Linked e-resources

Details

Intro; Preface; Recommended Further Reading; References; Acknowledgments; Organization; Contents; Visionary Papers; A Critical Discussion of Some Current and Future Developments of IT; Abstract; 1 The Ambivalence of Current and Future IT Developments; 1.1 Moving Activities into the Web; 1.2 Information Digitization; 1.3 Finding Reliable Information in the Web and Social Networks; 1.4 Artificial Intelligence (AI); 1.5 Big Data and Big Data Analysis; 1.6 Other Issues; 2 Some Novel Ideas to Avoid Some Dangers of New IT Technology; 2.1 Moving Activities into the Web; 2.2 Information Digitization

2.3 Finding Reliable Information in the Web and Social Networks2.4 Artificial Intelligence (AI); 2.5 Big Data and Big Data Analysis; 2.6 Other Issues; 3 Conclusion and a Warning of Hubris; References; The Quest for Infrastructures and Engineering Methods Enabling Highly Dynamic Autonomous Systems; 1 Introduction; 2 Autonomous Driving; 3 Industry 4.0
Production of the Future; 4 Towards the Decimeter Internet; 5 Dependability Engineering of Adaptive Systems; 6 Conclusion; References; Shifting Paradigms in Innovation Management
Organic Growth Strategies in the Cloud; Abstract; 1 Introduction

2 Factors Influencing the Innovation Strategies2.1 Innovation Influenced by Engineering Philosophy; 2.2 Innovation Influenced by Culture
Still Not Considered Enough; 2.3 Innovation and the 6th Kontradieff Cycle
Speed Is Increasing; 2.4 Innovation and Positive Leadership; 3 New Cloud Driven Innovation Patterns; 3.1 Cloud Driven Strategies Are Already in Place; 3.2 List of Innovation Patterns Applying the Cloud Environment; 4 Cloud-Driven Strategies Framework; 4.1 Goals for a Cloud Driven Innovation Strategy; 4.2 A Profile of Critical Mass Factors; 5 Relationship with the SPI Manifesto

AcknowledgementsReferences; SPI and Safety and Security; RISKEE: A Risk-Tree Based Method for Assessing Risk in Cyber Security; 1 Introduction; 2 Background and Related Work; 2.1 Towards Unified Quantitative Risk Assessment of Safety and Security; 2.2 FAIR; 3 Contribution: The RISKEE Method; 3.1 Structure and Framework; 3.2 Using RISKEE; 3.3 Process; 3.4 Calculation of Risk; 3.5 Computations on Probability Distributions; 3.6 Threats to Validity and Limitations; 4 Conclusion and Future Work; References; Designing and Integrating IEC 62443 Compliant Threat Analysis; 1 Introduction

2 Overview of the Secure Development Lifecycle3 Threat Analysis Compliant with IEC 62443; 3.1 Initial Situation; 3.2 Threat Analysis Requirements; 3.3 Threat Analysis Solution; 3.4 Requirements Fulfillment; 4 Lessons Learned; 4.1 Findings Concerning the Process; 4.2 Findings Concerning the Threat Analysis; 4.3 Further Findings; 5 Conclusion; References; Extending the Shell Model via Cause/Consequence Analysis of Component Failures; Abstract; 1 Introduction; 2 Related Work; 3 Shell Model Background; 4 Extending the Shell Model; 4.1 Consequence Analysis Using Modified FMEA

Browse Subjects

Show more subjects...

Statistics

from
to
Export