166,330 research outputs found
Strategic management of intellectual capital of the enterprise in the framework of informatization of the economy
In the course of the research, one has determined the scientific and theoretical
approaches, related to the identification of the directions and tools needed to improve strategic
management; one also provided the main directions of the intellectual capital formation and
development within the enterprise, which include the state of the capital at the present stage and
the requirements to it from the future knowledge economy: the introduction of human capital into
the assets of the enterprise, the promotion of the creative activity of the employees of the
enterprise by using factors of human and social capital activation, as well as the establishment
of an accounting system and evaluation of intangible assets. We have highlighted a range of
specific principles of the intellectual capital management at the enterprise: the establishment of
a partnership between all participants of the production process within the enterprise, namely,
its owners, managers, and employees; the determination of criteria for assessing the contribution
of every employee into the final result of the enterprise activity; the arrangement of an integrated
network of the workers’ mass participation to identify the potential reserves, improve the
production efficiency, and the product quality; the development of measures upon the principles’
implementation; and the primary task orientation of management on the future competition.
One formulated the scientific and methodological foundations regarding the development
of measures, aimed to improve the management of the intellectual capital of an enterprise, which
include a sequence, the procedure of determination, the justification, the evaluation of the
appropriateness of particular measures, the involvement of a wide range of workers in their
development via the methods of interrogation and questionin
An Overview of Economic Approaches to Information Security Management
The increasing concerns of clients, particularly in online commerce, plus the impact of legislations on information security have compelled companies to put more resources in information security. As a result, senior managers in many organizations are now expressing a much greater interest in information security. However, the largest body of research related to preventing breaches is technical, focusing on such issues as encryption and access control. In contrast, research related to the economic aspects of information security is small but rapidly growing. The goal of this technical note is twofold: i) to provide the reader with an structured overview of the economic approaches to information security and ii) to identify potential research directions
Urban management revolution: intelligent management systems for ubiquitous cities
A successful urban management support system requires an integrated approach. This integration includes bringing together economic, socio-cultural and urban development with a well orchestrated transparent and open decision making mechanism. The paper emphasises the importance of integrated urban management to better tackle the climate change, and to achieve sustainable urban development and sound urban growth management. This paper introduces recent approaches on urban management systems, such as intelligent urban management systems, that are suitable for ubiquitous cities. The paper discusses the essential role of online collaborative decision making in urban and infrastructure planning, development and management, and advocates transparent, fully democratic and participatory mechanisms for an effective urban management system that is particularly suitable for ubiquitous cities. This paper also sheds light on some of the unclear processes of urban management of ubiquitous cities and online collaborative decision making, and reveals the key benefits of integrated and participatory mechanisms in successfully constructing sustainable ubiquitous cities
Business and Information System Alignment Theories Built on eGovernment Service Practice: An Holistic Literature Review
© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution 3.0 License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.This chapter examines previous studies of alignment between business and information systems holistically in relation to the development of working associations among professionals from information system and business backgrounds in business organization and eGovernment sectors while investigating alignment research that permits the development and growth of information system, which is appropriate, within budget and on-time development. The process of alignment plays a key role in the construction of dependent associations among individuals from two different groups, and the progress of alignment could be enhanced by emerging an information system according to the investors’ prospects. The chapter presents system theory to gather and analyze the data across the designated platforms. The outcomes classify that alignment among business and information system departments remains a priority and is of worry in different ways in diverse areas, which provides prospects for the forthcoming discussion and research.Final Published versio
Gaming security by obscurity
Shannon sought security against the attacker with unlimited computational
powers: *if an information source conveys some information, then Shannon's
attacker will surely extract that information*. Diffie and Hellman refined
Shannon's attacker model by taking into account the fact that the real
attackers are computationally limited. This idea became one of the greatest new
paradigms in computer science, and led to modern cryptography.
Shannon also sought security against the attacker with unlimited logical and
observational powers, expressed through the maxim that "the enemy knows the
system". This view is still endorsed in cryptography. The popular formulation,
going back to Kerckhoffs, is that "there is no security by obscurity", meaning
that the algorithms cannot be kept obscured from the attacker, and that
security should only rely upon the secret keys. In fact, modern cryptography
goes even further than Shannon or Kerckhoffs in tacitly assuming that *if there
is an algorithm that can break the system, then the attacker will surely find
that algorithm*. The attacker is not viewed as an omnipotent computer any more,
but he is still construed as an omnipotent programmer.
So the Diffie-Hellman step from unlimited to limited computational powers has
not been extended into a step from unlimited to limited logical or programming
powers. Is the assumption that all feasible algorithms will eventually be
discovered and implemented really different from the assumption that everything
that is computable will eventually be computed? The present paper explores some
ways to refine the current models of the attacker, and of the defender, by
taking into account their limited logical and programming powers. If the
adaptive attacker actively queries the system to seek out its vulnerabilities,
can the system gain some security by actively learning attacker's methods, and
adapting to them?Comment: 15 pages, 9 figures, 2 tables; final version appeared in the
Proceedings of New Security Paradigms Workshop 2011 (ACM 2011); typos
correcte
Restructuring of Human Resource Management In The U.S.: Strategic Diversity
Change is endemic in the U. S. economy and in worker-management relations. This change can be examined from the perspective of increasing centralization in which public policy dictates that corporations and the state act in concert, to a decentralized market system in which assets are constantly being reconfigured to more productive uses. This paper looks at the evolution of industrial relations and personnel administration to human resource management within this context of continual change through centralized versus decentralized perspectives. Major shifts in HR policies in American companies are described. Within these major shifts, a wide diversity of policy options for workermanagement relations exist. A strategic-contingency model may provide a unifying framework to assist decision makers in choosing among these policy options
- …