166,330 research outputs found

    Strategic management of intellectual capital of the enterprise in the framework of informatization of the economy

    Get PDF
    In the course of the research, one has determined the scientific and theoretical approaches, related to the identification of the directions and tools needed to improve strategic management; one also provided the main directions of the intellectual capital formation and development within the enterprise, which include the state of the capital at the present stage and the requirements to it from the future knowledge economy: the introduction of human capital into the assets of the enterprise, the promotion of the creative activity of the employees of the enterprise by using factors of human and social capital activation, as well as the establishment of an accounting system and evaluation of intangible assets. We have highlighted a range of specific principles of the intellectual capital management at the enterprise: the establishment of a partnership between all participants of the production process within the enterprise, namely, its owners, managers, and employees; the determination of criteria for assessing the contribution of every employee into the final result of the enterprise activity; the arrangement of an integrated network of the workers’ mass participation to identify the potential reserves, improve the production efficiency, and the product quality; the development of measures upon the principles’ implementation; and the primary task orientation of management on the future competition. One formulated the scientific and methodological foundations regarding the development of measures, aimed to improve the management of the intellectual capital of an enterprise, which include a sequence, the procedure of determination, the justification, the evaluation of the appropriateness of particular measures, the involvement of a wide range of workers in their development via the methods of interrogation and questionin

    An Overview of Economic Approaches to Information Security Management

    Get PDF
    The increasing concerns of clients, particularly in online commerce, plus the impact of legislations on information security have compelled companies to put more resources in information security. As a result, senior managers in many organizations are now expressing a much greater interest in information security. However, the largest body of research related to preventing breaches is technical, focusing on such issues as encryption and access control. In contrast, research related to the economic aspects of information security is small but rapidly growing. The goal of this technical note is twofold: i) to provide the reader with an structured overview of the economic approaches to information security and ii) to identify potential research directions

    Urban management revolution: intelligent management systems for ubiquitous cities

    Get PDF
    A successful urban management support system requires an integrated approach. This integration includes bringing together economic, socio-cultural and urban development with a well orchestrated transparent and open decision making mechanism. The paper emphasises the importance of integrated urban management to better tackle the climate change, and to achieve sustainable urban development and sound urban growth management. This paper introduces recent approaches on urban management systems, such as intelligent urban management systems, that are suitable for ubiquitous cities. The paper discusses the essential role of online collaborative decision making in urban and infrastructure planning, development and management, and advocates transparent, fully democratic and participatory mechanisms for an effective urban management system that is particularly suitable for ubiquitous cities. This paper also sheds light on some of the unclear processes of urban management of ubiquitous cities and online collaborative decision making, and reveals the key benefits of integrated and participatory mechanisms in successfully constructing sustainable ubiquitous cities

    Business and Information System Alignment Theories Built on eGovernment Service Practice: An Holistic Literature Review

    Get PDF
    © 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution 3.0 License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.This chapter examines previous studies of alignment between business and information systems holistically in relation to the development of working associations among professionals from information system and business backgrounds in business organization and eGovernment sectors while investigating alignment research that permits the development and growth of information system, which is appropriate, within budget and on-time development. The process of alignment plays a key role in the construction of dependent associations among individuals from two different groups, and the progress of alignment could be enhanced by emerging an information system according to the investors’ prospects. The chapter presents system theory to gather and analyze the data across the designated platforms. The outcomes classify that alignment among business and information system departments remains a priority and is of worry in different ways in diverse areas, which provides prospects for the forthcoming discussion and research.Final Published versio

    Gaming security by obscurity

    Get PDF
    Shannon sought security against the attacker with unlimited computational powers: *if an information source conveys some information, then Shannon's attacker will surely extract that information*. Diffie and Hellman refined Shannon's attacker model by taking into account the fact that the real attackers are computationally limited. This idea became one of the greatest new paradigms in computer science, and led to modern cryptography. Shannon also sought security against the attacker with unlimited logical and observational powers, expressed through the maxim that "the enemy knows the system". This view is still endorsed in cryptography. The popular formulation, going back to Kerckhoffs, is that "there is no security by obscurity", meaning that the algorithms cannot be kept obscured from the attacker, and that security should only rely upon the secret keys. In fact, modern cryptography goes even further than Shannon or Kerckhoffs in tacitly assuming that *if there is an algorithm that can break the system, then the attacker will surely find that algorithm*. The attacker is not viewed as an omnipotent computer any more, but he is still construed as an omnipotent programmer. So the Diffie-Hellman step from unlimited to limited computational powers has not been extended into a step from unlimited to limited logical or programming powers. Is the assumption that all feasible algorithms will eventually be discovered and implemented really different from the assumption that everything that is computable will eventually be computed? The present paper explores some ways to refine the current models of the attacker, and of the defender, by taking into account their limited logical and programming powers. If the adaptive attacker actively queries the system to seek out its vulnerabilities, can the system gain some security by actively learning attacker's methods, and adapting to them?Comment: 15 pages, 9 figures, 2 tables; final version appeared in the Proceedings of New Security Paradigms Workshop 2011 (ACM 2011); typos correcte

    Restructuring of Human Resource Management In The U.S.: Strategic Diversity

    Get PDF
    Change is endemic in the U. S. economy and in worker-management relations. This change can be examined from the perspective of increasing centralization in which public policy dictates that corporations and the state act in concert, to a decentralized market system in which assets are constantly being reconfigured to more productive uses. This paper looks at the evolution of industrial relations and personnel administration to human resource management within this context of continual change through centralized versus decentralized perspectives. Major shifts in HR policies in American companies are described. Within these major shifts, a wide diversity of policy options for workermanagement relations exist. A strategic-contingency model may provide a unifying framework to assist decision makers in choosing among these policy options
    corecore