You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Enterprise modeling (EM) methods and techniques are indispensable for understanding the present situation of an enterprise and for preparing for its future – particularly in times of continuous organizational change, an increasing pace of innovation, new market challenges or technology advances. The authors combine a detailed description of the 4EM methodology with their concrete experience gathered in projects. Their book addresses the modeling procedure, modeling language and modeling practices in a uniquely integrated approach. It provides practical advice on common challenges faced by enterprises and offers a flexible EM method suitable for tackling those challenges. Much of the work p...
From the Foreword: "[This book] provides a comprehensive overview of the fundamental concepts in healthcare process management as well as some advanced topics in the cutting-edge research of the closely related areas. This book is ideal for graduate students and practitioners who want to build the foundations and develop novel contributions in healthcare process modeling and management." --Christopher Yang, Drexel University Process modeling and process management are traversal disciplines which have earned more and more relevance over the last two decades. Several research areas are involved within these disciplines, including database systems, database management, information systems, ERP,...
This book constitutes the refereed proceedings of the 5th International Conference on Serviceology for Services, held in Vienna, Austria, in July 2017. The 21 full papers and one tutorial paper presented in this volume were carefully reviewed and selected from 75 submissions. The papers are organized around the following topics: human-centered service; customer satisfaction; service innovation and marketing; service design.
This book concentrates on a wide range of advances related to IT cybersecurity management. The topics covered in this book include, among others, management techniques in security, IT risk management, the impact of technologies and techniques on security management, regulatory techniques and issues, surveillance technologies, security policies, security for protocol management, location management, GOS management, resource management, channel management, and mobility management. The authors also discuss digital contents copyright protection, system security management, network security management, security management in network equipment, storage area networks (SAN) management, information s...