Text
The Practice of Enterprise Modeling
This volume constitutes the proceedings of the 8th IFIP WG 8.1 Conference on the Practice of Enterprise Modeling held in November 2015 in Valencia, Spain. The PoEM conference series started in 2008 and aims to provide a forum sharing knowledge and experiences between the academic community and practitioners from industry and the public sector.
The 23 short papers accepted were carefully reviewed and selected from 72 submissions and are organized in eight sections on Evolving Enterprises, Securing Enterprises, Making Empirical Studies, Investigating Enterprise Methods, Acquiring User Information, Managing Risks and Threats, Engineering Methods, and Making Decisions in Enterprises.
Availability
No copy data
Detail Information
- Series Title
-
Lecture Notes in Business Information Processing
- Call Number
-
-
- Publisher
-
:
Springer Cham.,
2015
- Collation
-
XIII, 389, 122 illustrations in colour
- Language
-
English
- ISBN/ISSN
-
978-3-319-25897-3
- Classification
-
NONE
- Content Type
-
-
- Media Type
-
computer
- Carrier Type
-
-
- Edition
-
1
- Subject(s)
-
- Specific Detail Info
-
-
- Statement of Responsibility
-
Jolita Ralyté, Sergio España, Óscar Pastor
Other Information
- Cataloger
-
Suwardi
- Source
-
https://link.springer.com/book/10.1007/978-3-319-25897-3
- Validator
-
-
- Digital Object Identifier (DOI)
-
-
- Journal Volume
-
-
- Journal Issue
-
-
- Subtitle
-
-
- Parallel Title
-
-
Other version/related
No other version available
File Attachment
- The Practice of Enterprise Modeling
This volume constitutes the proceedings of the 8th IFIP WG 8.1 Conference on the Practice of Enterprise Modeling held in November 2015 in Valencia, Spain. The PoEM conference series started in 2008 and aims to provide a forum sharing knowledge and experiences between the academic community and practitioners from industry and the public sector.
The 23 short papers accepted were carefully reviewed and selected from 72 submissions and are organized in eight sections on Evolving Enterprises, Securing Enterprises, Making Empirical Studies, Investigating Enterprise Methods, Acquiring User Information, Managing Risks and Threats, Engineering Methods, and Making Decisions in Enterprises.
You must be logged in to post a comment