International Conference on Research and Practical Issues of Enterprise Information Systems最新文献

筛选
英文 中文
Semi-automated Information Security Risk Assessment Framework for Analyzing Enterprises Security Maturity Level 用于分析企业安全成熟度水平的半自动信息安全风险评估框架
Blerton Abazi, A. Kő
{"title":"Semi-automated Information Security Risk Assessment Framework for Analyzing Enterprises Security Maturity Level","authors":"Blerton Abazi, A. Kő","doi":"10.1007/978-3-030-37632-1_13","DOIUrl":"https://doi.org/10.1007/978-3-030-37632-1_13","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126042021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Systematic Analysis and Synthesis of Case Study Based Agile Scaling Research in the Context of Digital Transformations 数字化转型背景下基于案例研究的敏捷尺度研究的系统分析与综合
Everist Limaj, Edward W. N. Bernroider
{"title":"A Systematic Analysis and Synthesis of Case Study Based Agile Scaling Research in the Context of Digital Transformations","authors":"Everist Limaj, Edward W. N. Bernroider","doi":"10.1007/978-3-030-37632-1_7","DOIUrl":"https://doi.org/10.1007/978-3-030-37632-1_7","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Impact of Personality Traits (BFI-2-XS) on Use of Shared Online Calendars 人格特质(BFI-2-XS)对共享在线日历使用的影响
Petr Doucek, A. Pavlíček, F. Sudzina
{"title":"Impact of Personality Traits (BFI-2-XS) on Use of Shared Online Calendars","authors":"Petr Doucek, A. Pavlíček, F. Sudzina","doi":"10.1007/978-3-030-37632-1_11","DOIUrl":"https://doi.org/10.1007/978-3-030-37632-1_11","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125686660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Process Matching Analytics 业务流程匹配分析
Katalin Ternai, Szabina Fodor, I. Szabó
{"title":"Business Process Matching Analytics","authors":"Katalin Ternai, Szabina Fodor, I. Szabó","doi":"10.1007/978-3-030-37632-1_8","DOIUrl":"https://doi.org/10.1007/978-3-030-37632-1_8","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130949185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Cost-Effective Data Replica Placement Strategy Based on Hybrid Genetic Algorithm for Cloud Services 基于混合遗传算法的云服务数据副本放置策略
Xin Huang, Feng Wu
{"title":"A Cost-Effective Data Replica Placement Strategy Based on Hybrid Genetic Algorithm for Cloud Services","authors":"Xin Huang, Feng Wu","doi":"10.1007/978-3-319-99040-8_4","DOIUrl":"https://doi.org/10.1007/978-3-319-99040-8_4","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124875236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Business Process-Based Legitimacy of Data Access Framework for Enterprise Information Systems Protection 基于业务流程的企业信息系统保护数据访问框架合法性研究
Hind Benfenatki, F. Biennier
{"title":"Business Process-Based Legitimacy of Data Access Framework for Enterprise Information Systems Protection","authors":"Hind Benfenatki, F. Biennier","doi":"10.1007/978-3-319-99040-8_12","DOIUrl":"https://doi.org/10.1007/978-3-319-99040-8_12","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130202199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Facebook Posts Engagement Analysis - Case Study of the Leading e-Shop in the Czech Republic Facebook帖子参与分析-捷克共和国领先电子商店的案例研究
A. Pavlíček, Petr Doucek, Richard Novák
{"title":"Facebook Posts Engagement Analysis - Case Study of the Leading e-Shop in the Czech Republic","authors":"A. Pavlíček, Petr Doucek, Richard Novák","doi":"10.1007/978-3-319-99040-8_3","DOIUrl":"https://doi.org/10.1007/978-3-319-99040-8_3","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133654017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of Industry 4.0 Readiness Indexes and Maturity Models and Proposal of the Dimension for Enterprise Information Systems 工业4.0成熟度指标与成熟度模型分析及企业信息系统维度提出
J. Basl
{"title":"Analysis of Industry 4.0 Readiness Indexes and Maturity Models and Proposal of the Dimension for Enterprise Information Systems","authors":"J. Basl","doi":"10.1007/978-3-319-99040-8_5","DOIUrl":"https://doi.org/10.1007/978-3-319-99040-8_5","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116988582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
The Penetration of ICT into the Economy - Technical Infrastructure in the V4 Countries 信息通信技术对经济的渗透——V4国家的技术基础设施
Petr Doucek, M. Kuncová, Lea Nedomová
{"title":"The Penetration of ICT into the Economy - Technical Infrastructure in the V4 Countries","authors":"Petr Doucek, M. Kuncová, Lea Nedomová","doi":"10.1007/978-3-319-99040-8_6","DOIUrl":"https://doi.org/10.1007/978-3-319-99040-8_6","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124052167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Design of an Identity and Access Management Assurance Dashboard Model 身份与访问管理保证仪表板模型的设计
Ferdinand Damon, M. Coetzee
{"title":"The Design of an Identity and Access Management Assurance Dashboard Model","authors":"Ferdinand Damon, M. Coetzee","doi":"10.1007/978-3-319-99040-8_10","DOIUrl":"https://doi.org/10.1007/978-3-319-99040-8_10","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114277459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信