Composition of Secure Multi-Party Protocols (Lecture Notes in Computer Science, #2815)
by Yehuda Lindell
In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired multi-party functionality. However, this research relates only to a setting where a single protocol exec...
E-Commerce and Web Technologies (Lecture Notes in Computer Science, #2738)
This book constitutes the refereed proceedings of the 4th International Conference on E-Commerce 2003, held in Prague, Czech Republic in September 2003. The 42 revised full papers presented together with an invited paper and a position paper were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on auctions, security, agents and search, ebXML, modeling and technology, XML, design and performance, business processes, and brokering and recommender...
This book constitutes the refereed proceedings of the Second International Conference on Online Communities and Social Computing, OCSC 2007, held in Beijing, China in July 2007 in the framework of the 12th International Conference on Human-Computer Interaction, HCII 2007 with 8 other thematically similar conferences. The 56 revised papers presented were carefully reviewed and selected from numerous submissions. The papers accepted for presentation thoroughly cover the thematic area of online com...
Public Key Cryptography -- Pkc 2004 (Lecture Notes in Computer Science, #2947)
PKC2004wasthe7thInternationalWorkshoponPracticeandTheoryinPublic Key Cryptography and was sponsored by IACR, the International Association for Cryptologic Research (www. iacr. org). This year the workshop was organized 2 in cooperation with the Institute for Infocomm Research (I R), Singapore. There were 106 paper submissions from 19 countries to PKC 2004. That is the highest submission number in PKC history. Due to the large number of submissionsandthehighqualityofthe submittedpapers,notallthep...
Schlusselkompetenzen Spielend Trainieren (de Gruyter Studium)
by Anne Brunner
Management information systems (MIS) produce the information that managers use to make important strategic decisions. This book covers the essential managerial skills that are necessary to design these systems. In contrast to other books on management information systems, this book takes a decidedly managerial perspective. It focuses on how managers perceive and respond to information, and on their need to use this information to make important decisions. The book considers how systems can be...
Mit der Veranderung der klassischen Fabrik von einer Produktionsstatte zu einem modernen Dienstleistungszentrum ergeben sich neue Herausforderungen: Wirtschaftlichkeit der modernen Wertschoepfung ist keine Eigenschaft der Produkte, sondern des Prozesses. Komplexe Prozesse benoetigen eine ganzheitliche Unterstutzung durch moderne und flexible IT-Systeme.Neben einer grundsatzlichen Einfuhrung in das Thema beschreibt das Buch die Struktur eines Manufacturing Execution Systems (MES). Dem Leser wird...
Keys to Successful Software Development
In this compendium, readers should find current and classical articles and papers on software project management. Useful for new software project managers seeking to come up to speed quickly, experienced software project managers looking for new approaches, and software project team members looking for insights, this collection presents practical techniques and a scientific framework for managing the software enterprise. Areas covered include: managing projects and people; software life cycle pr...
Modellierung Gesetzlicher Rahmenbedingungen Fur Verwaltungsprozesse Aus Dem E-Government
by Sebastian Olbrich
Data and Applications Security XIX (Lecture Notes in Computer Science, #3654)
by Sushil Jajodia
Information Technology
CTR's report addresses the forces and technologies shaping the information technology (IT) industry as it moves toward the 21st century, focusing on how an organization's IT function must change to meet new business needs. The report details how information systems (IS) in an organization must now shift to implement technologies and strategies that add significant business value.
Storytelling (Arbeits- Und Organisationspsychologische Techniken)
by Karin Thier
Narratives Wissensmanagement - was ist das? Warum war das neu eingefuhrte Projekt ein Erfolg, ein anderes dagegen ein Fehlschlag? Was kann man aus erfolgreichen und weniger erfolgreichen Projekten und Ablaufen lernen? Wie kann ich das im Unternehmen vorhandene Wissen nutzen, um zukunftig Zeit, Muhen und Kosten zu sparen? Das sind wichtige und kostenintensive Fragen des Wissensmanagements. Ein neuer Ansatz dabei ist das Story telling, eine Methode des narrativen, auf Geschichten und Erzahlungen b...
The goals of an IT balanced scorecard include the alignment of IT plans with business objectives, the establishment of measures of IT effectiveness, the directing of employee efforts toward IT objectives, the improved performance of technology, and the achievement of balanced results across stakeholder groups. CIOs, CTOs, and other technical manage
Synthetic Worlds (Integrated Series in Information Systems, #33)
Synthetic Worlds, Virtual Worlds, and Alternate Realities are all terms used to describe the phenomenon of computer-based, simulated environments in which users inhabit and interact via avatars. The best-known commercial applications are in the form of electronic gaming, and particularly in massively-multiplayer online role-playing games like World of Warcraft or Second Life. Less known, but possibly more important, is the rapid adoption of platforms in education and business, where Serious Ga...
Larstan's the Black Book on Corporate Security (Black Book)
by Tony Alagna, Joyce Brocaglia, and Eva Chen
Achieving ISO/IEC 20000 - The Differences Between BS 15000 and ISO/IEC 20000
by Jenny Dugmore
2012 International Conference on Information Technology and Management Science(icitms 2012) Proceedings
by Bing Xu
Advanced Topics in Global Information Management, Volume 1 (Advances in Global Information Management)
CIM Integration und Vernetzung
Fortschritt muB dem Menschen dienen. Dieses iibergeordnete Ziel der Entwicklung unserer modernen Industriegesellschaft gilt auch fiir die rechnerunterstiitzte Fabrik, die unter dem Schlagwort "CIM" zu einer Schliisseltechnologie fiir die 90er Jahre geworden ist. Die Integration von Unternehmensfunktionen durch informations tech nisch vernetzte Systeme ist ein InnovationsprozeB, der nicht zwangsHiufig gesell schaftlich wiinschenswerte Entwicklungen nimmt. Zukunftsgerechte Losungen sind nicht nur...
Measuring Up: The Business Case for GIS offers case studies about companies and government agencies that have implemented GIS solutions to meet business goals and how their successes with this technology measure up in: Saving money and time; Increasing efficiency, accuracy, productivity, communication and collaboration; Generating revenue; Supporting decision making; Aiding budget development; Building information bases; Managing resources; Measuring Up presents 75 articles from 22 business sect...
Harmonic Analysis, Group Representations, Automorphic Forms and Invariant Theory
Client Tracker Book (Client Log Book for Salons, Nail, Hair Stylists, Barbers & M, #2)
by John Book Publishing