You are previewing Automated Enterprise Systems for Maximizing Business Performance.
O'Reilly logo
Automated Enterprise Systems for Maximizing Business Performance

Book Description

The integration of recent technological advances into modern business processes has allowed for greater efficiency and productivity. However, while such improvements are immensely beneficial, the modeling and coordination of these activities offers a unique set of challenges that must be addressed. Automated Enterprise Systems for Maximizing Business Performance is a pivotal reference source for the latest scholarly research on the modeling and application of automated business systems. Featuring extensive coverage on a variety of topics relating to the design, implementation, and current developments of such systems, this book is an essential reference source for information system practitioners, business managers, and advanced-level students seeking the latest research on achievements in this field. This publication features timely, research-based chapters within the context of business systems including, but not limited to, enterprise security, mobile technology, and techniques for the development of system models.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Foreword
  6. Preface
  7. Chapter 1: Review on Security Threats for Mobile Devices and Significant Countermeasures on Securing Android Mobiles
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. CHRONOLOGICAL BACKGROUND
    4. 3. MOBILE MALWARE
    5. 4. VULNERABILITIES OF ANDROID
    6. 5. COUNTERMEASURES IN SECURING ANDROID ON MOBILE DEVICES
    7. 6. METHODOLOGY PROCEDURE AND FRAMEWORK APPROACH
    8. 7. EVOLUTION OF MOBILE MALWARE
    9. 8. CONCLUSION
    10. REFERENCES
    11. ENDNOTE
  8. Chapter 2: Android for Enterprise Automated Systems
    1. ABSTRACT
    2. INTRODUCTION
    3. INTRODUCTION TO ANDROID
    4. ANDROID FOR AUTOMATED ENTERPRISE SYSTEMS
    5. GENERAL CONCLUSION
    6. REFERENCES
  9. Chapter 3: Use of Sensor Data Warehouse for Soil Moisture Analysis
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. RELATED WORK
    4. 3. DW FOR WSN DATA
    5. 4. CONCLUSION AND PERSPECTIVES
    6. NOTE
    7. REFERENCES
  10. Chapter 4: Storage of Simulation Result Data
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. USING DATABASES FOR SIMULATION DATA STORAGE
    4. 3. AN EXAMPLE OF SIMULATION DATABASE
    5. 4. DISCUSSION
    6. REFERENCES
  11. Chapter 5: Benefits and Barriers of E-Sourcing and E-Purchasing in the Healthcare Sector
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. THEORETICAL BACKGROUND
    4. 3. TECHNOLOGIES ENABLING STRATEGIC SOURCING AND FUNCTIONAL PROCUREMENT
    5. 4. CASE STUDY: IMPLEMENTATION OF E-SOURCING AND E-PURCHASING IN A GREEK PUBLIC HOSPITAL
    6. 5. CONCLUSION
    7. REFERENCES
  12. Chapter 6: The Evaluation of Business Performance in ERP Environments
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. BUSINESS PERFORMANCE AND ERP SYSTEMS
    5. CONCLUSION
    6. REFERENCES
  13. Chapter 7: Rediscovering Business Processes
    1. ABSTRACT
    2. INTRODUCTION
    3. BUSINESS PROCESSES: ONE SCHEMA, MANY DEFINITIONS
    4. A CLASSIFICATION OF BUSINESS PROCESS MODELS
    5. HANDLING COMPLEXITY OF BUSINESS PROCESS PATTERNS
    6. DISCUSSION
    7. CONCLUSION
    8. REFERENCES
  14. Chapter 8: Databases and Information Systems
    1. ABSTRACT
    2. 1. INFORMATION SYSTEMS
    3. 2. MANAGEMENT OF INFORMATION SYSTEM
    4. 3. DATABASE INFORMATION SYSTEMS
    5. 4. STORAGE AND RETRIEVAL
    6. 5. ISSUES RELATED TO INFORMATION SYSTEMS AND DATABASES
    7. CONCLUSION
    8. REFERENCES
  15. Chapter 9: Business Process Improvement through Data Mining Techniques
    1. ABSTRACT
    2. INTRODUCTION
    3. RATIONALE
    4. METHODOLOGY
    5. APPLICATION
    6. RESULTS
    7. DISCUSSION
    8. REFERENCES
  16. Chapter 10: Applying Evolutionary Many-Objective Optimization Algorithms to the Quality-Driven Web Service Composition Problem
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. BACKGROUND
    4. 3. ON THE PROBLEM OF QoS-DRIVEN SERVICE COMPOSITION
    5. 4. THE APPROACH
    6. 5. EVALUATION
    7. 6. CONCLUDING REMARKS
    8. REFERENCES
    9. ENDNOTE
  17. Chapter 11: Integrated Management Systems and Information Management Systems
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. INFORMATION AND MANAGEMENT: CURRENT SITUATION AND TRENDS
    5. SOLUTIONS AND RECOMMENDATIONS
    6. FUTURE RESEARCH DIRECTIONS
    7. CONCLUSION
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
    10. ENDNOTES
  18. Chapter 12: Managing Enterprise IT Risks through Automated Security Metrics
    1. ABSTRACT
    2. INTRODUCTION
    3. DECOMPOSING ENTERPRISE IT RISK
    4. ENTERPRISE IT RISK MANAGEMENT ESSENTIALS
    5. ERM LITERATURE REVIEW
    6. IT RISK MANAGEMENT METHODS
    7. SCAP SPECIFICATIONS
    8. SCAP-LIKE SPECIFICATIONS
    9. VULNERABILITY SCORING METHODS
    10. CONCLUSION
    11. REFERENCES
    12. KEY TERMS AND DEFINITIONS
  19. Chapter 13: Information Security
    1. ABSTRACT
    2. INTRODUCTION
    3. 1. THE GROWING INTEGRATION OF ENTERPRISE SYSTEMS
    4. 2. DATA MANAGEMENT
    5. 3. DATA TRANSMISSION
    6. 4. CRYPTOGRAPHY AND NETWORK SECURITY
    7. 5. ENCRYPTION ALGORITHMS
    8. 6. SYMMETRIC CRYPTOGRAPHY
    9. 7. ASYMMETRIC CRYPTOGRAPHY
    10. 8. ASCII CODE
    11. 9. DATA MODIFICATION
    12. 10. AUTOMATING DATA PROTECTION
    13. CONCLUSION
    14. REFERENCES
  20. Compilation of References
  21. About the Contributors