and Sustainable Development, especially in the under-researched Vietnam context. Secondly, industry practitioners and experts, both in Vietnam and globally, will benefit from reading this book to keep up with the current trends, case studies, and applications. Thirdly, by presenting the most up to date knowledge on the topic, this book creates a shared understanding to help facilitate future research in the IS field, as well as providing the background to pave the way for collaboration between scholars, experts, and industry practitioners.

Information Systems Research in Vietnam: A Shared Vision and New Frontiers

by Nguyen Hoang Thuan Duy Dang-Pham Hoanh-Su Le Tuan Q. Phan

This book provides a collection of advanced information systems research, cases and applications in the context of Vietnam, presented by experienced researchers in the field. It provides a comprehensive overview of the field and offers access to practical information systems applications, serving as a guide to comparing the context. Readers can also compare the context of information systems applications in Vietnam as a developing country against the context in developed countries. The book contributes to the body of knowledge in several ways. It provides comprehensive references for information systems research, promotes the recent progress in its applications in Vietnam and offers a shared understanding to serve as a blueprint for future research. From a practical point of view, the book helps organisations/companies in Vietnam to keep up with information systems cases, studies and applications.

Information Systems Research: Foundations, Design and Theory

by Mohammed Ali

This textbook will delve into the philosophical foundation of contemporary IS research design with particular emphasis on the methodological tools that can be applied to conduct effective research in the multidisciplinary area of contemporary IS. What sets the book apart is that it will cover the current social paradigm shift, global changes and the need for new methodological tools, which have revolutionised the way we use IS to support our daily practices. It considers the entire methodological procedures applied to research projects that investigate or explore multifaceted areas of contemporary IS, such as information management, digital business, ICT and information science.Featuring learning objectives, case studies, assessment questions and exercises, this textbook offers a practical outline for IS research methodology that will be of use to students and researchers. It aims to satisfy researchers who are seeking literature on applying methodological procedures to their research projects that delve into the world of contemporary IS that other titles have only considered in a much broader sense.

Information Systems Security

by Sushil Jajodia Chandan Mazumdar

This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security, ICISS 2015, held in Kolkata, India, in December2015. The 24revised full papers and 8 short papers presented together with 4 invited paperswere carefully reviewed and selected from 133 submissions. The papers addressthe following topics: access control; attacks and mitigation; cloud security;crypto systems and protocols; information flow control; sensor networks andcognitive radio; and watermarking and steganography.

Information Systems Security

by Mauro Conti Indrajit Ray Manoj Singh Gaur Dheeraj Sanghi V. Kamakoti

This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security.

Information Systems Security

by Rudrapatna K. Shyamasundar Virendra Singh Jaideep Vaidya

This book constitutes the refereed proceedings of the 13th International Conference on Information Systems Security, ICISS 2017, held in Mumbai, India, in December 2017. The 17 revised full papers and 7 short papers presented together with 2 invited papers were carefully reviewed and selected from 73 submissions. The papers address the following topics: privacy/cryptography, systems security, security analysis, identity management and access control, security attacks and detection, network security.

Information Systems Security and Privacy

by Olivier Camp Edgar Weippl Christophe Bidan Esma Aïmeur

This bookconstitutes revised selected papers from the First International Conference onInformation Systems Security and Privacy, ICISSP 2015, held in Angers, France,in February 2015. The 12papers presented in this volume were carefully reviewed and selection from atotal of 56 submissions. They were organized in topical sections named: dataand software security; privacy and confidentiality; mobile systems security; andbiometric authentication. The book also contains two invited papers.

Information Systems Security and Privacy

by Steven Furnell Olivier Camp Paolo Mori

Slamming the door on security threats just got easier for IT professionals. This resource on security design and operations puts tools and techniques at their command, providing the expertise on things from access control to privacy enhancement.

Information Systems Security and Privacy: 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers (Communications in Computer and Information Science #977)

by Steven Furnell Olivier Camp Paolo Mori

This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018.The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services.

Information Systems Security and Privacy: 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers (Communications in Computer and Information Science #1221)

by Steven Furnell Olivier Camp Paolo Mori

This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, held in Prague, Czech Republic, in February 2019. The 19 full papers presented were carefully reviewed and selected from a total of 100 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.

Information Systems Security and Privacy: 6th International Conference, ICISSP 2020, Valletta, Malta, February 25–27, 2020, Revised Selected Papers (Communications in Computer and Information Science #1545)

by Steven Furnell Olivier Camp Edgar Weippl Paolo Mori

This book constitutes the revised selected papers of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, held in Valletta, Malta, in February 2020. The 11 full papers presented were carefully reviewed and selected from a total of 125 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.

Information Systems Security and Privacy: 7th International Conference, ICISSP 2021, Virtual Event, February 11–13, 2021, and 8th International Conference, ICISSP 2022, Virtual Event, February 9–11, 2022, Revised Selected Papers (Communications in Computer and Information Science #1851)

by Steven Furnell Paolo Mori Gabriele Lenzini

This book includes extended and revised versions of selected papers from the 7th and 8th edition of the International Conference on Information Systems Security and Privacy (ICISSP 2021 and ICISSP 2022). ICISSP 2021 and 2022 was held as an online event due to the Covid-19 pandemic, from February 11–13, 2021 and February 9–11, 2022. respectively.The 6 full papers included in this book were carefully reviewed and selected from 217 submissions. The ICISSP 2021 and 2022 book contains extended and revised version of proceedings papers dealing with information systems security and privacy.

Information Systems Security and Privacy: Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers (Communications in Computer and Information Science #867)

by Steven Furnell Olivier Camp Paolo Mori

This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2017, held in Porto, Portugal, in February 2017. The 13 full papers presented were carefully reviewed and selected from a total of 100 submissions. They are dealing with topics such as vulnerability analysis and countermeasures, attack patterns discovery and intrusion detection, malware classification and detection, cryptography applications, data privacy and anonymization, security policy analysis, enhanced access control, and socio-technical aspects of security.

Information Systems Security: 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings (Lecture Notes in Computer Science #11281)

by Trent Jaeger Vinod Ganapathy R. K. Shyamasundar

This book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018.The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication.

Information Systems Security: 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings (Lecture Notes in Computer Science #11952)

by Rudrapatna K. Shyamasundar Deepak Garg N. V. Narendra Kumar

This book constitutes the proceedings of the 15th International Conference on Information Systems Security, ICISS 2019, held in Hyderabad, India, in December 2019.The 13 revised full papers and 4 short papers presented in this book together with 4 abstracts of invited talks were carefully reviewed and selected from 63 submissions.The papers cover topics such as: smart contracts; formal techniques; access control; machine learning; distributed systems; cryptography; online social networks; images and cryptography.

Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings (Lecture Notes in Computer Science #12553)

by Salil Kanhere Vishwas T Patil Shamik Sural Manoj S Gaur

This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020.The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.

Information Systems Security: 17th International Conference, ICISS 2021, Patna, India, December 16–20, 2021, Proceedings (Lecture Notes in Computer Science #13146)

by Rajiv Ranjan Rudrapatna K. Shyamasundar Somanath Tripathy

This book constitutes the proceedings of the 17th International Conference on Information Systems Security, ICISS 2021, held in Patna, India, during December 16-20, 2021. The 9 regular papers, 2 short papers and 4 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 48 submissions. The papers were organized in topical sections named: attack detection, malware identification, data security in distributed systems, and applied cryptography.

Information Systems Security: 18th International Conference, ICISS 2022, Tirupati, India, December 16–20, 2022, Proceedings (Lecture Notes in Computer Science #13784)

by Surya Nepal Rudrapatna K. Shyamasundar Venkata Ramana Badarla

This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16–20, 2022The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ​ostinato: cross-host attack correlation through attack activity similaritydetection; DKS-PKI: a distributed key server architecture for public keyinfrastructure;generating-set evaluation of bloom filter hardening techniques in privaterecord linkage; etc

Information Systems Security: 19th International Conference, ICISS 2023, Raipur, India, December 16–20, 2023, Proceedings (Lecture Notes in Computer Science #14424)

by Rudrapatna K. Shyamasundar Vallipuram Muthukkumarasamy Sithu D. Sudarsan

This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICISS 2023, held in Raipur, India, during December 16–20, 2023. The 18 full papers and 10 short papers included in this book were carefully reviewed and selected from 78 submissions. They are organized in topical sections as follows: systems security, network security, security in AI/ML, privacy, cryptography, blockchains.

Information Systems Security: 20th International Conference, ICISS 2024, Jaipur, India, December 16–20, 2024, Proceedings (Lecture Notes in Computer Science #15416)

by Rudrapatna K. Shyamasundar Ram Krishnan Vishwas T. Patil

This book constitutes the refereed proceedings of the 20th International Conference on Information Systems Security, ICISS 2024, held in Jaipur, India, during December 16–20, 2024. The 18 full papers and 6 short papers included in this book were carefully reviewed and selected from 93 submissions. They were organized in topical sections as follows: System Security; Network Security; Attack; Malware and Vulnerability Detection; Privacy & Usability; AI Security; and Industry Demo/Practice.

Refine Search

Showing 28,401 through 28,425 of 61,748 results