Browse Results

Showing 82,301 through 82,325 of 82,665 results

Programming Languages and Systems: 33rd European Symposium on Programming, ESOP 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Luxembourg City, Luxembourg, April 6–11, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14577)

by Stephanie Weirich

The two-volume open access book set LNCS 14576 + 14577 constitutes the proceedings of the 33rd European Symposium on Programming, ESOP 2024, which was held during April 6-11, 2024, in Luxemburg, as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024.The 25 full papers and 1 fresh perspective paper presented in these proceedings were carefully reviewed and selected from 72 submissions. The papers were organized in topical sections as follows:Part I: Effects and modal types; bidirectional typing and session types; dependent types; Part II: Quantum programming and domain-specific languages; verification; program analysis; abstract interpretation.

Audit Analytics: Data Science for the Accounting Profession (Use R!)

by J. Christopher Westland

This book, using R and RStudio, demonstrates how to render an audit opinion that is legally and statistically defensible; analyze, extract, and manipulate accounting data; build a risk assessment matrix to inform the conduct of a cost-effective audit program; and more. Today, information technology plays a pivotal role in financial control and audit: most financial data is now digitally recorded and dispersed among servers, clouds and networks over which the audited firm has no control. Additionally, a firm’s data—particularly in the case of finance, software, insurance and biotech firms—comprises most of the audited value of the firm. Financial audits are critical mechanisms for ensuring the integrity of information systems and the reporting of organizational finances. They help avoid the abuses that led to passage of legislation such as the Foreign Corrupt Practices Act (1977), and the Sarbanes-Oxley Act (2002). Audit effectiveness has declined over the past two decades, as auditor skillsets have failed to keep up with advances in information technology. Information and communication technology lie at the core of commerce today and are integrated in business processes around the world. This book is designed to meet the increasing need of audit professionals to understand information technology and the controls required to manage it. This 2nd edition includes updated code and test. Machine learning, AI, and SEC’s EDGAR data are also, improved and updated. The material included focuses on the requirements for annual Securities and Exchange Commission audits (10-K) for listed corporations. These represent the benchmark auditing procedures for specialized audits, such as internal, governmental, and attestation audits. Many examples reflect the focus of the 2024 CPA exam, and the data analytics-machine learning approach will be central to the AICPA’s programs, in the near future.

Reinforcement Learning: Aktuelle Ansätze verstehen – mit Beispielen in Java und Greenfoot

by Uwe Lorenz

In uralten Spielen wie Schach oder Go können sich die brillantesten Spieler verbessern, indem sie die von einer Maschine produzierten Strategien studieren. Robotische Systeme üben ihre Bewegungen selbst. In Arcade Games erreichen lernfähige Agenten innerhalb weniger Stunden übermenschliches Niveau. Wie funktionieren diese spektakulären Algorithmen des bestärkenden Lernens? Mit gut verständlichen Erklärungen und übersichtlichen Beispielen in Java und Greenfoot können Sie sich die Prinzipien des bestärkenden Lernens aneignen und in eigenen intelligenten Agenten anwenden. Greenfoot (M.Kölling, King’s College London) und das Hamster-Modell (D.Bohles, Universität Oldenburg) sind einfache, aber auch mächtige didaktische Werkzeuge, die entwickelt wurden, um Grundkonzepte der Programmierung zu vermitteln. Wir werden Figuren wie den Java-Hamster zu lernfähigen Agenten machen, die eigenständig ihre Umgebung erkunden. Die zweite Auflage enthält neue Themen wie "Genetische Algorithmen" und "Künstliche Neugier" sowie Korrekturen und Überarbeitungen.

The Accidental CIO: A Lean and Agile Playbook for IT Leaders

by Scott Millett

An indispensable guide showing IT leaders the way to balance the needs of innovation and exploration with exploitation and operational reliability Many books on modern IT leadership focus solely on supporting innovation and disruption. In practice these must be balanced with the need to support waste reduction in existing processes and capabilities while keeping the foundation operational, secure, compliant with regulations, and cost effective. In The Accidental CIO, veteran software developer-turned-executive Scott Millett delivers an essential playbook to becoming an impactful, strategic leader at any stage of your IT leadership journey from your earliest aspirations to long time incumbents in director and C-suite roles. You’ll find a wealth of hands-on advice for tackling the many challenges and paradoxes that face technology leaders, from creating an aligned IT strategy, defining a target architecture, designing a balanced operating model, and leading teams and executing strategy. After the foreword from Simon Wardley, The Accidental CIO will help you: Understand problem contexts you will face using the Cynefin decision making framework, and how the philosophies of agile, lean and design thinking can help manage them. Design an adaptive and strategically aligned operating model by applying the appropriate ways of working and governance approaches depending on each unique problem context. Organize a department using a blend of holacratic and hierarchical principles, and leveraging modern approaches such as Team Topology and Socio-technical patterns. Develop and deploy an effective and aligned IT Strategy using Wardley mapping based on a deep knowledge of your business architecture. With this knowledge you’ll be ready to create an empowered IT organization focused on solving customer problems and generating enterprise value. You’ll understand the science behind what motivates teams and changes behavior. And you’ll show your skills as a business leader thinking beyond IT outputs to impactful business outcomes.

Advances in Manufacturing IV: Volume 1 - Mechanical Engineering: Digitalization, Sustainability and Industry Applications (Lecture Notes in Mechanical Engineering)

by Bartosz Gapiński Olaf Ciszak Vitalii Ivanov Jose Mendes Machado

The book covers timely topics in mechanical engineering, with a special attention to advances in machine design, product assembly, technological aspects of production, mechatronics and production maintenance. Gathering peer-review contributions to the 8th International Scientific-Technical Conference MANUFACTURING 2024, held on May 14-16, 2024, in Poznan, Poland, it reports on cutting-edge research and methods fostering design processes, optimization of industrial processes, such as welding and molding, and machining, with an emphasis on sustainable solutions. All in all, this book offers a timely guide for researchers and professionals in mechanical engineering and manufacturing, yet it is also intended to foster communication and cooperation between universities and industrial partners.

Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications (Contributions to Environmental Sciences & Innovative Business Technology)

by Adarsh Kumar Neelu Jyothi Ahuja Keshav Kaushik Deepak Singh Tomar Surbhi Bhatia Khan

This book focuses on the sustainable security practices in the domain of blockchain, quantum, and post-quantum technologies dealing with the real-time applications. The topics discussed in this book include banking applications, protection of digital assets in healthcare, military defense applications, supply chain management, secure messaging, and keyless secure infrastructures.Blockchains and quantum technologies are the emerging technological developments both in academic and industrial domains. The problems related to quantum threat and execution of post-quantum signatures in a blockchain platform have become hot topics in today's scientific community because they have remarkably progressed in recent years and have found a variety of applications.This book is a valuable resource for academicians, researchers, students, and technicians in the field of blockchain and quantum computing.

Intelligent Information Processing XII: 13th IFIP TC 12 International Conference, IIP 2024, Shenzhen, China, May 3–6, 2024, Proceedings, Part I (IFIP Advances in Information and Communication Technology #703)

by Zhongzhi Shi Jim Torresen Shengxiang Yang

The two-volume set IFIP AICT 703 and 704 constitutes the refereed conference proceedings of the 13th IFIP TC 12 International Conference on Intelligent Information Processing XII, IIP 2024, held in Shenzhen, China, during May 3–6, 2024. The 49 full papers and 5 short papers presented in these proceedings were carefully reviewed and selected from 58 submissions. The papers are organized in the following topical sections: Volume I: Machine Learning; Natural Language Processing; Neural and Evolutionary Computing; Recommendation and Social Computing; Business Intelligence and Risk Control; and Pattern Recognition. Volume II: Image Understanding.

Exploring Blockchain Applications: Management Perspectives


In this book, the development process of blockchain algorithms and examples of their applications in different sectors are explored. The opportunities and challenges of blockchain implementations that arise in making technological innovations usable in corporate structures are discussed. In this respect, the book aims to deal with both the conceptual framework and the real challenges and opportunities encountered in practice regarding the blockchain applications. It is tried to contribute to the literature by presenting practical blockchain application suggestions to the readers on a scientific basis.It is a fact that blockchain technology is considered one of the most disruptive and revolutionary innovations after the invention of the internet. Blockchain technology, which was first used for cross-border payments, is coming up with a new application area in a different sector every day. The main purpose of Blockchain-based systems is to spread the "trust" service provided by a central intermediary to machines in transactions between two parties. Thus, it removes the need for this trust from the monopoly of a single intermediary. Blockchain implementation scenarios are to establish math-based trust in an untrusted environment.While exploring the complexity of blockchain applications in different sectors, the emerging risks are also examined from a management perspective. In particular, it is aimed to be a key work that the management levels of the enterprises can benefit from in the decision-making processes.It will be seen that blockchain technologies will be used unlimitedly in design, planning, management and decision making. This book will also introduce new visions for practitioners to use different blockchain technologies and methodologies to face problems.

Exploring Blockchain Applications: Management Perspectives

by Sezer Bozkus Kahyaoglu Vahap Tecim

In this book, the development process of blockchain algorithms and examples of their applications in different sectors are explored. The opportunities and challenges of blockchain implementations that arise in making technological innovations usable in corporate structures are discussed. In this respect, the book aims to deal with both the conceptual framework and the real challenges and opportunities encountered in practice regarding the blockchain applications. It is tried to contribute to the literature by presenting practical blockchain application suggestions to the readers on a scientific basis.It is a fact that blockchain technology is considered one of the most disruptive and revolutionary innovations after the invention of the internet. Blockchain technology, which was first used for cross-border payments, is coming up with a new application area in a different sector every day. The main purpose of Blockchain-based systems is to spread the "trust" service provided by a central intermediary to machines in transactions between two parties. Thus, it removes the need for this trust from the monopoly of a single intermediary. Blockchain implementation scenarios are to establish math-based trust in an untrusted environment.While exploring the complexity of blockchain applications in different sectors, the emerging risks are also examined from a management perspective. In particular, it is aimed to be a key work that the management levels of the enterprises can benefit from in the decision-making processes.It will be seen that blockchain technologies will be used unlimitedly in design, planning, management and decision making. This book will also introduce new visions for practitioners to use different blockchain technologies and methodologies to face problems.

Fundamental Approaches to Software Engineering: 27th International Conference, FASE 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Luxembourg City, Luxembourg, April 6–11, 2024, Proceedings (Lecture Notes in Computer Science #14573)

by Dirk Beyer Ana Cavalcanti

This open access book constitutes the proceedings of the 27th International Conference on Fundamental Approaches to Software Engineering, FASE 2024, held in conjunction with ETAPS 2024 which took place in Luxembourg in April 2024. The 14 full papers included in this book were carefully reviewed and selected from 41 submission. The proceedings also include 5 short papers from the Test-Comp 2024 event that was hosted by FASE. They deal with the broad field of software engineering, focusing on requirements, design, architecture, modeling, applications of AI to software engineering and software engineering for AI-based systems, quality, model-driven engineering, processes, and software evolution.

Accountable and Explainable Methods for Complex Reasoning over Text

by Pepa Atanasova

This thesis presents research that expands the collective knowledge in the areas of accountability and transparency of machine learning (ML) models developed for complex reasoning tasks over text. In particular, the presented results facilitate the analysis of the reasons behind the outputs of ML models and assist in detecting and correcting for potential harms. It presents two new methods for accountable ML models; advances the state of the art with methods generating textual explanations that are further improved to be fluent, easy to read, and to contain logically connected multi-chain arguments; and makes substantial contributions in the area of diagnostics for explainability approaches. All results are empirically tested on complex reasoning tasks over text, including fact checking, question answering, and natural language inference. This book is a revised version of the PhD dissertation written by the author to receive her PhD from the Faculty of Science, University ofCopenhagen, Denmark. In 2023, it won the Informatics Europe Best Dissertation Award, granted to the most outstanding European PhD thesis in the field of computer science.

Innovative Methods in Computer Science and Computational Applications in the Era of Industry 5.0: Proceedings of the 5th International Conference on Artificial Intelligence and Applied Mathematics in Engineering ICAIAME 2023, Volume 1 (Engineering Cyber-Physical Systems and Critical Infrastructures #9)

by D. Jude Hemanth Utku Kose Bogdan Patrut Mevlut Ersoy

This book provides a wide collection of the recent studies triggering innovative ways to advance computer science and computational applications. The collection enables readers to understand more about technological conditions advancing industrial perspectives towards Industry 5.0. The research studies included in the book were accepted and presented in the 5th International Conference on Artificial Intelligence and Applied Mathematics in Engineering (ICAIAME 2023), which was held in Belek, Antalya, Turkey (on 3–4–5 November 2023). By covering the scientific scope of the conference, the book informs the readers about the cutting-edge data-driven solution aspects, intelligent algorithms, and mathematical background applied for solving different kinds of engineering problems. The book is used as a reference source by the wide readership including international researchers, professionals, practitioners from industry, degree students, and experts from all engineering disciplines.

Innovative Methods in Computer Science and Computational Applications in the Era of Industry 5.0: Proceedings of the 5th International Conference on Artificial Intelligence and Applied Mathematics in Engineering ICAIAME 2023, Volume 2 (Engineering Cyber-Physical Systems and Critical Infrastructures #10)

by D. Jude Hemanth Utku Kose Bogdan Patrut Mevlut Ersoy

This book provides a wide collection of the recent studies triggering innovative ways to advance computer science and computational applications. The collection enables readers to understand more about technological conditions advancing industrial perspectives towards Industry 5.0. The research studies included in the book were accepted and presented in the 5th International Conference on Artificial Intelligence and Applied Mathematics in Engineering (ICAIAME 2023), which was held in Belek, Antalya, Turkey (on 3–4–5 November 2023). By covering the scientific scope of the conference, the book informs the readers about the cutting-edge data-driven solution aspects, intelligent algorithms, and mathematical background applied for solving different kinds of engineering problems. The book is used as a reference source by the wide readership including international researchers, professionals, practitioners from industry, degree students, and experts from all engineering disciplines.

Oh, Bother: Winnie-the-Pooh is Befuddled, Too (A Smackerel-Sized Parody of Modern Life)

by Jennie Egerdie

Welcome back to the Hundred Acre Wood as Winnie-the-Pooh and friends acclimate to the joys and worries of the 21st century in this heartfelt parody. The world has changed in the hundred years since A. A. Milne introduced us to Winnie-the-Pooh and his pals, but that doesn&’t mean our lovable friends haven&’t adapted to life in the twenty-first century. In this heartwarming, laugh-out-loud parody, Jennie Egerdie, author of the celebrated Frog and Toad are Doing Their Best, takes us along for some marvelous misadventures as the gang grapples with modern life&’s headaches and pesky predicaments. Like the rest of us, Pooh worries about what the dwindling bee population will do to his beloved honey, while Owl discovers how far too easily misinformation can spread online. Kanga hopes she can have a night off from raising Roo, and Eeyore is finally taking care of his mental health with the help of Dr Festinker, the neighborhood therapist (and skunk). Things may not always make sense in our world, but Winnie-the-Pooh always bounds ahead, day by day and smackeral by smackeral.

Gudetama Cross-Stitch: 30 Easy-to-Follow Patterns from Your Favorite Lazy Egg

by Sosae Caetano Dennis Caetano

Gudetama Cross-Stitch combines cross-stitching fun with 30 easy-to-follow patterns inspired by everyone's favorite lazy egg with the can't-be-bothered attitude. Gudetama&’s name literally translates to &“lazy egg,&” and it&’s how we all feel sometimes when it comes to, well, pretty much anything. But if you&’re the kind of person who doesn&’t have time for complicated crafts or dealing with other people, then this collection of 30 Gudetama-inspired designs are just for you. First, you&’ll learn cross-stitching basics including tools and techniques and how to read a cross-stitch chart. Then you&’ll apply your new skills to a range of hilarious and lovable patterns organized into chapters like Lazy, Medium-Lazy, and Pay Attention—depending on how sluggish or motivated you&’re feeling. Finally, you&’ll be able to apply your masterpieces to projects like gift tags, greeting cards, and ornaments. Whether you&’re an experienced cross-stitcher or new to the craft, you&’ll find a variety of poses and patterns in this book that are accessible and easy to learn. With a little patience and practice, anyone can bring these Gudetama-inspired masterpieces to life. And if not, just take a nap.

Intelligent Information Processing XII: 13th IFIP TC 12 International Conference, IIP 2024, Shenzhen, China, May 3–6, 2024, Proceedings, Part II (IFIP Advances in Information and Communication Technology #704)

by Zhongzhi Shi Jim Torresen Shengxiang Yang

The two-volume set IFIP AICT 703 and 704 constitutes the refereed conference proceedings of the 13th IFIP TC 12 International Conference on Intelligent Information Processing XII, IIP 2024, held in Shenzhen, China, during May 3–6, 2024. The 49 full papers and 5 short papers presented in these proceedings were carefully reviewed and selected from 58 submissions. The papers are organized in the following topical sections: Volume I: Machine Learning; Natural Language Processing; Neural and Evolutionary Computing; Recommendation and Social Computing; Business Intelligence and Risk Control; and Pattern Recognition.Volume II: Image Understanding.

Space and Play in Japanese Videogame Arcades (Routledge Contemporary Japan Series)

by Jérémie Pelletier-Gagnon

This book presents a scholarly investigation of the development and culture of Japanese videogame arcades, both from a historical and contemporary point of view.Providing an overview of the historical evolution of public amusement spaces from the early rooftop amusement spaces from the early nineteenth century to the modern multi‑floor and interconnected arcade complexes that characterize the urban fabric of contemporary Japan, the book argues that arcade videogames and their associated practices must be examined in the context in which they are played, situated in the interrelation between the game software, the cabinets as material conditions of play, and the space of the venue that frames the experience. Including three case studies of distinct and significant game centres located in Tokyo and Kyoto, the book addresses of play in public, including the notion of performance and observation as play practices, spatial appropriation, as well as the compartmentalization of the play experience.In treating videogames as sets of circumstances, the book identifies the opportunities for ludic practices that videogame arcades provide in Japan. As such, it will appeal to students and scholars of Game Studies and Digital Media Studies, as well as those of Japanese Culture and Society.

Space and Play in Japanese Videogame Arcades (Routledge Contemporary Japan Series)

by Jérémie Pelletier-Gagnon

This book presents a scholarly investigation of the development and culture of Japanese videogame arcades, both from a historical and contemporary point of view.Providing an overview of the historical evolution of public amusement spaces from the early rooftop amusement spaces from the early nineteenth century to the modern multi‑floor and interconnected arcade complexes that characterize the urban fabric of contemporary Japan, the book argues that arcade videogames and their associated practices must be examined in the context in which they are played, situated in the interrelation between the game software, the cabinets as material conditions of play, and the space of the venue that frames the experience. Including three case studies of distinct and significant game centres located in Tokyo and Kyoto, the book addresses of play in public, including the notion of performance and observation as play practices, spatial appropriation, as well as the compartmentalization of the play experience.In treating videogames as sets of circumstances, the book identifies the opportunities for ludic practices that videogame arcades provide in Japan. As such, it will appeal to students and scholars of Game Studies and Digital Media Studies, as well as those of Japanese Culture and Society.

Global Cybersecurity and International Law (Routledge Research in Information Technology and E-Commerce Law)

by Antonio Segura Serrano

This book offers a critical analysis of cybersecurity from a legal-international point of view.Assessing the need to regulate cyberspace has triggered the re-emergence of new primary norms. This book evaluates the ability of existing international law to address the threat and use of force in cyberspace, redefining cyberwar and cyberpeace for the era of the Internet of Things. Covering critical issues such as the growing scourge of economic cyberespionage, international co-operation to fight cybercrime, the use of foreign policy instruments in cyber diplomacy, it also looks at state backed malicious cyberoperations, and the protection of human rights against State security activities. Offering a holistic examination of the ability of public international law, the book addresses the most pressing issues in global cybersecurity.Reflecting on the reforms necessary from international institutions, like the United Nations, the European Union, the Council of Europe, and NATO, in order to provide new answers to the critical issues in global cybersecurity and international law, this book will be of interest to academics, students and practitioners.

Global Cybersecurity and International Law (Routledge Research in Information Technology and E-Commerce Law)


This book offers a critical analysis of cybersecurity from a legal-international point of view.Assessing the need to regulate cyberspace has triggered the re-emergence of new primary norms. This book evaluates the ability of existing international law to address the threat and use of force in cyberspace, redefining cyberwar and cyberpeace for the era of the Internet of Things. Covering critical issues such as the growing scourge of economic cyberespionage, international co-operation to fight cybercrime, the use of foreign policy instruments in cyber diplomacy, it also looks at state backed malicious cyberoperations, and the protection of human rights against State security activities. Offering a holistic examination of the ability of public international law, the book addresses the most pressing issues in global cybersecurity.Reflecting on the reforms necessary from international institutions, like the United Nations, the European Union, the Council of Europe, and NATO, in order to provide new answers to the critical issues in global cybersecurity and international law, this book will be of interest to academics, students and practitioners.

Research Challenges in Information Science: 18th International Conference, RCIS 2024, Guimarães, Portugal, May 14–17, 2024, Proceedings, Part I (Lecture Notes in Business Information Processing #513)

by João Araújo Jose Luis de la Vara Maribel Yasmina Santos Saïd Assar

This book constitutes the proceedings of the 18th International Conference on Research Challenges in Information Sciences, RCIS 2024, which took place in Guimarães, Portugal, during May 2024. The scope of RCIS is summarized by the thematic areas of information systems and their engineering; user-oriented approaches; data and information management; business process management; domain-specific information systems engineering; data science; information infrastructures, and reflective research and practice. The 25 full papers, 12 Forum and 5 Doctoral Consortium papers included in these proceedings were carefully reviewed and selected from 100 submissions. They were organized in topical sections as follows: Part I: Data and information management; conceptual modelling and ontologies; requirements and architecture; business process management; data and process science; security; sustainability; evaluation and experience studies Part II: Forum papers; doctoral consortium papers.

ICT for Engineering & Critical Infrastructures: Proceedings of the 3rd American University in the Emirates International Research Conference, AUEIRC'20—Dubai, UAE 2020 (Advances in Science, Technology & Innovation)

by Asma Salman Assem Tharwat

This book—consisting of four parts—brings forth a comprehensive evaluation of information and communication technologies (ICTs) utilization in engineering and infrastructures. The field of engineering has consistently been a bastion of problem-solving and innovation. It has continuously aided humanity in conquering seemingly unsolvable obstacles by pushing the limits of human capability and ingenuity. In the modern age, modern computational methods and digital systems present themselves as the frontier of novel technological innovation, thus attaining the potential to considerably strengthen various engineering fields. Tackling essential topics such as the incorporation of informatics in infrastructure, cybersecurity, advanced networking techniques, and smart resource management, this book peers into the future of engineering, proving as an excellent resource for engineers, entrepreneurs, policymakers, network specialists, and finally, computer scientists.

Digital Transformation of SAP Supply Chain Processes: Build Mobile Apps Using SAP BTP and SAP Mobile Services

by Pranay Gupta

Take a high-level tour of SAP oDATA integrations with frontend technologies like Angular using the SAP Mobile Services Platform. This book will give you a different perspective on executing SAP transactions on iOS using Angular instead of SAP-provided Fiori-based applications. You’ll start by learning about SAP supply chain processes such as Goods Receipt, Transfer Posting, Goods Issue, and Inventory Search. You’ll then move on to understanding the thought process involved in integrating SAP's backend (SAP ECC) with Angular iOS app using SAP Mobile Services running on SAP BTP. All this will serve as a guide tailored to SAP functional and technical consultants actively engaged in client-facing roles. You’ll follow a roadmap for modernizing and streamlining supply chain operations by leveraging Angular iOS apps. Digital Transformation of SAP Supply Chain Processes provides the essential tools for businesses looking to stay competitive in today's technology-driven landscape. What You Will Learn Study the fundamental procedures to set up the Authorization Endpoint, Token Endpoint, and base URL within SAP Mobile Services.Manage attachments in mobile applications and store them in an external content repository. Gain proficiency in testing OData services using the POSTMAN API client with OAuth protocol.Acquire knowledge about the JSON messages, CORS protocol, and X-CSRF token exchange.Link Zebra Printers through the Zebra Native Printing app on iOS App to print SAP forms on mobile printers. Who This Book Is For SAP Consultants with an interest in the Digital Transformation of SAP Supply Chain Processes to iOS-based SAP transactions.

Blockchain and Smart-Contract Technologies for Innovative Applications

by Nour El Madhoun Ioanna Dionysiou Emmanuel Bertin

This book is an in-depth exploration of blockchain and smart contracts technologies, systematically addressing their theoretical foundations while highlighting concrete applications in several key sectors. It begins by defining the fundamentals of blockchain and smart contracts, then ventures into the legal domain, analyzing the implications of automated contracts from both backend and frontend perspectives. A particular focus is placed on a sustainable design for cryptocurrencies, anticipating the principles and expectations of the future. The book then provides a detailed taxonomy of blockchain's financial applications, while also examining its role in managing scientific workflows. The fascinating world of NFTs is also explored, from the tokenization of fine arts to innovative event ticketing systems. The convergence between ontologies and blockchain technology is then highlighted, followed by an in-depth assessment of the implications of this technology in the telecommunicationssector, including a SWOT analysis of next-generation cellular networks. Written by academic researchers and industry experts, this book offers a complete and nuanced perspective on the transformational potential of blockchain.

Customer Centricity: Innovative Unternehmenspraxis: Insights, Strategien und Impulse

by Susanne O’Gorman Gabriele Schuster

Dieses Buch schlägt eine Brücke zwischen wissenschaftlicher Forschung zu Customer Centricity und ihrer praxisorientierten Anwendung. Das Interesse und die Begeisterung für Customer Centricity sind seit einigen Jahren ungebrochen, doch trotz reger Forschungstätigkeit und großem Interesse aus der Praxis scheitern viele Unternehmen nach wie vor an der Umsetzung. Zahlreiche Beitragsautor:innen betrachten in diesem Buch sowohl die Perspektive der Konsument:innen als auch der Unternehmen und integrieren zukunftsorientierte Ansätze wie Design Thinking, Augmented/Virtual Reality und CX-Plattformen. Die Leser:innen erhalten wissenschaftlich fundierte Handlungsempfehlungen für ein kundenzentriertes Unternehmen von praxiserfahrenen Expert:innen.Mit Beiträgen von:Prof. Dr. Laura-Maria AltendorferElaine BecraftProf. Dr. Thomas BolzProf. Dr. Benny BriesemeisterChristian FeddersenCharlotte FietzLivia FreudlTim GnanntProf. Dr. Stefan Godehardt-BestmannDr. Gregor ElbelProf. Dr. Katja GruppMatthias HackenbrachtProf. Dr. Cansu HattulaProf. Dr. Clare HindleyProf. Dr. Nicole KleinProf. Dr. Alexandra KühtePhilip MaloneyProf. Dr. Rico ManßProf. Dr. Astrid MühlböckProf. Dr. Bettina-Maria Müller Prof. Dr. Miriam O’SheaProf. Dr. Katharina RehfeldProf. Dr. Christian SchachtnerProf. Dr. Katrin E. ScheinProf. Dr. Uta ScheunertProf. Dr. Inga F. SchlömerProf. Dr. Benjamin Schulte Stephan SchusserMelanie StehrDr. Sascha TammTimo ThuencherNeal WesslingProf. Dr. Annegret Wittmann-Wurzer Prof. Dr. Nicola ZechProf. Dr. Matthias ZeisbergDr. Li Zeng

Refine Search

Showing 82,301 through 82,325 of 82,665 results