You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Annotation. This book constitutes the refereed proceedings of the International Workshops on Service-Oriented Computing, ICSOC/ServiceWave 2009, held in Stockholm, Sweden, in November 2009. The book includes papers of workshops on trends in enterprise architecture research (TEAR 2009), SOA, globalization, people, and work (SG-PAW), service oriented computing in logistics (SOC-LOG), non-functional properties and service level agreements management in service oriented computing (NFPSLAM-SOC 09), service monitoring, adaptation and beyond (MONA+), engineering service-oriented applications (WESOA09), and user-generated services (UGS2009). The papers are organized in topical sections on business models and architecture; service quality and service level agreements track; and service engineering track.
This book constitutes the thoroughly refereed papers presented at five international workshops held in conjunction with the 6th International Conference on Service-Oriented Computing, ICSOC 2008, in Sydney, Australia, in December 2008. The volume contains 41 reviewed and improved papers presented at the 4th International Workshop on Engineering Service-Oriented Applications (WESOA 2008), the Second International Workshop on Web APIs and Services Mashups (Mashups 2008), the First International Workshop on Quality-of-Service Concerns in Service Oriented Architectures (QoSCSOA 2008), the First Workshop on Enabling Service Business Ecosystems (ESBE 2008), and the Third International Workshop on Trends in Enterprise Architecture Research (TEAR 2008). The papers offer a wide range of hot topics in service-oriented computing: management and analysis of SOA processes; development of mashups; QoS and trust models in service-oriented multi-agent systems; service ecosystems, service standardization, and evolutionary changes of Web services; governance aspects of SOA, enterprise models and architectures.
"Offering enterprise resource planning (ERP) deployment strategies for information as diverse as patient records, police and community relations, and geospatial services, this text addresses the complex issues that information and communication technologies pose for small, midsize, and large organizations. Provided are recent research findings as well as practical assessments and suggestions for managers."
Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures.
Many organizations critically depend on very large information systems. In the authors' experience these organizations often struggle to find the right strategy to sustainably develop their systems. Based on their own experience at a major bank, over more than a decade, the authors have developed a successful strategy to deal with these challenges, including: - A thorough analysis of the challenges associated with very large information systems - An assessment of possible strategies for the development of these systems, resulting in managed evolution as the preferred strategy - Describing key system aspects for the success of managed evolution, such as architecture management, integration architecture and infrastructure - Developing the necessary organizational, cultural, governance and controlling mechanisms for successful execution
This volume constitutes the proceedings of the 5th International Workshop on Trends in Enterprise Architecture Research (TEAR), held in Delft, The Netherlands, on November 12, 2010. The main objective of the workshop is to identify major trends and challenges in enterprise architecture research by providing a discussion forum where researchers and practitioners can exchange experiences, problems, and ideas. The 7 papers presented were extensively reviewed and selected from 15 submissions. They report on core concepts and the effectiveness of enterprise architecture, on architecture description languages, and on exemplary case studies.
The Editor, Kevin Desouza, has organized the chapters under three categories: discussion of the concept of agile information systems (i.e. defining agile information management, its attributes, antecedents, consequences, etc.) discussion of information systems within the context of agility (i.e., descriptions of agile information systems and their attributes, how to build agile information systems, etc.) discussion of organizational management issues in the context of agile information systems (i.e., how to prepare the organization for agile information systems, management of agile information systems for improved organizational performance, etc.). This is the first book to address the hot topic of agile information systems. Contributions break new ground and provide concrete applications for practice. Contributors include highly respected academics from around the world
This volume constitutes the proceedings of the combined 7th International Workshop on Trends in Enterprise Architecture Research (TEAR 2012) and the 5th Working Conference on Practice-Driven Research on Enterprise Transformation (PRET-5), held in Barcelona, Spain, October 23-24, 2012, and co-located with The Open Group's Conference on Enterprise Architecture, Cloud Computing, and Security. Joining the forces of the two events with The Open Group Conference provided the unique opportunity for an intensive exchange between practitioners as well as for discussions on standardization efforts and academic research in the areas of enterprise transformation and enterprise architecture (EA). Based on careful reviews by at least three Program Committee members, 18 papers were chosen for inclusion in these proceedings. They were presented in six sessions on enterprise architecture management (EAM) effectivity, languages for EA, EAM and the ability to change, advanced topics in EA, governing enterprise transformations, and EA applications.
Cyberpragmatics is an analysis of Internet-mediated communication from the perspective of cognitive pragmatics. It addresses a whole range of interactions that can be found on the Net: the web page, chat rooms, instant messaging, social networking sites, 3D virtual worlds, blogs, videoconference, e-mail, Twitter, etc. Of special interest is the role of intentions and the quality of interpretations when these Internet-mediated interactions take place, which is often affected by the textual properties of the medium. The book also analyses the pragmatic implications of transferring offline discourses (e.g. printed paper, advertisements) to the screen-framed space of the Net. And although the main framework is cognitive pragmatics, the book also draws from other theories and models in order to build up a better picture of what really happens when people communicate on the Net. This book will interest analysts doing research on computer-mediated communication, university students and researchers undergoing post-graduate courses or writing a PhD thesis. Now Open Access as part of the Knowledge Unlatched 2017 Backlist Collection.