Rapidly advancing technology creates an overwhelming demand to remain informed of current research and discoveries. Cases on Emerging Information Technology Research and Applications strategically combines the latest studies encompassing the most current advancements in the IT arenas. This compilation of cases highlights relevant information for professionals, researchers, and students wishing to remain current with the ever-changing IT field.
"This book presents findings utilizing the incorporation of the systems approach into fields such as systems engineering, computer science, and software engineering"--Provided by publisher.
Examines practical research and case studies on such benchmark topics as biometric and security technology, protection of digital assets and information, multilevel computer self-efficacy, and end-user Web development. Provides research into the advancement, productivity, and performance of the end user computing domain.
To date, a plethora of companies and organizations are investing vast amounts of money on the latest technologies. Information technology can be used to improve market share, profits, sales, competitive advantage, and customer/employee satisfaction. Unfortunately, the individuals meant to use these technologies are not well equipped on how to effectively and efficiently use these tools for competitive advantage and decision making. The Handbook of Research on IT Applications for Strategic Competitive Advantage and Decision Making is a collection of innovative research relevant to the methodologies, theoretical frameworks, and latest empirical research findings in information technology applications, strategic competitive advantage, and decision making. While highlighting topics including agility, knowledge management, and business intelligence, this book is ideally designed for information technology professionals, academics, researchers, managers, executives, and government officials interested in using information technology for strategic competitive advantage and better decision making.
Technology trends may come and go, but cloud computing technologies have been gaining consideration in the commercial world due to its ability to provide on-demand access to resources, control the software environment, and supplement existing systems. Pervasive Cloud Computing Technologies: Future Outlooks and Interdisciplinary Perspectives explores the latest innovations with cloud computing and the impact of these new models and technologies. This book will present case studies and research on the future of cloud computing technologies and its ability to increase connectivity of various entities of the world. It is an essential resource for technology practitioners, engineers, managers, and academics aiming to gain the knowledge of these novel and pervasive technologies.
The summary version of Emerging and Readily Available Technologies and National Security distills the findings and recommendations of the complete report into a a booklet format. The full report is available here.
As is true of most technological fields, the software industry is constantly advancing and becoming more accessible to a wider range of people. The advancement and accessibility of these systems creates a need for understanding and research into their development. Optimizing Contemporary Application and Processes in Open Source Software is a critical scholarly resource that examines the prevalence of open source software systems as well as the advancement and development of these systems. Featuring coverage on a wide range of topics such as machine learning, empirical software engineering and management, and open source, this book is geared toward academicians, practitioners, and researchers seeking current and relevant research on the advancement and prevalence of open source software systems.
Emerging as an effective alternative to organization-based information systems, cloud computing has been adopted by many businesses around the world. Despite the increased popularity, there remain concerns about the security of data in the cloud since users have become accustomed to having control over their hardware and software. Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments compiles the research and views of cloud computing from various individuals around the world. Detailing cloud security, regulatory and industry compliance, and trust building in the cloud, this book is an essential reference source for practitioners, professionals, and researchers worldwide, as well as business managers interested in an assembled collection of solutions provided by a variety of cloud users.
This proceedings volume provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art in information strategies and technologies of convergence security. The intended readership are researchers in academia, industry, and other research institutes focusing on information science and technology.