The purpose of this book is to shed light on the performance and personal competencies of information technology (IT) project managers in South Africa. Predictive models are built to determine what project managers consider the crucial competencies they should possess to deliver an IT project successfully. This investigation takes place in the context of poor IT project success rates globally a…
All individuals, companies and, in general, all organisations are continuously capturing data, many of which are of no significance to them at all. However, other data are available that would afford them a better understanding of their own environment and of themselves. These data – what we know as information – enable them to make more accurate decisions. For this reason, the right amount…
This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. They were organized in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; pr…
This book constitutes the proceedings of the 37th European Conference on IR Research, ECIR 2015, held in Vienna, Austria, in March/April 2015. The 44 full papers, 41 poster papers and 7 demonstrations presented together with 3 keynotes in this volume were carefully reviewed and selected from 305 submissions. The focus of the papers were on following topics: aggregated search and diversity, clas…
This book is written for a world that has changed radically in the past decade. At the start of the prior decade, Google barely existed and well-known strategists dismissed Internet advertising models (Porter, 2001). By decade’s end, Google brought in more advertising revenue than any firm, online or off, and had risen to become the most profitable media company on the planet. Today billions …
This book constitutes the proceedings of the 5th Enterprise Engineering Working Conference, EEWC 2015, held in Prague, Czech Republic, during May 15–19, 2015. EEWC aims at addressing the challenges that modern and complex enterprises face in a rapidly changing world. The participants of the working conference share a belief that dealing with these challenges requires rigorous and scientific s…
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the …
This book investigates the design and implementation of market mechanisms to explore how they can support knowledge- and innovation management within firms. The book uses a multi-method design, combining qualitative and quantitative cases with experimentation. First the book reviews traditional approaches to solving the problem as well as markets as a key mechanism for problem solving. After a …
This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this field. Enlightening perspectives are presented by an international collection of pre-eminent authorities in cloud security assurance from both academia and industry.