You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Presents theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices. Provides recent, comprehensive coverage of all issues related to information security and ethics, as well as the opportunities, future challenges, and emerging trends related to this subject.
Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses' information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.
Business practices are constantly evolving in order to meet growing customer demands. Evaluating the role of logistics and supply chain management skills or applications is necessary for the success of any organization or business. As market competition becomes more aggressive, it is crucial to evaluate ways in which a business can maintain a strategic edge over competitors. Supply Chain and Logistics Management: Concepts, Methodologies, Tools, and Applications is a vital reference source that centers on the effective management of risk factors and the implementation of the latest supply management strategies. It also explores the field of digital supply chain optimization and business transformation. Highlighting a range of topics such as inventory management, competitive advantage, and transport management, this multi-volume book is ideally designed for business managers, supply chain managers, business professionals, academicians, researchers, and upper-level students in the field of supply chain management, operations management, logistics, and operations research.
Threatening the safety of individuals, computers, and entire networks, cyber crime attacks vary in severity and type. Studying this continually evolving discipline involves not only understanding different types of attacks, which range from identity theft to cyberwarfare, but also identifying methods for their prevention. Cyber Crime: Concepts, Methodologies, Tools and Applications is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law. As cyber crime continues to change and new types of threats emerge, research focuses on developing a critical understanding of different types of attacks and how they can best be managed and eliminated.
With the success of the widely acclaimed first volume of this series (Success and Pitfalls of IT Management), comes the second volume, Organizational Achievement and Failure in Information Technology Management. This book is a collection real-life cases that focus on both achievements attained with the successful utilization of information technology as well as failures suffered as a result of substandard use and management of IT resources in organizations. Cases deal with issues that affect a wide variety of organizations--large and small businesses, government organizations and educational institutions.This book also appeared as the journal, Annals of Cases on Information Technology: Applications and Management in Organizations, Volume 2.
Technological advances of the past decades have allowed organizations of all sizes to use information technology in all aspects of organizational management. This book presents more than 200 papers that address this growing corporate phenomena.
Mountains of business data are piling up in organizations every day. These organizations collect data from multiple sources, both internal and external. These sources include legacy systems, customer relationship management and enterprise resource planning applications, online and e-commerce systems, government organizations and business suppliers and partners. A recent study from the University of California at Berkeley found the amount of data organizations collect and store in enterprise databases doubles every year, and slightly more than half of this data will consist of "reference information," which is the kind of information strategic business applications and decision support systems demand (Kestelyn, 2002). Terabyte-sized (1,000 megabytes) databases are commonplace in organizations today, and this enormous growth will make petabyte-sized databases (1,000 terabytes) a reality within the next few years (Whiting, 2002). By 2004 the Gartner Group estimates worldwide data volumes will be 30 times those of 1999, which translates into more data having been produced in the last 30 years than during the previous 5,000 (Wurman, 1989).
In recent years, the science of managing and analyzing large datasets has emerged as a critical area of research. In the race to answer vital questions and make knowledgeable decisions, impressive amounts of data are now being generated at a rapid pace, increasing the opportunities and challenges associated with the ability to effectively analyze this data.
"This comprehensive collection offers a compendium of research on the design, implementation, and evaluation of online learning technologies, addressing the challenges and opportunities associated with the creation and management of Web-based applications and communities, instructional design, personalized learning environments, and effective educational delivery"--Provided by publisher.
We are living in interesting times characterized by increasing digitalization of business enterprises in a global interconnected knowledge economy. With waning euphoria about the first wave of digital e-business enterprises and a sobering dot-com stock market, business model innovation is being recognized as the key enabler that can unleash value creation for new digital enterprises. In contrast to traditional factors of production, knowledge assets and intellectual capital are expected to play a dominant role in determining both valuation and value-creation capabilities of most new age enterprises. Not surprisingly, Knowledge Management for Business Model Innovation is anticipated to be the mantra for survival, competence and success of Net enterprises as well as traditional brick-and-mortar enterprises faced with the challenge of transforming their business models into and beyond click-and-mortar companies.