Skip to main content
Top

2014 | OriginalPaper | Chapter

2. Fields of Application, Methods of and Current Trends in Information Management

Authors : Marek R. Ogiela, Urszula Ogiela

Published in: Secure Information Management Using Linguistic Threshold Approach

Publisher: Springer London

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Topics of information management are coming up not only in the literature of the subject [1–4] but also in everyday life. Aspects of these topics are particularly worthy of attention as this process increasingly expands beyond the boundaries of a specific business organisation – an enterprise – and is becoming widespread in politics, culture, science and, obviously, in business. This is because information management processes encompass not just simple information processing and analysis, but primarily its acquisition, collecting and transmission.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Haag, S., & Cummings, M. (2012). Management information systems for the information age. Irwin: McGraw-Hill. Haag, S., & Cummings, M. (2012). Management information systems for the information age. Irwin: McGraw-Hill.
2.
go back to reference Krcmar, H. (2006). Information management. Springer. Krcmar, H. (2006). Information management. Springer.
3.
go back to reference Ladley, J. (2010). Making enterprise information management (EIM) work for business: A guide to understanding information as an asset. Burlington: Morgan Kaufman. Ladley, J. (2010). Making enterprise information management (EIM) work for business: A guide to understanding information as an asset. Burlington: Morgan Kaufman.
4.
go back to reference Schermerhorn, J. R. (2012). Management. Hoboken: Wiley. Schermerhorn, J. R. (2012). Management. Hoboken: Wiley.
5.
go back to reference Shannon, C. E. (1945). A mathematical theory of cryptography. New York: Bell Laboratories, Classified Memorandum. Shannon, C. E. (1945). A mathematical theory of cryptography. New York: Bell Laboratories, Classified Memorandum.
6.
go back to reference Shannon, C. E. (1948). A mathematical theory of communication. New York: American Telephone and Telegraph Company. Shannon, C. E. (1948). A mathematical theory of communication. New York: American Telephone and Telegraph Company.
7.
go back to reference Ogiela, L. (2009). UBIAS systems for cognitive interpretation and analysis of medical images. Opto-Electronics Review, 17(2), 166–179.CrossRef Ogiela, L. (2009). UBIAS systems for cognitive interpretation and analysis of medical images. Opto-Electronics Review, 17(2), 166–179.CrossRef
8.
go back to reference Ogiela, L., & Ogiela, M. R. (2009). Cognitive techniques in visual data interpretation (Studies in computational intelligence, Vol. 228). Berlin/Heidelberg: Springer.CrossRef Ogiela, L., & Ogiela, M. R. (2009). Cognitive techniques in visual data interpretation (Studies in computational intelligence, Vol. 228). Berlin/Heidelberg: Springer.CrossRef
9.
go back to reference Ogiela, L., & Ogiela, M. R. (2012). Advances in cognitive information systems (Cognitive systems monographs, Vol. 17). Berlin/Heidelberg: Springer.MATHCrossRef Ogiela, L., & Ogiela, M. R. (2012). Advances in cognitive information systems (Cognitive systems monographs, Vol. 17). Berlin/Heidelberg: Springer.MATHCrossRef
10.
go back to reference Ward, J., Griffiths, P., & Whitemore, P. (1992). Strategic planning for information systems. Chichester: Wiley. Ward, J., Griffiths, P., & Whitemore, P. (1992). Strategic planning for information systems. Chichester: Wiley.
11.
go back to reference Schwarze, P. (1998). Informationsmanagement, Planung, Steuerung, Koordination und Kontrolle der Informationsversorgung im Unternehmen. Herne/Berlin: Verlag Neue Wirtschafts-Briefe. Schwarze, P. (1998). Informationsmanagement, Planung, Steuerung, Koordination und Kontrolle der Informationsversorgung im Unternehmen. Herne/Berlin: Verlag Neue Wirtschafts-Briefe.
12.
go back to reference Tipton, H. F. (2007). Information security management handbook. Boca Raton: Auerbach.MATH Tipton, H. F. (2007). Information security management handbook. Boca Raton: Auerbach.MATH
13.
go back to reference Whitman, M. E., & Mattord, H. J. (2010). Management of information security. Boston: Course Technology. Whitman, M. E., & Mattord, H. J. (2010). Management of information security. Boston: Course Technology.
14.
go back to reference Li, H., & Singhal, M. (2007). Trust management in distributed systems. Computer, 40(2), 45–53.CrossRef Li, H., & Singhal, M. (2007). Trust management in distributed systems. Computer, 40(2), 45–53.CrossRef
15.
go back to reference Mackenzie, O. J. (Ed.). (2006). Information science and knowledge management. Berlin: Springer. Mackenzie, O. J. (Ed.). (2006). Information science and knowledge management. Berlin: Springer.
16.
go back to reference O’Brien, J., & Marakas, G. (2010). Management information systems. Irwin: McGraw-Hill. O’Brien, J., & Marakas, G. (2010). Management information systems. Irwin: McGraw-Hill.
17.
go back to reference Ogiela, M.R., & Ogiela, U. (2008). Linguistic extension for secret sharing (m, n)-threshold schemes. In: SecTech 2008 – 2008 International Conference on Security Technology, December 13–15, 2008 (pp. 125–128). Hainan Island, Sanya. Ogiela, M.R., & Ogiela, U. (2008). Linguistic extension for secret sharing (m, n)-threshold schemes. In: SecTech 2008 – 2008 International Conference on Security Technology, December 13–15, 2008 (pp. 125–128). Hainan Island, Sanya.
18.
go back to reference Ogiela, M. R., & Ogiela, U. (2010). Grammar encoding in DNA-like secret sharing infrastructure. Lecture Note in Computer Science, 6059, 175–182.CrossRef Ogiela, M. R., & Ogiela, U. (2010). Grammar encoding in DNA-like secret sharing infrastructure. Lecture Note in Computer Science, 6059, 175–182.CrossRef
19.
go back to reference Ogiela, M. R., & Ogiela, U. (2010). The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers & Mathematics with Applications, 60(2), 267–271.MathSciNetMATHCrossRef Ogiela, M. R., & Ogiela, U. (2010). The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers & Mathematics with Applications, 60(2), 267–271.MathSciNetMATHCrossRef
20.
go back to reference Ogiela, M. R., & Ogiela, U. (2012). Linguistic protocols for secure information management and sharing. Computers & Mathematics with Applications, 63(2), 564–572.MathSciNetCrossRef Ogiela, M. R., & Ogiela, U. (2012). Linguistic protocols for secure information management and sharing. Computers & Mathematics with Applications, 63(2), 564–572.MathSciNetCrossRef
21.
go back to reference Ogiela, M. R., & Ogiela, U. (2012). DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management, 32, 175–181.CrossRef Ogiela, M. R., & Ogiela, U. (2012). DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management, 32, 175–181.CrossRef
22.
go back to reference Ong, H., Schnorr, C. P., & Shamir, A. (1985). Efficient signature schemes based on polynomial equations. In: Advances in cryptology proceedings of CRYPTO’84 (pp. 37–46). New York: Springer. Ong, H., Schnorr, C. P., & Shamir, A. (1985). Efficient signature schemes based on polynomial equations. In: Advances in cryptology proceedings of CRYPTO’84 (pp. 37–46). New York: Springer.
23.
go back to reference Reynolds, G. (2009). Information technology for managers. Boston: Course Technology. Reynolds, G. (2009). Information technology for managers. Boston: Course Technology.
24.
go back to reference Cellary, W., Wiza, W., & Walczak, K. (2004). Visualizing web search results in 3D. Computer, 37(5), 87–89.CrossRef Cellary, W., Wiza, W., & Walczak, K. (2004). Visualizing web search results in 3D. Computer, 37(5), 87–89.CrossRef
25.
go back to reference ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, 469–472.MathSciNetMATHCrossRef ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, 469–472.MathSciNetMATHCrossRef
26.
go back to reference Ogiela, M. R., & Ogiela, U. (2009). Shadow generation protocol in linguistic threshold schemes. Communication in Computer and Information Science, 58, 35–42. Springer, Berlin/Heidelberg.CrossRef Ogiela, M. R., & Ogiela, U. (2009). Shadow generation protocol in linguistic threshold schemes. Communication in Computer and Information Science, 58, 35–42. Springer, Berlin/Heidelberg.CrossRef
27.
go back to reference Okamoto, T. (1990). A fast signature scheme based on congruential polynomial operations. IEEE Transactions on Information Theory, 1, 47–53.CrossRef Okamoto, T. (1990). A fast signature scheme based on congruential polynomial operations. IEEE Transactions on Information Theory, 1, 47–53.CrossRef
28.
go back to reference Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. New York: Wiley.MATH Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. New York: Wiley.MATH
29.
go back to reference Seberry, J., & Pieprzyk, J. (1989). Cryptography: An introduction to computer security. Englewood Cliffs: Prentice-Hall.MATH Seberry, J., & Pieprzyk, J. (1989). Cryptography: An introduction to computer security. Englewood Cliffs: Prentice-Hall.MATH
30.
go back to reference Tang, S. (2004). Simple secret sharing and threshold RSA signature schemes. Journal of Information and Computational Science, 1, 259–262. Tang, S. (2004). Simple secret sharing and threshold RSA signature schemes. Journal of Information and Computational Science, 1, 259–262.
31.
go back to reference Tompa, M., & Woll, H. (1988). How to share a secret with cheaters. Journal of Cryptology, 2, 133–138.MathSciNet Tompa, M., & Woll, H. (1988). How to share a secret with cheaters. Journal of Cryptology, 2, 133–138.MathSciNet
32.
go back to reference van Dijk, M. (1995). On the information rate of perfect secret sharing schemes. Designs, Codes and Cryptography, 6, 143–169.MATHCrossRef van Dijk, M. (1995). On the information rate of perfect secret sharing schemes. Designs, Codes and Cryptography, 6, 143–169.MATHCrossRef
33.
go back to reference Wang, S. J., Tsai, Y. R., & Chen, P. Y. (2007). Proactive (k, n) threshold secret sharing scheme with variant k and n. In: Proceedings of the IPC 2007 – The 2007 International Conference on Intelligent Pervasive Computing (pp. 117–120), October 11–13th, 2007, Jeju Island. Wang, S. J., Tsai, Y. R., & Chen, P. Y. (2007). Proactive (k, n) threshold secret sharing scheme with variant k and n. In: Proceedings of the IPC 2007 – The 2007 International Conference on Intelligent Pervasive Computing (pp. 117–120), October 11–13th, 2007, Jeju Island.
Metadata
Title
Fields of Application, Methods of and Current Trends in Information Management
Authors
Marek R. Ogiela
Urszula Ogiela
Copyright Year
2014
Publisher
Springer London
DOI
https://doi.org/10.1007/978-1-4471-5016-9_2

Premium Partner