In today's increasingly digital business ecosystem, big data offers numerous opportunities. Although research on big data receives a lot of attention, research on the business value of big data is scarce. The rese...
详细信息
ISBN:
(数字)9783319394268
ISBN:
(纸本)9783319394268;9783319394251
In today's increasingly digital business ecosystem, big data offers numerous opportunities. Although research on big data receives a lot of attention, research on the business value of big data is scarce. The research project presented in this article aims at advancing the research in this area, focusing on the identification of opportunities towards determining the business value of big data. The goal of the research project pursued is to develop a framework that supports decision makers to identify opportunities for attaining business value form big data in the financial services industry. The proposed framework was constructed based on information collected by performing an in-depth literature review and interviews with experts in the area of big data and financial services industry, and it was empirically validated via a questionnaire sent to experts. A comparative analysis was also performed, emphasizing the strengths of the proposed framework over existing approaches.
The proposition is connected with the research of the security or threats referring to message decryption, user dishonesty, a non-fresh nonce, uncontrolled information jurisdiction, etc. (that means security propertie...
详细信息
ISBN:
(数字)9783319394268
ISBN:
(纸本)9783319394268;9783319394251
The proposition is connected with the research of the security or threats referring to message decryption, user dishonesty, a non-fresh nonce, uncontrolled information jurisdiction, etc. (that means security properties - attributes), in network communication processes [3]. Encrypted messages are usually sent in the form of protocol operations. Protocols may be mutually interleaving, creating the so called runs, and their operations can appear as mutual parallel processes. The investigation regards both particular security attributes and their compositions referring to more general factors, such as: concrete users, protocols, public keys, secrets, messages, etc. Probabilistic timed automata (PTA) and Petri nets characterize the token set and the complex form of conditions which have to be fulfilled for the realization of transition [5]. The abovementioned situation forms a conception pertaining to the parallel strategy realized with the help of the Petri net that includes the set of security tokens (attributes) in each node.
The study takes on the stereotypes associated with the possession of skills related to computer technology tools and information depending on age. It presents a brief review of the literature on the importance of ICT ...
详细信息
ISBN:
(纸本)9783319466422;9783319466415
The study takes on the stereotypes associated with the possession of skills related to computer technology tools and information depending on age. It presents a brief review of the literature on the importance of ICT techniques in society. It then presents the results of a survey assessing the usefulness of computers and the Internet to selected characteristics of the information society action in three chosen specific groups - young people (students), mature people who work mentally and seniors who are learning computer science.
An Enterprise Architecture (EA) provides a holistic view about the domains to support planning and management tasks. The creation can be made more efficient if present domain models and measures are integrated. But th...
详细信息
ISBN:
(数字)9783319394268
ISBN:
(纸本)9783319394268;9783319394251
An Enterprise Architecture (EA) provides a holistic view about the domains to support planning and management tasks. The creation can be made more efficient if present domain models and measures are integrated. But these sources often lack coordination and thus are rather isolated. The paper proposes an approach based on Semantic Web technologies to combine these sources. A key aspect is the indirect connection through bridging elements to reduce the effort to establish an EA. These elements and a small EA vocabulary are the basis for an integrated data pool being a "mash up" instead of a new data silo.
In this paper, we present an empirical study on the factors that influence companies in their decision regarding the adoption of Cloud Computing services. While this issue has been subject to a number of studies in th...
详细信息
ISBN:
(数字)9783319394268
ISBN:
(纸本)9783319394268;9783319394251
In this paper, we present an empirical study on the factors that influence companies in their decision regarding the adoption of Cloud Computing services. While this issue has been subject to a number of studies in the past, most of these approaches lack in the application of quantitative empirical methods or the appreciation of the inherent risk. With our study we focus on the factors that promote and inhibit the adoption of cloud services with a particular consideration of application risks. Our findings show that decision makers are significantly influenced by the risk of data loss in the first place but also by the risk that comes along with the service provider or technical issues that might occur during the use of the service. On the other side, the attractiveness could be identified as an important driver for the adoption of cloud services.
In many industries, companies are currently testing and adopting internet of things (IoT) technology. By adopting IoT, they seek to improve efficiency or to develop and offer new services. In current projects, a varie...
详细信息
ISBN:
(数字)9783319394268
ISBN:
(纸本)9783319394268;9783319394251
In many industries, companies are currently testing and adopting internet of things (IoT) technology. By adopting IoT, they seek to improve efficiency or to develop and offer new services. In current projects, a variety of IoT systems is used and gets interconnected with existing or newly developed application systems. Due to the integration of IoT and the related cloud systems, existing enterprise architecture (EA) models have to be extended. By drawing on the example of the Hamburg smartPORT initiative, we analyze the consequences of IoT projects on the enterprise architecture. As a result, we present an EA meta-model extension, which includes (1) sensor, physical object, smart brick, and fog system types, (2) a smart brick management database and (3) data streams, cloud systems and service applications. Furthermore, we discuss implications regarding a to-be architecture.
Recommender systems help consumers to find products online. But because many content-based systems work with insufficient data, recent research has focused on enhancing item feature information with data from the Link...
详细信息
ISBN:
(数字)9783319394268
ISBN:
(纸本)9783319394268;9783319394251
Recommender systems help consumers to find products online. But because many content-based systems work with insufficient data, recent research has focused on enhancing item feature information with data from the Linked Open Data cloud. Linked Data recommender systems are usually bound to a predefined set of item features and offer limited opportunities to tune the recommendation model to individual needs. The paper addresses this research gap by introducing the prototype SKOS Recommender (SKOSRec), which produces scalable on-the-fly recommendations through SPARQL-like queries from Linked Data repositories. The SKOSRec query language enables users to obtain constraint-based, aggregation-based and cross-domain recommendations, such that results can be adapted to specific business or customer requirements.
This paper provides an introduction to the topic of Enterprise Social Networks (ESN) and illustrates possible applications, potentials, and challenges for future research. It outlines an analysis of research papers co...
详细信息
ISBN:
(数字)9783319394268
ISBN:
(纸本)9783319394268;9783319394251
This paper provides an introduction to the topic of Enterprise Social Networks (ESN) and illustrates possible applications, potentials, and challenges for future research. It outlines an analysis of research papers containing a literature overview in the field of ESN. Subsequently, single relevant research papers are analysed and further research potentials derived therefrom. This yields seven promising areas for further research: (1) user behaviour;(2) effects of ESN usage;(3) management, leadership, and governance;(4) value assessment and success measurement;(5) cultural effects, (6) architecture and design of ESN;and (7) theories, research designs and methods. This paper characterises these areas and articulates further research directions.
This volume constitutes the proceedings of the 4th International Conference on E-Technologies, MCETECH 2009, held in Ottawa, Canada, during May 4-6, 2009. The23 full and4short papersincluded in this volume were carefu...
ISBN:
(数字)9783642011870
ISBN:
(纸本)3642011861
This volume constitutes the proceedings of the 4th International Conference on E-Technologies, MCETECH 2009, held in Ottawa, Canada, during May 4-6, 2009. The23 full and4short papersincluded in this volume were carefully reviewed and selected from a total of 42 submissions. They cover topics such as inter-organzational processes, service-oriented architectures, security and trust, middleware infrastructures, open source and open environments, and applications including eGovernment, eEducation, and eHealth.
Currently in many countries in Europe there is a lack of medical staff in hospitals, and mostly physicians, also the physicians employed are overwhelmed by different activities and by a high number of patients. In man...
详细信息
ISBN:
(纸本)9783319326894;9783319326887
Currently in many countries in Europe there is a lack of medical staff in hospitals, and mostly physicians, also the physicians employed are overwhelmed by different activities and by a high number of patients. In many cases due to the lack of time the physicians are helped by other medical staff to fill the observations in the observation sheet. Many times some observations are recorded badly or omitted. This paper offers a solution to this problem, by proposing an electronic patient clinical observation sheet which will store the physician observations in audio files. This can bring noticeable improvements regarding the time spent by the physician to write on the observation sheet the evolution of the patient and the recommended medication. The observations are recorded in audio files converted in text using cloud services. The text files are added to the observation sheet, allowing the physician to use the time efficiently.
暂无评论