Skip to main content
Top
Published in:
Cover of the book

2018 | OriginalPaper | Chapter

1. The Agile Way

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter gives an overview of the concept of enterprise agility and how this gives organizations more flexibility. This includes an in-depth evaluation of modern enterprises and a few case studies on how organizations failed to adopt agile principles which led to disastrous consequences, and ways to avoid their mistakes based on the research in this field. Another key area of this chapter deals with crisis resistant strategies and their links to enterprise architectures. Discussion of mission-critical systems is included in this chapter to allow further understanding of how to increase scalability and avoid potential design errors. Case studies in the bridge construction sector illustrate crisis management and agility improvement. The chapter also focuses on digital art integrity and blockchain technology application to secure voting. The other areas we discuss include decentralized applications and human-related sentiment analysis.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Nagel, R. (1991). 21st century manufacturing enterprise strategy: An industry-led view. Diane Pub Co. Nagel, R. (1991). 21st century manufacturing enterprise strategy: An industry-led view. Diane Pub Co.
4.
go back to reference Sambamurthy, V., Bharadwaj, A., & Grover, V. (2003). Shaping agility through digital options: Reconceptualizing the role of information technology in contemporary firms, MIS Quarterly, 27(2).CrossRef Sambamurthy, V., Bharadwaj, A., & Grover, V. (2003). Shaping agility through digital options: Reconceptualizing the role of information technology in contemporary firms, MIS Quarterly, 27(2).CrossRef
5.
go back to reference Lu, Y., & Ramamurthy, K. (2011) Understanding the link between information technology capability and organizational agility: An empirical examination. Management Information Systems Quarterly, 931–954.CrossRef Lu, Y., & Ramamurthy, K. (2011) Understanding the link between information technology capability and organizational agility: An empirical examination. Management Information Systems Quarterly, 931–954.CrossRef
7.
go back to reference van Oosterhout, J., Heugens, P. P. M. A. R., & Kaptein, S. P. (2006). The internal morality of contracting: advancing the contractualist endeavor in business ethics. Academy of Management Review, 31, 521–539.CrossRef van Oosterhout, J., Heugens, P. P. M. A. R., & Kaptein, S. P. (2006). The internal morality of contracting: advancing the contractualist endeavor in business ethics. Academy of Management Review, 31, 521–539.CrossRef
10.
go back to reference Chakravarty et al. (2013). Supply chain transformation: Evolving with emerging business paradigms (2,014th ed.). Springer Texts in Business and Economics, Kindle Edition. Chakravarty et al. (2013). Supply chain transformation: Evolving with emerging business paradigms (2,014th ed.). Springer Texts in Business and Economics, Kindle Edition.
11.
go back to reference Lowry, P. B. & Wilson, D. (2016). Creating agile organizations through IT: The influence of internal IT service perceptions on IT service quality and IT agility. Journal of Strategic Information Systems (JSIS), 25(3), 211–226. Available at SSRN: https://ssrn.com/abstract=2786236.CrossRef Lowry, P. B. & Wilson, D. (2016). Creating agile organizations through IT: The influence of internal IT service perceptions on IT service quality and IT agility. Journal of Strategic Information Systems (JSIS), 25(3), 211–226. Available at SSRN: https://​ssrn.​com/​abstract=​2786236.CrossRef
12.
go back to reference Chen, C., Liao, J., & Wen, P. (2014). Why does formal mentoring matter? The mediating role of psychological safety and the moderating role of power distance orientation in the Chinese context. International Journal of Human Resource Management, 25(8), 1112–1130.CrossRef Chen, C., Liao, J., & Wen, P. (2014). Why does formal mentoring matter? The mediating role of psychological safety and the moderating role of power distance orientation in the Chinese context. International Journal of Human Resource Management, 25(8), 1112–1130.CrossRef
13.
go back to reference Richardson, S. M., Kettinger, W. J., Banks, M. S., & Quintana, Y. (2014). IT and agility in the social enterprise: A case study of st jude children’s research hospital’s “Cure4Kids” IT-platform for international outreach. Journal of the Association for Information Systems, 15(1), Article 2.CrossRef Richardson, S. M., Kettinger, W. J., Banks, M. S., & Quintana, Y. (2014). IT and agility in the social enterprise: A case study of st jude children’s research hospital’s “Cure4Kids” IT-platform for international outreach. Journal of the Association for Information Systems, 15(1), Article 2.CrossRef
14.
go back to reference de Albuquerque, P., & Christ, M. (2015). The tension between business process modeling and flexibility, The Journal of Strategic Information Systems, 24(3), 189–202, https://doi.org/10.1016/j.jsis.2015.08.003.CrossRef de Albuquerque, P., & Christ, M. (2015). The tension between business process modeling and flexibility, The Journal of Strategic Information Systems, 24(3), 189–202, https://​doi.​org/​10.​1016/​j.​jsis.​2015.​08.​003.​CrossRef
15.
go back to reference Kärcher, B. (2015). Alternative wege in die industrie 4.0–möglichkeiten und grenzen. In A. Botthof, & E. A. Hartmann (Eds.), Zukunft der Arbeit in Industrie 4.0 (pp. 47–58). Berlin: Springer. Kärcher, B. (2015). Alternative wege in die industrie 4.0–möglichkeiten und grenzen. In A. Botthof, & E. A. Hartmann (Eds.), Zukunft der Arbeit in Industrie 4.0 (pp. 47–58). Berlin: Springer.
16.
go back to reference Lay, G. (Ed.). (2014). Servitization in industry. Switzerland: Springer International Publishing. Lay, G. (Ed.). (2014). Servitization in industry. Switzerland: Springer International Publishing.
17.
go back to reference Lüdtke, A. (2015). Wege aus der Ironie in richtung ernsthafter automatisierung. In A. Botthof, & E. A. Hartmann (Eds.), Zukunft der Arbeit in Industrie 4.0 (pp 125–146). Berlin: Springer. Lüdtke, A. (2015). Wege aus der Ironie in richtung ernsthafter automatisierung. In A. Botthof, & E. A. Hartmann (Eds.), Zukunft der Arbeit in Industrie 4.0 (pp 125–146). Berlin: Springer.
18.
go back to reference Rigby, D., & Bilodeau, B. (2015). Management tools & trends 2015. London: Bain and Company. Rigby, D., & Bilodeau, B. (2015). Management tools & trends 2015. London: Bain and Company.
19.
go back to reference Roos, G. (2015). Servitization as innovation in manufacturing—a review of the literature. In The handbook of service innovation (pp. 403–435). London: Springer.CrossRef Roos, G. (2015). Servitization as innovation in manufacturing—a review of the literature. In The handbook of service innovation (pp. 403–435). London: Springer.CrossRef
20.
go back to reference Cline A. (2015). Agile development in the real world. New York: Apress, 297 s. ISBN 978-1-4842-1678-1. Cline A. (2015). Agile development in the real world. New York: Apress, 297 s. ISBN 978-1-4842-1678-1.
21.
go back to reference Schmidt, T. S., & Paetzold, K. (2017). Challenges of agile development: A cause-and-effect analysis. In G. Fanmuy, E. Goubault, D. Krob, & F. Stephan (Eds.), Complex systems design & management. Cham: Springer. Schmidt, T. S., & Paetzold, K. (2017). Challenges of agile development: A cause-and-effect analysis. In G. Fanmuy, E. Goubault, D. Krob, & F. Stephan (Eds.), Complex systems design & management. Cham: Springer.
22.
go back to reference Dingsøyr, T., & Moe, N. B. (2014). Towards principles of large-scale agile development. In: Agile Methods. Large-Scale Development, Refactoring, Testing, and Estimation. XP 2014 International Workshops, Rome, Italy, May 26–30, 2014, Revised Selected Papers. Dingsøyr, T., & Moe, N. B. (2014). Towards principles of large-scale agile development. In: Agile Methods. Large-Scale Development, Refactoring, Testing, and Estimation. XP 2014 International Workshops, Rome, Italy, May 26–30, 2014, Revised Selected Papers.
23.
go back to reference Dyer, L., & Ericksen, J. (2009). Complexity-based agile enterprises: Putting self-organizing emergence to work. In A. Wilkinson et al. (Eds.), The sage handbook of human resource management (pp. 436–457). London: Sage. Dyer, L., & Ericksen, J. (2009). Complexity-based agile enterprises: Putting self-organizing emergence to work. In A. Wilkinson et al. (Eds.), The sage handbook of human resource management (pp. 436–457). London: Sage.
24.
go back to reference Gromoff, A., Bilinkis (Stavenko), J., Shumsky, L. (2016). Vision of multilevel modelling of processes in enterprise architectures affected by big data collection and analysis. In International Conference Information Systems 2016 Special Interest Group on Big Data Proceedings. 10. Gromoff, A., Bilinkis (Stavenko), J., Shumsky, L. (2016). Vision of multilevel modelling of processes in enterprise architectures affected by big data collection and analysis. In International Conference Information Systems 2016 Special Interest Group on Big Data Proceedings. 10.
26.
go back to reference IEEE 1471. ANSI/IEEE 1471-2000, Recommended practice for architecture description of software-intensive systems. IEEE 1471. ANSI/IEEE 1471-2000, Recommended practice for architecture description of software-intensive systems.
27.
go back to reference ISO 15704:2000. Industrial automation systems—Requirements for enterprise-reference architectures and methodologies. ISO 15704:2000. Industrial automation systems—Requirements for enterprise-reference architectures and methodologies.
28.
go back to reference Zachman. (1987). A framework for information systems architecture. IBM Systems Journal, 26(3), p. 276.CrossRef Zachman. (1987). A framework for information systems architecture. IBM Systems Journal, 26(3), p. 276.CrossRef
30.
go back to reference Hoogervorst, J. (2002). HR strategy for ICT-driven business context. International Journal of Human resources management. 13(8), pp. 1245–1265. Hoogervorst, J. (2002). HR strategy for ICT-driven business context. International Journal of Human resources management. 13(8), pp. 1245–1265.
31.
go back to reference Gromoff, A. (2010). A study of the subject-oriented approach for automation and process modeling of a service company. S-BPM ONE, 2010, 192–206. Gromoff, A. (2010). A study of the subject-oriented approach for automation and process modeling of a service company. S-BPM ONE, 2010, 192–206.
32.
go back to reference Naur, P., & Randell, B. (1968). Software engineering. In Report on a conference sponsored by the NATO science committee. Garmisch, Germany, 7–11 Oct 1968. Naur, P., & Randell, B. (1968). Software engineering. In Report on a conference sponsored by the NATO science committee. Garmisch, Germany, 7–11 Oct 1968.
34.
go back to reference Chaum, D. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 84–90.CrossRef Chaum, D. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 84–90.CrossRef
35.
go back to reference Clarkson, M. R., Chong, S., & Myers, A. C. (2008). Civitas: Toward a secure voting system. In IEEE Symposium on Security and Privacy (pp. 354–368). Clarkson, M. R., Chong, S., & Myers, A. C. (2008). Civitas: Toward a secure voting system. In IEEE Symposium on Security and Privacy (pp. 354–368).
36.
go back to reference Hao, F., Kreeger, M. N., Randell, B., Clarke, D., Shahandashti, S. F., & Lee, P. H. -J. (2014). Every vote counts: Ensuring integrity in large-scale electronic voting. The USENIX Journal of Election Technology and Systems, 1. Hao, F., Kreeger, M. N., Randell, B., Clarke, D., Shahandashti, S. F., & Lee, P. H. -J. (2014). Every vote counts: Ensuring integrity in large-scale electronic voting. The USENIX Journal of Election Technology and Systems, 1.
37.
go back to reference Kiayias, A., Korman, M., & Walluck, D. (2006). An internet voting system supporting user privacy. In Computer Security Applications Conference, 2006. ACSAC’06. 22nd Annual (pp. 165–174). Kiayias, A., Korman, M., & Walluck, D. (2006). An internet voting system supporting user privacy. In Computer Security Applications Conference, 2006. ACSAC’06. 22nd Annual (pp. 165–174).
38.
go back to reference Adida, B., Marneffe, O., Pereira, O., & Quisquater, J. -J. (2009). Electing a university president using open-audit voting: Analysis of real-world use of helios. In Proceedings of the Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE). USENIX Association. Adida, B., Marneffe, O., Pereira, O., & Quisquater, J. -J. (2009). Electing a university president using open-audit voting: Analysis of real-world use of helios. In Proceedings of the Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE). USENIX Association.
39.
go back to reference Andrew C. (2004). Practical high certainty intent verification for encrypted votes. Andrew C. (2004). Practical high certainty intent verification for encrypted votes.
40.
go back to reference Ryan, P. Y. A., Bismark, D., Heather, J., Schneider, S., & Xia, Z. (2009). Prêt à voter: a voter-verifiable voting system. IEEE Transactions on Information Forensics and Security, 4(4), 662–673.CrossRef Ryan, P. Y. A., Bismark, D., Heather, J., Schneider, S., & Xia, Z. (2009). Prêt à voter: a voter-verifiable voting system. IEEE Transactions on Information Forensics and Security, 4(4), 662–673.CrossRef
41.
go back to reference Shahandashti S. F., & Hao F. (2016). DRE-ip: A verifiable evoting scheme without tallying authorities. In European Symposium on Research in Computer Security (pp. 223–240). Springer.CrossRef Shahandashti S. F., & Hao F. (2016). DRE-ip: A verifiable evoting scheme without tallying authorities. In European Symposium on Research in Computer Security (pp. 223–240). Springer.CrossRef
42.
go back to reference Chaum, D. (2004). Secret-ballot receipts: True voter-verifiable elections. IEEE Security & Privacy, 2(1), 38–47.CrossRef Chaum, D. (2004). Secret-ballot receipts: True voter-verifiable elections. IEEE Security & Privacy, 2(1), 38–47.CrossRef
43.
go back to reference Bell, S., Benaloh, J., Byrne, M. D., DeBeauvoir, D., Eakin, B., Fisher, G., et al. (2013). STAR-Vote: A secure, transparent, auditable, and reliable voting system. USENIX Journal of Election Technology and Systems, 1(1), 18–37. Bell, S., Benaloh, J., Byrne, M. D., DeBeauvoir, D., Eakin, B., Fisher, G., et al. (2013). STAR-Vote: A secure, transparent, auditable, and reliable voting system. USENIX Journal of Election Technology and Systems, 1(1), 18–37.
44.
go back to reference Chaum, D., Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R. L., et al. (2008). Scantegrity II: End-to-End verifiability for optical scan election systems using invisible ink confirmation codes. EVT, 8, 1–13. Chaum, D., Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R. L., et al. (2008). Scantegrity II: End-to-End verifiability for optical scan election systems using invisible ink confirmation codes. EVT, 8, 1–13.
45.
go back to reference Groth, J. (2004). Efficient maximal privacy in boardroom voting and anonymous broadcast. In International Conference on Financial Cryptography (pp. 90–104). Springer.CrossRef Groth, J. (2004). Efficient maximal privacy in boardroom voting and anonymous broadcast. In International Conference on Financial Cryptography (pp. 90–104). Springer.CrossRef
46.
go back to reference Kiayias, A., & Yung, M. (2002). Self-tallying elections and perfect ballot secrecy. In International Workshop on Public Key Cryptography (pp. 141–158). Springer.CrossRef Kiayias, A., & Yung, M. (2002). Self-tallying elections and perfect ballot secrecy. In International Workshop on Public Key Cryptography (pp. 141–158). Springer.CrossRef
48.
go back to reference McCorry, P., Shahandashti, S. F., & Feng, H. A smart contract for boardroom voting with maximum voter privacy. McCorry, P., Shahandashti, S. F., & Feng, H. A smart contract for boardroom voting with maximum voter privacy.
49.
go back to reference Feng, H., Ryan, P. Y., & Zielinski, P. (2010). Anonymous voting by two-round public discussion. IET Information Security, 4(2), 62–67.CrossRef Feng, H., Ryan, P. Y., & Zielinski, P. (2010). Anonymous voting by two-round public discussion. IET Information Security, 4(2), 62–67.CrossRef
50.
go back to reference Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts.
51.
go back to reference Yang, N., & Clark, J. Practical governmental voting with unconditional integrity and privacy. Yang, N., & Clark, J. Practical governmental voting with unconditional integrity and privacy.
52.
go back to reference Kohno T., Stubblefield A., Rubin A. D., & Wallach D. S. (2004). Analysis of an electronic voting system. In IEEE Symposium on Security and Privacy (pp. 27–42). Kohno T., Stubblefield A., Rubin A. D., & Wallach D. S. (2004). Analysis of an electronic voting system. In IEEE Symposium on Security and Privacy (pp. 27–42).
53.
go back to reference Tatsuaki O. (1998) Receipt-free electronic voting schemes for large scale elections. In: Security Protocols, 5th International Workshop (Vol. 1361, pp. 25–35). Tatsuaki O. (1998) Receipt-free electronic voting schemes for large scale elections. In: Security Protocols, 5th International Workshop (Vol. 1361, pp. 25–35).
54.
go back to reference Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.MathSciNetCrossRef Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.MathSciNetCrossRef
55.
go back to reference Nazmul, I., et al. (2017). A new e-voting scheme based on revised simplified verifiable re-encryption mixnet. In Paper presenter in Networking, Systems and Security (NSysS), 2017 International IEEE Conference. Nazmul, I., et al. (2017). A new e-voting scheme based on revised simplified verifiable re-encryption mixnet. In Paper presenter in Networking, Systems and Security (NSysS), 2017 International IEEE Conference.
56.
go back to reference Meenal, J., & Singh, M. (2017) Identity based secure RSA encryption system. In: Proceedings of International Conference on Communication and Networks. Springer: Singapore. Meenal, J., & Singh, M. (2017) Identity based secure RSA encryption system. In: Proceedings of International Conference on Communication and Networks. Springer: Singapore.
57.
go back to reference Chugunkov, I. V. et al. (2017). Classification of pseudo-random number generators applied to information security. In: Proceedings in Young Researchers in Electrical and Electronic Engineering (EIConRus), 2017 IEEE Conference of Russian. Chugunkov, I. V. et al. (2017). Classification of pseudo-random number generators applied to information security. In: Proceedings in Young Researchers in Electrical and Electronic Engineering (EIConRus), 2017 IEEE Conference of Russian.
58.
go back to reference Olivier, P., & Ronald, L. Rivest. Marked Mix-Nets. Olivier, P., & Ronald, L. Rivest. Marked Mix-Nets.
59.
go back to reference King-Hang W., et al. A review of contemporary E-voting: Requirements, technology, systems and usability. King-Hang W., et al. A review of contemporary E-voting: Requirements, technology, systems and usability.
61.
go back to reference Ali, T. S., & Murray J. (2016) An overview of end-to-end verifiable voting systems. In Real-world electronic voting: Design, analysis and deployment (pp. 171–218). CRC Press. Ali, T. S., & Murray J. (2016) An overview of end-to-end verifiable voting systems. In Real-world electronic voting: Design, analysis and deployment (pp. 171–218). CRC Press.
62.
go back to reference Herschberg, Mark A. (1997). Secure electronic voting over the world wide Web. Massachusetts Institute of Technology: Diss. Herschberg, Mark A. (1997). Secure electronic voting over the world wide Web. Massachusetts Institute of Technology: Diss.
63.
go back to reference Neumann, S., Budurushi, J., & Volkamer, M. (2014). Analysis of security and cryptographic approaches to provide secret and verifiable electronic voting. In Design, development, and use of secure electronic voting systems. IGI Global. Neumann, S., Budurushi, J., & Volkamer, M. (2014). Analysis of security and cryptographic approaches to provide secret and verifiable electronic voting. In Design, development, and use of secure electronic voting systems. IGI Global.
64.
go back to reference Jonker, H., Mauw, S., & Pang, J. (2013). Privacy and verifiability in voting systems: Methods, developments and trends. Computer Science Review, 10, 1–30.CrossRef Jonker, H., Mauw, S., & Pang, J. (2013). Privacy and verifiability in voting systems: Methods, developments and trends. Computer Science Review, 10, 1–30.CrossRef
65.
go back to reference Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on Computing, 18(1), 186–208.MathSciNetCrossRef Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on Computing, 18(1), 186–208.MathSciNetCrossRef
66.
67.
go back to reference Bootle J., et al. (2016). Efficient zero-knowledge proof systems. In Foundations of security analysis and design VIII (pp. 1–31). Springer International Publishing.MATH Bootle J., et al. (2016). Efficient zero-knowledge proof systems. In Foundations of security analysis and design VIII (pp. 1–31). Springer International Publishing.MATH
76.
go back to reference Liu, B. (2012). Sentiment analysis and opinion mining. Morgan & Claypool Publishers. Liu, B. (2012). Sentiment analysis and opinion mining. Morgan & Claypool Publishers.
77.
78.
go back to reference Kaplan, A. M., & Haenlein, M. (2012). Users of the world, unite! The challenges and opportunities of social media. Business Horizons, 53(1), 59–68.CrossRef Kaplan, A. M., & Haenlein, M. (2012). Users of the world, unite! The challenges and opportunities of social media. Business Horizons, 53(1), 59–68.CrossRef
82.
go back to reference Hugo, N. C., & Lacher, R. G. (2014). Understanding the role of culture and heritage in community festivals: An importance-performance analysis. Journal of Extension, 52. Hugo, N. C., & Lacher, R. G. (2014). Understanding the role of culture and heritage in community festivals: An importance-performance analysis. Journal of Extension, 52.
83.
go back to reference Gertz, D. (1991). Festivals, special events, and tourism. Gertz, D. (1991). Festivals, special events, and tourism.
84.
go back to reference Rice, D. R., & Zorn, C. (2013). Corpus-based dictionaries for sentiment analysis of specialized vocabularies. In New Directions in Analyzing Text as Data Workshop. London. Rice, D. R., & Zorn, C. (2013). Corpus-based dictionaries for sentiment analysis of specialized vocabularies. In New Directions in Analyzing Text as Data Workshop. London.
85.
go back to reference Wang, S., & Manning, C. D. (2012). Baselines and bigrams: simple, good sentiment and topic classification. In Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics. Wang, S., & Manning, C. D. (2012). Baselines and bigrams: simple, good sentiment and topic classification. In Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics.
86.
go back to reference Gamallo, P., & Garcia, M. (2014). Citius: A naive-bayes strategy for sentiment analysis on english tweets. In Proceedings of the 8th International Workshop on Semantic Evaluation, (pp. 171–175). Dublin, Ireland. Gamallo, P., & Garcia, M. (2014). Citius: A naive-bayes strategy for sentiment analysis on english tweets. In Proceedings of the 8th International Workshop on Semantic Evaluation, (pp. 171–175). Dublin, Ireland.
87.
go back to reference Mehra, N., Khandelwal, S., & Patel, P. (2012). Sentiment identification using maximum entropy analysis of movie reviews. USA. Mehra, N., Khandelwal, S., & Patel, P. (2012). Sentiment identification using maximum entropy analysis of movie reviews. USA.
88.
go back to reference Lehrer, A. (1985). Markedness and antonymy. Journal of Linguistics, 397–429.CrossRef Lehrer, A. (1985). Markedness and antonymy. Journal of Linguistics, 397–429.CrossRef
89.
go back to reference Turney, P. (2002). Thumbs up or thumbs down? Semantic orientation applied to unsupervised classification of reviews. In ACL 2002 (pp. 417–424). Turney, P. (2002). Thumbs up or thumbs down? Semantic orientation applied to unsupervised classification of reviews. In ACL 2002 (pp. 417–424).
90.
go back to reference Baccianella, E. A., Sebastiani, S., & Sebastiani, F. (2010). An enhanced lexical resource for sentiment analysis and opinion mining. LREC, 10, 2200–2204. Baccianella, E. A., Sebastiani, S., & Sebastiani, F. (2010). An enhanced lexical resource for sentiment analysis and opinion mining. LREC, 10, 2200–2204.
91.
go back to reference Wiebe, J., & Cardie, C. (2005). Annotating expressions of opinions and emotions in language. Language Resources and Evaluation, 165–210.CrossRef Wiebe, J., & Cardie, C. (2005). Annotating expressions of opinions and emotions in language. Language Resources and Evaluation, 165–210.CrossRef
92.
go back to reference Strapparava, C., & Valitutti, A. (2004). Wordnet affect: An affective extension of wordnet. LREC, 4, 1083–1086. Strapparava, C., & Valitutti, A. (2004). Wordnet affect: An affective extension of wordnet. LREC, 4, 1083–1086.
93.
go back to reference Moreno-Ortiz, A., & Hernández, C. P. (2013). Lexicon-based sentiment analysis of twitter messages in Spanish. Procesamiento del Lenguaje Natural, Revista, 93–100. Moreno-Ortiz, A., & Hernández, C. P. (2013). Lexicon-based sentiment analysis of twitter messages in Spanish. Procesamiento del Lenguaje Natural, Revista, 93–100.
94.
go back to reference Musto, C., Semeraro, S., & Polignano, M. (2014). A comparison of lexicon based approaches for sentiment analysis of microblog posts. Information filtering and retrieval. In Proceedings of the 8th International Workshop on Information Filtering (pp. 12–23). Musto, C., Semeraro, S., & Polignano, M. (2014). A comparison of lexicon based approaches for sentiment analysis of microblog posts. Information filtering and retrieval. In Proceedings of the 8th International Workshop on Information Filtering (pp. 12–23).
95.
go back to reference Momtazi, S. (2012). Natural language processing sentiment analysis. Momtazi, S. (2012). Natural language processing sentiment analysis.
96.
go back to reference Bonev, B., Sanchez, R., & Rojas, S. O. (2012). Opinum: statistical sentiment analysis for opinion classification. In Computational approaches to subjectivity and sentiment analysis, (pp. 29–37). Jeju. Bonev, B., Sanchez, R., & Rojas, S. O. (2012). Opinum: statistical sentiment analysis for opinion classification. In Computational approaches to subjectivity and sentiment analysis, (pp. 29–37). Jeju.
97.
go back to reference Jurafsky, D., & Martin, J. (2014). Speech and language processing. Jurafsky, D., & Martin, J. (2014). Speech and language processing.
98.
go back to reference Cambria, E., Schuller, B., Xia, Y., & Havasi, C. (2013). Knowledge-based approaches to concept- level sentiment analysis. IEEE Computer Society.CrossRef Cambria, E., Schuller, B., Xia, Y., & Havasi, C. (2013). Knowledge-based approaches to concept- level sentiment analysis. IEEE Computer Society.CrossRef
99.
go back to reference Bing, L. (2015). Opinions, sentiment, and emotion in text. Cambridge University Press. Bing, L. (2015). Opinions, sentiment, and emotion in text. Cambridge University Press.
100.
go back to reference Gundla, V. A., & Otari, M. S. (2013). A review on sentiment analysis and visualization of customer reviews. International Journal of Science and Research, 4. Gundla, V. A., & Otari, M. S. (2013). A review on sentiment analysis and visualization of customer reviews. International Journal of Science and Research, 4.
101.
go back to reference Chunping, O., Yongbin, L. Shuqing, Z., & Yang Xiaohua, Y. (2015). Features-level sentiment analysis of movie reviews. Advanced Science and Technology Letters, 110–113. Chunping, O., Yongbin, L. Shuqing, Z., & Yang Xiaohua, Y. (2015). Features-level sentiment analysis of movie reviews. Advanced Science and Technology Letters, 110–113.
102.
go back to reference Jagtap, V. S., & Pawar, K. (2013). Analysis of different approaches to sentence-level sentiment. International Journal of Scientific Engineering and Technology, 164–170. Jagtap, V. S., & Pawar, K. (2013). Analysis of different approaches to sentence-level sentiment. International Journal of Scientific Engineering and Technology, 164–170.
103.
go back to reference Steinberger, J., Brychcin, T., & Konkol, M. (2014). Aspect-level sentiment analysis in Czech. In Computational Approaches to Subjectivity, Sentiment and Social Media Analysis. Baltimore. Steinberger, J., Brychcin, T., & Konkol, M. (2014). Aspect-level sentiment analysis in Czech. In Computational Approaches to Subjectivity, Sentiment and Social Media Analysis. Baltimore.
104.
go back to reference Bongirwar, V. (2015). A survey on sentence level sentiment analysis. International Journal of Computer Science Trends and Technology (IJCST), 3(3). Bongirwar, V. (2015). A survey on sentence level sentiment analysis. International Journal of Computer Science Trends and Technology (IJCST), 3(3).
105.
go back to reference Zhang, L., & Liu B. (2014). Aspect and entity extraction for opinion mining. In Data mining and knowledge discovery for big data. Springer. Zhang, L., & Liu B. (2014). Aspect and entity extraction for opinion mining. In Data mining and knowledge discovery for big data. Springer.
106.
go back to reference Tan, C., Lee, L., Tang, J., Jiang, L., Zhou, M., & Li, P. (2011). User-level sentiment analysis incorporating social networks. San Diego, California: KKD.CrossRef Tan, C., Lee, L., Tang, J., Jiang, L., Zhou, M., & Li, P. (2011). User-level sentiment analysis incorporating social networks. San Diego, California: KKD.CrossRef
107.
go back to reference Tripati, G., & Naganna, S. (2015). Feature selection and classification approach for sentiment analysis. Machine Learning and Applications: An International Journal, 2. Tripati, G., & Naganna, S. (2015). Feature selection and classification approach for sentiment analysis. Machine Learning and Applications: An International Journal, 2.
110.
go back to reference Garbarino, S., & Holland, J. (2009). In J. Holland (Ed.) Quantitative and qualitative methods in impact evaluation and measuring results. Social Development Dialect. Garbarino, S., & Holland, J. (2009). In J. Holland (Ed.) Quantitative and qualitative methods in impact evaluation and measuring results. Social Development Dialect.
111.
go back to reference Schmuck, R. (1997). Practical action research for change. IRI/Skylight Training and Publishing. Schmuck, R. (1997). Practical action research for change. IRI/Skylight Training and Publishing.
113.
go back to reference Prevention, C. F. (2008). Evaluation briefs. Prevention, C. F. (2008). Evaluation briefs.
114.
go back to reference Wilkinson, S. (2004). Focus groups: A feminist method. In S. Hesse-Biber (Eds.), Femininst perspective on social research (pp. 271–295). New York: Oxford University Press. Wilkinson, S. (2004). Focus groups: A feminist method. In S. Hesse-Biber (Eds.), Femininst perspective on social research (pp. 271–295). New York: Oxford University Press.
115.
go back to reference Mmari, K. (2006). Using qualitative methods for monitoring and evaluation. Johns Hopkins University. Mmari, K. (2006). Using qualitative methods for monitoring and evaluation. Johns Hopkins University.
119.
go back to reference Pine, B. J., II, & Gilmore, J. H. (1999). The experience economy. Boston: Harvard Business School Press. Pine, B. J., II, & Gilmore, J. H. (1999). The experience economy. Boston: Harvard Business School Press.
120.
go back to reference Duncan, E., Jones, C., & Rawson, A. (2013). The truth about customer experience. Harvard Business School Publishing Corporation. Retrieved from www.mckinsey.com. Duncan, E., Jones, C., & Rawson, A. (2013). The truth about customer experience. Harvard Business School Publishing Corporation. Retrieved from www.​mckinsey.​com.
123.
go back to reference Zykov, S. (2017). Crisis response and management: technological and human factor-based agility (Chapter 120/705). In M. Khosrow-Pour (Ed.), Encyclopedia of information science and technology (4th Ed., pp. 1396–1406). Information resources management association, USA, Vol. 2, Section: Crisis Response and Management, Release Date: July 2017, ©2018, 7500 pp. Zykov, S. (2017). Crisis response and management: technological and human factor-based agility (Chapter 120/705). In M. Khosrow-Pour (Ed.), Encyclopedia of information science and technology (4th Ed., pp. 1396–1406). Information resources management association, USA, Vol. 2, Section: Crisis Response and Management, Release Date: July 2017, ©2018, 7500 pp.
Metadata
Title
The Agile Way
Author
Sergey V. Zykov
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-77917-1_1

Premium Partner