Showing 1 - 10 of 627
-- Antecedents to job success in business process management: a comparison of two models / Richard J. Goeke, Yvonne L. Antonucci …-Jang Jih -- Success of public knowledge management in the light of the Rossian ethics / Mehdi Shami Zanjani, Hossein Dabbagh … neglected human factor for information security management / Xin (Robert) Luo ... [et al.] -- A decision table for the cloud …
Persistent link: https://www.econbiz.de/10011727700
-Oriented Technology Planning and Management Process / James I. Penrod, Ann F. Harbor -- Chapter V. Development of an Information Kiosk for …
Persistent link: https://www.econbiz.de/10011725872
-task computing / Ioan Raicu ... [et al.] -- 3. Micro-services: a service-oriented paradigm for scalable, distributed data management …. Butt and Xiaosong Ma -- 5. Metadata management in petashare distributed storage network / Ismail Akturk, Xinqi Wang and … scheduling and management techniques for data-intensive application workflows / Suraj Pandey and Rajkumar Buyya -- 8. Data …
Persistent link: https://www.econbiz.de/10011726925
/ Carmelo Marcello Iacono-Manno ... [et al.] -- 14. Credential management enforcement and secure data storage in gLite … / Francesco Tusa, Massimo Villari, Antonio Puliafito -- 15. A grid-aware emergency response model (G-AERM) for disaster management … / Eleana Asimakopoulou, Chimay J Anumba, Dino Bouchlaghem -- 16. A mathematical analysis of a disaster management data …
Persistent link: https://www.econbiz.de/10011727365
disease management: a case study in metabolic syndrome / Josephine Namayanja, Vandana P. Janeja -- Similarity searching of …
Persistent link: https://www.econbiz.de/10011727619
Persistent link: https://www.econbiz.de/10011725918
compliance of IT security solutions: a structured approach using diffusion of innovations theory / Heiko Rossnagel and Jan …-Medina and Mario Piattini -- 7. Information security and management in social network / Alkesh Patel and Ajit Balakrishnan -- 8 …13. Information security management systems cybernetics / Wolfgang Boehmer -- 14. Fraud and identity theft issues …
Persistent link: https://www.econbiz.de/10011727317
The pervasive use of technology in business organizations has created a critical dependency on IT that calls for a specific focus on IT governance. This book presents insight gained through literature reviews and case studies to provide practical guidance for organizations that want to start...
Persistent link: https://www.econbiz.de/10011726238
1. A review of IS/IT investment evaluation and benefits management issues, problems, and processes / Chad Lin & Graham … Pervan -- 2. The benefits realization approach to IT investments / John Thorp -- 3. The IT evaluation and benefits management … intangibles / Kenneth Murphy & Steven Simon -- 11. Evaluating the management of enterprise systems with the balanced scorecard …
Persistent link: https://www.econbiz.de/10011726280
. AlMidfa, A. Al-Marri, M. Al-Nuaimi -- 3.18. Fuzzy reasoning approach for local connectivity management in mobile ad hoc … queue management in wireless ad hoc networks / Essam Natsheh, Adznan Jantan, Sabira Khatun, Shamala Subramaniam -- 3 … multi-robot systems / M. Mohammadian -- 3.27. Wearable and ubiquitous video data management for computational augmentation …
Persistent link: https://www.econbiz.de/10011726317