Open Access
Issue |
ITM Web Conf.
Volume 38, 2021
International Conference on Exploring Service Science (IESS 2.1)
|
|
---|---|---|
Article Number | 02005 | |
Number of page(s) | 10 | |
Section | Conference Papers | |
DOI | https://doi.org/10.1051/itmconf/20213802005 | |
Published online | 07 May 2021 |
- IBM Global CIO Study http://www-05.ibm.com/innovation/it/ciostudy/ [Google Scholar]
- Jaggi, S.; Langberg, M.; Katti, S.; Ho, T., Resilient network coding in the presence of Byzantine adversaries, Browse Conference Publications > INFOCOM 2007, 26th IEEE [Google Scholar]
- Leach, J. (2008): Do new information and communications technologies have a role to play in the achievement of education for all?. British Educational Research Journal, Vol. 34, No. 6, pp. 783–805. ISSN 1469-3518. DOI: 10.1080/01411920802041392. [Google Scholar]
- Marcela Hallova, Peter Polakovic, Edita Silerova, Ivana Slovakova: Data Protection and Security in SMEs under Enterprise Infrastructure. Agris on-line Papers in Economics and Informatics, Volume XI, Number 1, 2019 [Google Scholar]
- Paul P. Maglio & Jim Spohrer: Fundamentals of Service Science. Academy of Marketing Science, DOI: 10.1007/s11747-007-0058-9 (2007) [Google Scholar]
- Salvendy, G., Karwowski, W., Spohrer, J., Maglio, P.P.: Service Science: Toward a Smarter Planet. In: Introduction to Service Engineering. John Wiley (2010) [Google Scholar]
- Chesbrough, Henry & Spohrer, Jim. (2006). A Research Manifesto for Services Science. Communication of the ACM. 49. 35–40. DOI: 10.1145/1139945. [Google Scholar]
- Jim Spohrer, Paul P. Maglio, John Bailey, Dan Gruhl: Steps Toward a Science of Service Systems. IBM Research, DOI: 10.1109/MC.2007.33 (2007) [Google Scholar]
- Spohrer, J., Maglio, P.P.: The Emergence of Service Science: Toward Systematic Service Innovations to Accelerate Co-Creation of Value. Production and Operations Management 17, 238–246 (2008) [Google Scholar]
- Salvendy, G., Karwowski, W., Spohrer, J., Maglio, P.P.: Service Science: Toward a Smarter Planet. In: Introduction to Service Engineering. John Wiley (2010) [Google Scholar]
- Monica Dragoicea, Theodor Borangiu: A Service Science Knowledge Environment in the Cloud. IFAC Proceedings Volumes, Volume 45, Issue 6, 2012, DOI: 10.3182/20120523-3-RO-2023.00438 (2012) [Google Scholar]
- Lovelock C., Gummesson E.: Whither Services Marketing? In Search of a New Paradigm and Fresh Perspectives. Journal of Service Research. 2004; 7(1):20–41. DOI: 10.1177/1094670504266131 (2004) [Google Scholar]
- Borangiu T., Dragoicea M., Oltean E., Iacob I. (2013) A Model for Open, On-Demand, Collaborative Education for Service Science. In: Falcao e Cunha J., Snene M., Novoa H. (eds) Exploring Services Science. IESS 2013. Lecture Notes in Business Information Processing, vol 143. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36356-624 [Google Scholar]
- Theodor Borangiu, Francesco Polese (2017) Introduction to the Special Issue on Exploring Service Science for Data-Driven Service Design and Innovation. Service Science 9(4): v–x. https://doi.org/10.1287/serv.2017.0195 [Google Scholar]
- Resta B., Gaiardelli P., Cavalieri S., Dotti S. (2016) Designing and configuring the value creation network for sensitization. Borangiu T., Dragoicea M., Novoa H., eds. Exploring Services Science. Lecture Notes in Business Information Processing, Vol. 247 (Springer, Cham, Switzerland), 457–470. [Google Scholar]
- Galup S.D., Dattero R., Quan J.J., Conger S. (2009) An overview of IT service management. Comm. ACM 52(5):124–127. [Google Scholar]
- I. Nonaka e H. Takeuchi, The Knowledge Creating Company, NY; Oxford University Press, 1995 [Google Scholar]
- Wielky, J. (2017) “The impact of the internet of things concept development on changes in the operations of modern enterprises”, Polish Journal of Management Studies, Vol. 15, No. 1, pp. 262–275. ISSN 2081-7452. DOI: 10.17512/pjms.2017.15.1.25. [Google Scholar]
- Jones, P., Beynon-Davies, P. and Muir, E. (2003) “E-business barriers to growth within the SME sector”, Journal of Systems and Information Technology, Vol. 7, No. 2, pp. 125. ISSN 1328-7265. DOI: 10.1108/13287260380000771. [Google Scholar]
- V.N. Inukollu, S. Arsi, and S.R. Ravuri, Security issue Associated with Big data in Cloud Computing, Int. J. of Network Security and its Application, vol. 6, Issue 3, 2014 [Google Scholar]
- Christophe Feltus: Deriving Information System Security and Privacy From Value Cocreation Theory: Case Study in the Financial Sector. Luxembourg Institute of Science and Technology, Esch-sur-Alzette, LU [Google Scholar]
- Dharminder Yadav, Himani Maheshwari, Umesh Chandra: Big Data Hadoop: Security and Privacy. 2nd International Conference on Advanced Computing and Software Engineering (ICACSE-2019) [Google Scholar]
- Fielden, K. (2010): Information Security Framework, 2010 International Conference on Information Society, 25–30. [Google Scholar]
- Muneeb-ul-Hasan, Siti Hajar Othman, Marina Md Arshad: A Conceptual Framework of Information Security Database Audit and Assessment. International Journal of Innovative Computing 9(1) 7–13 [Google Scholar]
- ISO 31000: 2009. Risk management — Principles and guidelines [Google Scholar]
- ISO/IEC 27005: 2018. Information technology - Security Techniques - Information Security Risk Management, Switzerland [Google Scholar]
- ISO Guide 73: 2009. Risk Management - Vocabulary. [Google Scholar]
- Enterprise Risk Management - Integrated Framework, Committee of Sponsoring Organizations of the Treadway Commission (COSO), September 2004 [Google Scholar]
- Guide for Conducting Risk Assessments. Information Security, NIST Special Publication 800-30, Revision 1, September 2012. https://csrc.nist.gov/publications/detail/sp/800-30/rev-NIST Special Publication 800-30, Revision 1, September 2012. https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final, accessed on Jun. 21, 2018. [Google Scholar]
- Mohyeddin, M.A., Gharaee, H. (2014). FAHP-TOPSIS risks ranking models in ISMS. Proceedings of the 7th International Symposium on Telecommunications (IST), Tehran, Iran, pp. 879–881. https://doi.org/10.1109/ISTEL.2014.7000827 [Google Scholar]
- Principles for the Sound Management of Operational Risk. Bank for International Settlements, June 2011. [Google Scholar]
- Von Roessing, R. (2010). An Introduction to the Business Model for Information Security. ISACA [Google Scholar]
- Guide for Conducting Risk Assessments. Information Security, NIST Special Publication 800-30, Revision 1, September 2012. https://csrc.nist.gov/publications/detail/sp/800-30/rev-NIST Special Publication 800-30, Revision 1, September 2012. https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final, accessed on Jun. 21, 2018. [Google Scholar]
- ISO/IEC 27001: 2013. Information Technology - Security Techniques - Information Security Management Systems - Requirements, Switzerland, 2013. [Google Scholar]
- Landoll, D.J. (2006). The Security Risk Assessment Handbook, A Complete Guide for Performing Security Risk Assessments. Auerbach Publications, Boca Raton, FL, US [Google Scholar]
- Wheeler, E. (2011). Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. Elsevier Inc., Waltham, MA, US. [Google Scholar]
- Davor Macek, Ivan Magdalenic, Nina Begicevic Redep: A systematic literature review on the application of multicriteria decision making methods for information security risk assessment. International Journal of Safety and Security Engineering, Vol. 10, No. 2, April, 2020, pp. 161–174. https://doi.org/10.18280/ijsse.100202 [Google Scholar]
- Lo, C.C., Chen, W.J. (2012). A hybrid information security risk assessment procedure considering interdependences between controls. Expert Systems with Applications, 39(1): 247–257. https://doi.org/10.1016/j.eswa.2011.07.015 [Google Scholar]
- Lee, M.C. (2014). Information security risk analysis methods and research trends: AHP and fuzzy comprehensive method. International Journal of Computer Science & Information Technology (IJCSIT), 1(1): 29–45. https://doi.org/10.5121/ijcsit.2014.6103 [Google Scholar]
- Bresnahan, T., Brynjolfsson, E. and Hitt, L. M. (2002) “Information technology workplace organisation and demand for skilled labour: firm level evidence”, Quarterly Journal of Economics, Vol. 117, No. 1, pp. 339–376. ISSN 0033-5533. DOI: 10.3386/w7136. [Google Scholar]
- Zairi, M. and Sinclair, D. (1995) “Business process re-engineering and process management”, Business Process Management Journal, Vol. 1, No. 1, pp. 161–173. ISSN 1463-7154. [Google Scholar]
- Maglio, P. P., Vargo, S. L., Caswell, N. and Spohrer, J. (2009) “The service systemis the basic abstraction of the Service Science”, Information Systems and eBusiness Management, Vol. 7, No. 4, pp. 395–406. ISSN 1617-9846. [Google Scholar]
- David Houlding, MSc, CISSP: «Health Information at Risk: Successful Strategies for Healthcare Security and Privacy» Healthcare IT Program Of ce Intel Corporation, white paper 2011 [Google Scholar]
- Fabrizio d’Amore, Paolo Fantozzi, Luigi Laura, Diego Padovan: On Enterprise Data Encryption: Good, Bad and Ugly, in press 2021, accepted paper MENACIS 2020 [Google Scholar]
- Diego Padovan: Contact Tracing Tools and Social Media Platforms Analysis of Crossing Big Data Sources. In press 2021, accepted paper ICTO 2020. [Google Scholar]
- A. Kiran: Privacy and Security in Big Data Management. International Journal in recent trends in engineering research, ISSN (online) 2455-1457 [Google Scholar]
- REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, (General Data Protection Regulation), https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679 [Google Scholar]
- C.L.P. Chen, C.Y. Zhang, “Data Intensive applications, challenges, techniques and technologies: A survey on Big Data”, Information Sciences, vol. 275, pp.314–347, 2014. [Google Scholar]
- Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data [Google Scholar]
- Baines T., Lightfoot H. (2013) Servitization of the manufacturing firm: Exploring the operations practices and technologies that deliver advanced services. Internat. J. Oper. Production Management 34(1):2–35 [Google Scholar]
- Christophe Feltus: Deriving Information System Security and Privacy From Value Cocreation Theory: Case Study in the Financial Sector. International Journal of Service Science, Management, Engineering, and Technology, Volume 10 • Issue 4 • October- December 2019 [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.