Skip to main content

Books in Information systems applications

    • Digital Transformation and Equitable Global Health

      A Future-Ready Perspective
      • 1st Edition
      • Arletty Pinel + 2 more
      • English
      Digital Transformation and Equitable Global Health: A Future-Ready Perspective presents a collective body of knowledge and global experiences that demonstrate current status and future trends in the use of exponential technologies and their potential for poverty reduction, improving health outcomes, strengthening health systems, and transforming traditional development aid structures. The book uses a translational innovation perspective to guide the reader—regardless of their area of expertise—on the rationale behind the co-creation of human-centered, affordable, and sustainable digital solutions.It addresses the interest of professionals from multiple areas (e.g., technology, health, social development, global financing), and it is a valuable resource for professionals, social scientists, practitioners, researchers, instructors, and undergraduate and graduate students interested in understanding the challenges and complexities of global public health and the applied uses of health technologies for equitable access to primary health care and universal health coverage.
    • Consensus

      Fueling Blockchain Innovation and DApp Expansion
      • 1st Edition
      • Ali Ahmadian + 3 more
      • English
      Consensus: Fueling Blockchain Innovation and DApp Expansion explores the complexities of consensus mechanisms in order to shed light on emerging trends, best practices, and real-world applications that can fuel blockchain innovation while encouraging the dissemination of DApps across various industries. Additionally, the book bridges a crucial gap in the literature by providing in-depth insights into the role of consensus mechanisms in shaping the future of blockchain technology and decentralized applications. This book delves into the fundamentals of blockchain technology along with the roles and significance of vital consensus mechanisms, their underlying principles, formal specifications, functional characteristics, architecture, frameworks, and potential across diverse blockchain applications. Moreover, the book meticulously explores classification, performance metrics, and design parameters. It offers a comprehensive comparative analysis of these mechanisms, shedding light on their computational and communication complexity, strengths, weaknesses, and suitability. Additionally, the book delves into future research directions, highlighting emerging trends and areas requiring further investigation. It also addresses the efforts underway to address existing challenges and open issues within the realm of consensus mechanisms, ensuring a comprehensive understanding of the state-of-the-art in this pivotal aspect of blockchain technology. Due to the wide range of availability and evolving new consensus mechanisms, selecting an optimal and suitable consensus for a specific blockchain application is one of the crucial challenges in the development and innovation of blockchain systems. This book has also a discussion on appropriate selection algorithms based on multi-attribute decision-making for specific blockchain systems and DApps development.
    • Advanced Topics in Inverse Data Envelopment Analysis

      Approaches for Handling Ratio Data
      • 1st Edition
      • Mehdi Soltanifar + 3 more
      • English
      Advanced Topics in Inverse Data Envelopment Analysis: Approaches for Handling Ratio Data explores and tackles the most significant challenges encountered by researchers and practitioners in decision analysis and performance evaluation. This book delves into the sophisticated realm of Ratio Data Envelopment Analysis (DEA-R), offering a thorough examination of advanced methodologies, practical examples, and insights into managing complex problems involving both non-negative and negative data. Filling crucial gaps in existing literature, this comprehensive resource focuses on the emerging field of Inverse DEA-R, equipping readers with the necessary tools and knowledge to address a wide range of challenging data types. This book serves as an essential guide for making informed and efficient decisions, guiding researchers and graduate students in computer science, applied mathematics, industrial engineering, and finance, navigating the complexities of decision analysis in today's data-driven world.
    • Digital Universalism and Cultural Diversity

      • 1st Edition
      • Laurence Favier
      • English
      Digital Universalism and Cultural Diversity details the concept of digital universalism as a wonderful horizon of an interconnected planet (men and objects) and the expression of a cultural hegemony that formats cultural diversity. It presents a few essential directions that are at the core of the debate between digital universalism and cultural diversity and the future perspectives to fathom. As the smartphone and its interfaces are at the center of most of our activities, it is important that we understand our behaviors and how they fuel connected digital devices. This book tackles these questions in the rapidly moving digital era.
    • Cognitive Information Systems in Management Sciences

      • 1st Edition
      • Lidia Dominika Ogiela
      • English
      Cognitive Information Systems in Management Sciences summarizes the body of work in this area, taking an analytical approach to interpreting the data, while also providing an approach that can be used for practical implementation in the fields of computing, economics, and engineering. Using numerous illustrative examples, and following both theoretical and practical results, Dr. Lidia Ogiela discusses the concepts and principles of cognitive information systems, the relationship between intelligent computer data analysis, and how to utilize computational intelligent approaches to enhance information retrieval. Real world implantation use cases round out the book, with valuable scenarios covering management science, computer science, and engineering. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS
    • Sentiment Analysis in Social Networks

      • 1st Edition
      • Federico Alberto Pozzi + 3 more
      • English
      The aim of Sentiment Analysis is to define automatic tools able to extract subjective information from texts in natural language, such as opinions and sentiments, in order to create structured and actionable knowledge to be used by either a decision support system or a decision maker. Sentiment analysis has gained even more value with the advent and growth of social networking. Sentiment Analysis in Social Networks begins with an overview of the latest research trends in the field. It then discusses the sociological and psychological processes underling social network interactions. The book explores both semantic and machine learning models and methods that address context-dependent and dynamic text in online social networks, showing how social network streams pose numerous challenges due to their large-scale, short, noisy, context- dependent and dynamic nature. Further, this volume: Takes an interdisciplinary approach from a number of computing domains, including natural language processing, machine learning, big data, and statistical methodologies Provides insights into opinion spamming, reasoning, and social network analysis Shows how to apply sentiment analysis tools for a particular application and domain, and how to get the best results for understanding the consequences Serves as a one-stop reference for the state-of-the-art in social media analytics
    • Building the Agile Enterprise

      With Capabilities, Collaborations and Values
      • 2nd Edition
      • Fred A. Cummins
      • English
      Building the Agile Enterprise with Capabilities, Collaborations and Values, Second Edition covers advances that make technology more powerful and pervasive while, at the same time, improving alignment of technology with business. Using numerous examples, illustrations, and case studies, Fred Cummins, an industry expert, author and former fellow with EDS and Hewlett Packard, updates his first edition incorporating the following industry developments: The ubiquitous use of the Internet along with intelligent, mobile devices, which have enabled everyone and everything to be connected anytime, anywhere The emergence of a “business architecture” discipline that has driven improvements in business design and transformation practices The development of CMMN (Case Management Model and Notation) that will provide automation to support the collaboration of knowledge workers and managers The development of VDML (Value Delivery Modeling Language) that supports modeling of business design from a management perspective The importance of “big data” management and analysis as a new source of insight into evolution of the business and the ecosystem How the architecture of the agile enterprise and business modeling change enterprise governance, management and innovation Building the Agile Enterprise with Capabilities, Collaborations and Values, Second Edition is a must have reference for business leaders, CTOs; business architects, information systems architects and business process modeling professionals who wish to close the gap between strategic planning and business operations as well as the gap between business and IT and enhance the creation and delivery of business value.
    • Eleventh Hour CISSP®

      Study Guide
      • 3rd Edition
      • Joshua Feldman + 2 more
      • English
      Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam.
    • Discover Digital Libraries

      Theory and Practice
      • 1st Edition
      • Iris Xie + 1 more
      • English
      Discover Digital Libraries: Theory and Practice is a book that integrates both research and practice concerning digital library development, use, preservation, and evaluation. The combination of current research and practical guidelines is a unique strength of this book. The authors bring in-depth expertise on different digital library issues and synthesize theoretical and practical perspectives relevant to researchers, practitioners, and students. The book presents a comprehensive overview of the different approaches and tools for digital library development, including discussions of the social and legal issues associated with digital libraries. Readers will find current research and the best practices of digital libraries, providing both US and international perspectives on the development of digital libraries and their components, including collection, digitization, metadata, interface design, sustainability, preservation, retrieval, and evaluation of digital libraries.
    • Information Security Science

      Measuring the Vulnerability to Data Compromises
      • 1st Edition
      • Carl Young
      • English
      Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.