|
Contemporary Research on E-business Technology and Strategy
|
Vasil Khachidze |
This book constitutes the proceedings of the International Conference on E-business and Strategy, iCETS 2012, held in Tianjin, China, in August 2012. The 65 revised full papers presented were careful… |
OL19837565W |
|
Context-Aware Systems and Applications
|
Phan Cong Vinh |
This book constitutes the thoroughly refereed proceedings of the first International Conference on Context-Aware Systems and Applications, ICCASA 2012, held in Ho Chi Minh City, Vietnam, in November … |
OL19837628W |
|
Data Privacy Management and Autonomous Spontaneous Security
|
Roberto Pietro |
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Wor… |
OL19840128W |
|
Digital Forensics and Cyber Crime
|
Pavel Gladyshev |
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, … |
OL19843249W |
|
Enterprise Inter- and Intra-Organizational Integration
|
J. G. Nell,K. Kosanke,R. Jochem,Angel Ortiz Bas |
The new organizational paradigms of global cooperation and collaboration require new ways and means for their support. Information and Communication Technology (ICT) can and will play a significant r… |
OL19847693W |
|
Game Theory for Networks
|
Vikram Krishnamurthy |
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Game Theory for Networks (GameNets 2012) held in Vancouver, Canada, May 24-26, 2012.… |
OL19852136W |
|
Information Security and Privacy
|
Colin Boyd |
This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revise… |
OL19857517W |
|
IT Enabled Services
|
Shiro Uesugi |
<p>As the global economy turns more and more service oriented, Information Technology-Enabled Services (ITeS) require greater understanding. Increasing numbers and varieties of services are provided… |
OL19877355W |
|
Network and System Security
|
Javier López |
This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully re… |
OL19890309W |
|
New Business Models and Value Creation: A Service Science Perspective
|
Lino Cinquini |
The contemporary economic landscape features the prevalence of the service sector in economic systems, the pervasive servitisation of manufacturing, innovations in traditional business models and new… |
OL19890561W |
|
Secure ICT Service Provisioning for Cloud, Mobile and Beyond
|
Eberhard Faber |
<p>In this book a reference architecture is introduced enhancing the security of the services offered in the information and communication technology (ICT) market. Customers will be able to compare o… |
OL19901252W |
|
Seeking success in e-business
|
IFIP TC8/WG8.4 Working Conference on E-Business: Multidisciplinary Research and Practice (2nd 2002 Copenhagen, Denmark) |
This unique collection of research papers addresses the emerging field of e-commerce and e-business, and presents a number of key contributions as the research fields are maturing. Many of the texts … |
OL19901317W |
|
Topics in Cryptology – CT-RSA 2013
|
Ed Dawson |
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers… |
OL19907281W |
|
User Modeling, Adaptation, and Personalization
|
Sandra Carberry |
This book constitutes the thoroughly refereed proceedings of the 21st International Conference on User Modeling, Adaption, and Personalization, held in Rome, Italy, in June 2013. The 21 long and 7 sh… |
OL19909146W |