You are previewing Systems Approach Applications for Developments in Information Technology.
O'Reilly logo
Systems Approach Applications for Developments in Information Technology

Book Description

The intricate fields of information systems and information technology consist of innumerable interrelated facets from hardware to software and creators to end users. All systems inevitably encounter errors or problems, and as new solutions are found and created in today’s complex world of technology, it is essential to look at systems as complete entities when searching for solutions and answers.Systems Approach Applications for Developments in Information Technology addresses the essential need to look at systems as a complete unit through using systems approach in the field of IT. This complete reference is designed for all information technology professionals to better understand their current jobs and future goals through the pivotal idea of systems approach as applied in software engineering, systems engineering, and complex systems.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. Associate Editors
    3. LIST OF REVIEWERS
  5. Preface
    1. INFORMATION TECHNOLOGY PROVISION AND FAILURE?
    2. INFORMATION SYSTEMS DESIGN
    3. OVERCOMING FAILURE?
    4. DEFINING INFORMATION SYSTEMS
    5. INTEGRATED SYSTEMS
    6. SECURITY AND PRIVACY
    7. SURVEILLANCE AND POWER: TECHNOLOGY THE MODERN BOGEYMAN?
    8. SUMMARY
  6. Section 1: Information System Provision
    1. Chapter 1: Interview
      1. ABSTRACT
      2. INTRODUCTION
    2. Chapter 2: Towards Knowledge Evolution in Software Engineering
      1. ABSTRACT
      2. INTRODUCTION
      3. PROBLEM STATEMENT
      4. A STUDY OF KNOWLEDGE EVOLUTION IN SE
      5. IMPLICATIONS
      6. CONCLUSION
    3. Chapter 3: A Holistic Approach for Understanding Project Management
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW AND FINDINGS
      4. RESEARCH DESIGN PROCESS
      5. CONCEPTUAL MODEL DEVELOPMENT
    4. Chapter 4: The Importance of Systems Methodologies for Industrial and Scientific National Wealthy and Development
      1. ABSTRACT
      2. INTRODUCTION
      3. METHOD
      4. RESULTS
      5. DISCUSSION
      6. CONCLUSION
    5. Chapter 5: An Integrated Systems Approach for Early Warning and Risk Management Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. INTERDISCIPLINARY COOPERATION AND INTEGRATED APPROACH
      4. APPLICATION OF THE HOLISTIC SYSTEMS APPROACH: THE CONCEPT FOR AN INTEGRATED SYSTEM FOR COASTAL PROTECTION
      5. THE UNIVERSAL STRUCTURE OF THE SYSTEM
      6. THE WEB PORTAL
      7. REFERENCE IMPLEMENTATION BASED ON THE HOLISTIC SYSTEMS APPROACH: AN INTEGRATED SYSTEM FOR RADIATION PROTECTION
      8. THE IMPORTANCE OF THE HOLISTIC, INTERDISCIPLINARY SYSTEMS APPROACH IN THE REMOTE MONITORING OF NUCLEAR POWER PLANTS
      9. CONCLUSION
    6. Chapter 6: Software Development Life Cycles and Methodologies
      1. ABSTRACT
      2. INTRODUCTION
      3. SDLCS AND METHODOLOGIES
      4. APPLICATION DEVELOPMENT
      5. KEY ISSUES IN FUTURE APPLICATION DEVELOPMENT
      6. LIMITATIONS AND FUTURE RESEARCH
      7. CONCLUSION
    7. Chapter 7: Model-Driven Engineering of Composite Service Oriented Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. FEATURES OF COMPOSITE SERVICE ORIENTED APPLICATIONS
      4. COMPOSITE APPLICATION FRAMEWORKS
      5. A MODEL-DRIVEN COMPOSITE APPLICATION ENGINEERING METHODOLOGY
      6. CASE STUDY: DEVELOPING A COMPOSITE ISSUE MANAGEMENT APPLICATION USING SERVICES
      7. DISCUSSION AND CONCLUSION
    8. Chapter 8: A Service Oriented Architecture for Coordination in Collaborative Environments
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORKS
      4. A SERVICE ORIENTED ARCHITECTURE
      5. WEB SERVICES TO SUPPORT COORDINATION
      6. CONCLUSION AND FUTURE WORK
    9. Chapter 9: Mobile Enterprise Architecture Framework
      1. ABSTRACT
      2. INTRODUCTION
      3. RESEARCH DESIGN
      4. CONCEPTUAL FRAMEWORK
      5. ARCHITECTURE PROCESS MODEL AND METHODOLOGY
      6. DEMONSTRATION OF CONCEPT
      7. CONCLUSION
    10. Chapter 10: Testable Theory Development for Small-N Studies
      1. ABSTRACT
      2. INTRODUCTION
      3. HOW DOES CRITICAL REALISM INFLUENCE RESEARCH?
      4. BUILDING THEORY FOR A COMPARATIVE CASE STUDY
      5. CONCLUSION
    11. Chapter 11: Multi-Level Service Infrastructure for Geovisual Analytics in the Context of Territorial Management
      1. ABSTRACT
      2. THE IMPORTANCE OF GI FOR ENVIRONMENTAL MANAGEMENT
      3. THE ROLE OF 3D GI
      4. THE SYSTEM DEVELOPED
      5. PROCESSING SERVICES AND INTERACTIVE SERVICE ORCHESTRATION
      6. CONCLUSION AND FUTURE WORKS
    12. Chapter 12: Tracking Values in Web based Student Teacher Exchanges
      1. ABSTRACT
      2. INTRODUCTION
      3. PREVIOUS RESEARCH
      4. BACKGROUND AND RATIONALE
      5. THEORETICAL FRAMEWORK
      6. DISCUSSION
    13. Chapter 13: Business Innovation and Service Oriented Architecture
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. REVIEW
      4. 4. NORWEGIAN ESB
      5. 5. ANALYSIS
      6. 6. DISCUSSION
      7. 7. CONCLUSION
    14. Chapter 14: An Open and Service-Oriented Architecture to Support the Automation of Learning Scenarios
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCLUSION AND FUTURE WORK
    15. Chapter 15: Analysis of Click Stream Patterns using Soft Biclustering Approaches
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. BICLUSTERING APPROACH
      5. RELATED WORK
      6. EXPERIMENTAL RESULTS
      7. CONCLUSION
  7. Section 2: Security and Privacy
    1. Chapter 16: Preventative Actions for Enhancing Online Protection and Privacy
      1. ABSTRACT
      2. INTRODUCTION
      3. PHYSICAL AND FINANCIAL SECURITY – AN ANALOGY
      4. EXAMINING ATTITUDES TO SECURITY AWARENESS
      5. THE AWARENESS OF THE NEW GENERATION
      6. THE AWARENESS OF THE EDUCATORS
      7. PURSUING NEW MODELS OF EDUCATION
      8. CONCLUSION
    2. Chapter 17: Minimising Collateral Damage
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND AND RELATED WORK
      4. BUILDING BLOCKS
      5. DESIGN
      6. NOVEL APPROACH TO DATA ACQUISITION - IDAP
      7. EVALUATION
      8. CONCLUSION
    3. Chapter 18: A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. SPOOFING ATTACKS IN SIP/IMS ENVIRONMENTS
      4. RELATED WORK
      5. 4. PROPOSED MECHANISM
      6. 5. CASE STUDY
      7. 6. CONCLUSION AND FUTURE WORK
      8. APPENDIX
    4. Chapter 19: Cryptographic Approaches for Privacy Preservation in Location-Based Services
      1. ABSTRACT
      2. INTRODUCTION
      3. DESIGN CONSIDERATIONS
      4. TTP-BASED APPROACHES
      5. THE SEMI-DISTRIBUTED SETTING
      6. TTP-FREE SCHEMES
      7. CONCLUSION
    5. Chapter 20: Deploying Privacy Improved RBAC in Web Information Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. THE PIRBAC MODEL
      5. DEPLOYING PIRBAC FOR PRIVACY MANAGEMENT
      6. ROLE ENGINEERING AND MAPPING TO DATA USERS
      7. DATA FRAGMENTATION AND MAPPING TO DATA TYPES
      8. PERMISSION DEFINITION AND MAPPING TO OPERATIONS
      9. APPLICATION SPECIFICATION AND MAPPING TO BUSINESS PURPOSES
      10. CONSTRAINT SPECIFICATION AND MAPPING TO CONDITIONS AND OBLIGATIONS
      11. APPLICATION EXAMPLE
      12. CONCLUSION
  8. Compilation of References
  9. About the Contributors