{"title":"Semi-automated Information Security Risk Assessment Framework for Analyzing Enterprises Security Maturity Level","authors":"Blerton Abazi, A. Kő","doi":"10.1007/978-3-030-37632-1_13","DOIUrl":"https://doi.org/10.1007/978-3-030-37632-1_13","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126042021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Systematic Analysis and Synthesis of Case Study Based Agile Scaling Research in the Context of Digital Transformations","authors":"Everist Limaj, Edward W. N. Bernroider","doi":"10.1007/978-3-030-37632-1_7","DOIUrl":"https://doi.org/10.1007/978-3-030-37632-1_7","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of Personality Traits (BFI-2-XS) on Use of Shared Online Calendars","authors":"Petr Doucek, A. Pavlíček, F. Sudzina","doi":"10.1007/978-3-030-37632-1_11","DOIUrl":"https://doi.org/10.1007/978-3-030-37632-1_11","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125686660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business Process Matching Analytics","authors":"Katalin Ternai, Szabina Fodor, I. Szabó","doi":"10.1007/978-3-030-37632-1_8","DOIUrl":"https://doi.org/10.1007/978-3-030-37632-1_8","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130949185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cost-Effective Data Replica Placement Strategy Based on Hybrid Genetic Algorithm for Cloud Services","authors":"Xin Huang, Feng Wu","doi":"10.1007/978-3-319-99040-8_4","DOIUrl":"https://doi.org/10.1007/978-3-319-99040-8_4","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124875236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business Process-Based Legitimacy of Data Access Framework for Enterprise Information Systems Protection","authors":"Hind Benfenatki, F. Biennier","doi":"10.1007/978-3-319-99040-8_12","DOIUrl":"https://doi.org/10.1007/978-3-319-99040-8_12","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130202199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facebook Posts Engagement Analysis - Case Study of the Leading e-Shop in the Czech Republic","authors":"A. Pavlíček, Petr Doucek, Richard Novák","doi":"10.1007/978-3-319-99040-8_3","DOIUrl":"https://doi.org/10.1007/978-3-319-99040-8_3","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133654017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Industry 4.0 Readiness Indexes and Maturity Models and Proposal of the Dimension for Enterprise Information Systems","authors":"J. Basl","doi":"10.1007/978-3-319-99040-8_5","DOIUrl":"https://doi.org/10.1007/978-3-319-99040-8_5","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116988582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Penetration of ICT into the Economy - Technical Infrastructure in the V4 Countries","authors":"Petr Doucek, M. Kuncová, Lea Nedomová","doi":"10.1007/978-3-319-99040-8_6","DOIUrl":"https://doi.org/10.1007/978-3-319-99040-8_6","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124052167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design of an Identity and Access Management Assurance Dashboard Model","authors":"Ferdinand Damon, M. Coetzee","doi":"10.1007/978-3-319-99040-8_10","DOIUrl":"https://doi.org/10.1007/978-3-319-99040-8_10","url":null,"abstract":"","PeriodicalId":184572,"journal":{"name":"International Conference on Research and Practical Issues of Enterprise Information Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114277459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}