Skip to main content
Erschienen in:
Buchtitelbild

2018 | OriginalPaper | Buchkapitel

1. The Agile Way

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter gives an overview of the concept of enterprise agility and how this gives organizations more flexibility. This includes an in-depth evaluation of modern enterprises and a few case studies on how organizations failed to adopt agile principles which led to disastrous consequences, and ways to avoid their mistakes based on the research in this field. Another key area of this chapter deals with crisis resistant strategies and their links to enterprise architectures. Discussion of mission-critical systems is included in this chapter to allow further understanding of how to increase scalability and avoid potential design errors. Case studies in the bridge construction sector illustrate crisis management and agility improvement. The chapter also focuses on digital art integrity and blockchain technology application to secure voting. The other areas we discuss include decentralized applications and human-related sentiment analysis.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Nagel, R. (1991). 21st century manufacturing enterprise strategy: An industry-led view. Diane Pub Co. Nagel, R. (1991). 21st century manufacturing enterprise strategy: An industry-led view. Diane Pub Co.
4.
Zurück zum Zitat Sambamurthy, V., Bharadwaj, A., & Grover, V. (2003). Shaping agility through digital options: Reconceptualizing the role of information technology in contemporary firms, MIS Quarterly, 27(2).CrossRef Sambamurthy, V., Bharadwaj, A., & Grover, V. (2003). Shaping agility through digital options: Reconceptualizing the role of information technology in contemporary firms, MIS Quarterly, 27(2).CrossRef
5.
Zurück zum Zitat Lu, Y., & Ramamurthy, K. (2011) Understanding the link between information technology capability and organizational agility: An empirical examination. Management Information Systems Quarterly, 931–954.CrossRef Lu, Y., & Ramamurthy, K. (2011) Understanding the link between information technology capability and organizational agility: An empirical examination. Management Information Systems Quarterly, 931–954.CrossRef
7.
Zurück zum Zitat van Oosterhout, J., Heugens, P. P. M. A. R., & Kaptein, S. P. (2006). The internal morality of contracting: advancing the contractualist endeavor in business ethics. Academy of Management Review, 31, 521–539.CrossRef van Oosterhout, J., Heugens, P. P. M. A. R., & Kaptein, S. P. (2006). The internal morality of contracting: advancing the contractualist endeavor in business ethics. Academy of Management Review, 31, 521–539.CrossRef
10.
Zurück zum Zitat Chakravarty et al. (2013). Supply chain transformation: Evolving with emerging business paradigms (2,014th ed.). Springer Texts in Business and Economics, Kindle Edition. Chakravarty et al. (2013). Supply chain transformation: Evolving with emerging business paradigms (2,014th ed.). Springer Texts in Business and Economics, Kindle Edition.
11.
Zurück zum Zitat Lowry, P. B. & Wilson, D. (2016). Creating agile organizations through IT: The influence of internal IT service perceptions on IT service quality and IT agility. Journal of Strategic Information Systems (JSIS), 25(3), 211–226. Available at SSRN: https://ssrn.com/abstract=2786236.CrossRef Lowry, P. B. & Wilson, D. (2016). Creating agile organizations through IT: The influence of internal IT service perceptions on IT service quality and IT agility. Journal of Strategic Information Systems (JSIS), 25(3), 211–226. Available at SSRN: https://​ssrn.​com/​abstract=​2786236.CrossRef
12.
Zurück zum Zitat Chen, C., Liao, J., & Wen, P. (2014). Why does formal mentoring matter? The mediating role of psychological safety and the moderating role of power distance orientation in the Chinese context. International Journal of Human Resource Management, 25(8), 1112–1130.CrossRef Chen, C., Liao, J., & Wen, P. (2014). Why does formal mentoring matter? The mediating role of psychological safety and the moderating role of power distance orientation in the Chinese context. International Journal of Human Resource Management, 25(8), 1112–1130.CrossRef
13.
Zurück zum Zitat Richardson, S. M., Kettinger, W. J., Banks, M. S., & Quintana, Y. (2014). IT and agility in the social enterprise: A case study of st jude children’s research hospital’s “Cure4Kids” IT-platform for international outreach. Journal of the Association for Information Systems, 15(1), Article 2.CrossRef Richardson, S. M., Kettinger, W. J., Banks, M. S., & Quintana, Y. (2014). IT and agility in the social enterprise: A case study of st jude children’s research hospital’s “Cure4Kids” IT-platform for international outreach. Journal of the Association for Information Systems, 15(1), Article 2.CrossRef
14.
Zurück zum Zitat de Albuquerque, P., & Christ, M. (2015). The tension between business process modeling and flexibility, The Journal of Strategic Information Systems, 24(3), 189–202, https://doi.org/10.1016/j.jsis.2015.08.003.CrossRef de Albuquerque, P., & Christ, M. (2015). The tension between business process modeling and flexibility, The Journal of Strategic Information Systems, 24(3), 189–202, https://​doi.​org/​10.​1016/​j.​jsis.​2015.​08.​003.​CrossRef
15.
Zurück zum Zitat Kärcher, B. (2015). Alternative wege in die industrie 4.0–möglichkeiten und grenzen. In A. Botthof, & E. A. Hartmann (Eds.), Zukunft der Arbeit in Industrie 4.0 (pp. 47–58). Berlin: Springer. Kärcher, B. (2015). Alternative wege in die industrie 4.0–möglichkeiten und grenzen. In A. Botthof, & E. A. Hartmann (Eds.), Zukunft der Arbeit in Industrie 4.0 (pp. 47–58). Berlin: Springer.
16.
Zurück zum Zitat Lay, G. (Ed.). (2014). Servitization in industry. Switzerland: Springer International Publishing. Lay, G. (Ed.). (2014). Servitization in industry. Switzerland: Springer International Publishing.
17.
Zurück zum Zitat Lüdtke, A. (2015). Wege aus der Ironie in richtung ernsthafter automatisierung. In A. Botthof, & E. A. Hartmann (Eds.), Zukunft der Arbeit in Industrie 4.0 (pp 125–146). Berlin: Springer. Lüdtke, A. (2015). Wege aus der Ironie in richtung ernsthafter automatisierung. In A. Botthof, & E. A. Hartmann (Eds.), Zukunft der Arbeit in Industrie 4.0 (pp 125–146). Berlin: Springer.
18.
Zurück zum Zitat Rigby, D., & Bilodeau, B. (2015). Management tools & trends 2015. London: Bain and Company. Rigby, D., & Bilodeau, B. (2015). Management tools & trends 2015. London: Bain and Company.
19.
Zurück zum Zitat Roos, G. (2015). Servitization as innovation in manufacturing—a review of the literature. In The handbook of service innovation (pp. 403–435). London: Springer.CrossRef Roos, G. (2015). Servitization as innovation in manufacturing—a review of the literature. In The handbook of service innovation (pp. 403–435). London: Springer.CrossRef
20.
Zurück zum Zitat Cline A. (2015). Agile development in the real world. New York: Apress, 297 s. ISBN 978-1-4842-1678-1. Cline A. (2015). Agile development in the real world. New York: Apress, 297 s. ISBN 978-1-4842-1678-1.
21.
Zurück zum Zitat Schmidt, T. S., & Paetzold, K. (2017). Challenges of agile development: A cause-and-effect analysis. In G. Fanmuy, E. Goubault, D. Krob, & F. Stephan (Eds.), Complex systems design & management. Cham: Springer. Schmidt, T. S., & Paetzold, K. (2017). Challenges of agile development: A cause-and-effect analysis. In G. Fanmuy, E. Goubault, D. Krob, & F. Stephan (Eds.), Complex systems design & management. Cham: Springer.
22.
Zurück zum Zitat Dingsøyr, T., & Moe, N. B. (2014). Towards principles of large-scale agile development. In: Agile Methods. Large-Scale Development, Refactoring, Testing, and Estimation. XP 2014 International Workshops, Rome, Italy, May 26–30, 2014, Revised Selected Papers. Dingsøyr, T., & Moe, N. B. (2014). Towards principles of large-scale agile development. In: Agile Methods. Large-Scale Development, Refactoring, Testing, and Estimation. XP 2014 International Workshops, Rome, Italy, May 26–30, 2014, Revised Selected Papers.
23.
Zurück zum Zitat Dyer, L., & Ericksen, J. (2009). Complexity-based agile enterprises: Putting self-organizing emergence to work. In A. Wilkinson et al. (Eds.), The sage handbook of human resource management (pp. 436–457). London: Sage. Dyer, L., & Ericksen, J. (2009). Complexity-based agile enterprises: Putting self-organizing emergence to work. In A. Wilkinson et al. (Eds.), The sage handbook of human resource management (pp. 436–457). London: Sage.
24.
Zurück zum Zitat Gromoff, A., Bilinkis (Stavenko), J., Shumsky, L. (2016). Vision of multilevel modelling of processes in enterprise architectures affected by big data collection and analysis. In International Conference Information Systems 2016 Special Interest Group on Big Data Proceedings. 10. Gromoff, A., Bilinkis (Stavenko), J., Shumsky, L. (2016). Vision of multilevel modelling of processes in enterprise architectures affected by big data collection and analysis. In International Conference Information Systems 2016 Special Interest Group on Big Data Proceedings. 10.
26.
Zurück zum Zitat IEEE 1471. ANSI/IEEE 1471-2000, Recommended practice for architecture description of software-intensive systems. IEEE 1471. ANSI/IEEE 1471-2000, Recommended practice for architecture description of software-intensive systems.
27.
Zurück zum Zitat ISO 15704:2000. Industrial automation systems—Requirements for enterprise-reference architectures and methodologies. ISO 15704:2000. Industrial automation systems—Requirements for enterprise-reference architectures and methodologies.
28.
Zurück zum Zitat Zachman. (1987). A framework for information systems architecture. IBM Systems Journal, 26(3), p. 276.CrossRef Zachman. (1987). A framework for information systems architecture. IBM Systems Journal, 26(3), p. 276.CrossRef
30.
Zurück zum Zitat Hoogervorst, J. (2002). HR strategy for ICT-driven business context. International Journal of Human resources management. 13(8), pp. 1245–1265. Hoogervorst, J. (2002). HR strategy for ICT-driven business context. International Journal of Human resources management. 13(8), pp. 1245–1265.
31.
Zurück zum Zitat Gromoff, A. (2010). A study of the subject-oriented approach for automation and process modeling of a service company. S-BPM ONE, 2010, 192–206. Gromoff, A. (2010). A study of the subject-oriented approach for automation and process modeling of a service company. S-BPM ONE, 2010, 192–206.
32.
Zurück zum Zitat Naur, P., & Randell, B. (1968). Software engineering. In Report on a conference sponsored by the NATO science committee. Garmisch, Germany, 7–11 Oct 1968. Naur, P., & Randell, B. (1968). Software engineering. In Report on a conference sponsored by the NATO science committee. Garmisch, Germany, 7–11 Oct 1968.
34.
Zurück zum Zitat Chaum, D. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 84–90.CrossRef Chaum, D. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 84–90.CrossRef
35.
Zurück zum Zitat Clarkson, M. R., Chong, S., & Myers, A. C. (2008). Civitas: Toward a secure voting system. In IEEE Symposium on Security and Privacy (pp. 354–368). Clarkson, M. R., Chong, S., & Myers, A. C. (2008). Civitas: Toward a secure voting system. In IEEE Symposium on Security and Privacy (pp. 354–368).
36.
Zurück zum Zitat Hao, F., Kreeger, M. N., Randell, B., Clarke, D., Shahandashti, S. F., & Lee, P. H. -J. (2014). Every vote counts: Ensuring integrity in large-scale electronic voting. The USENIX Journal of Election Technology and Systems, 1. Hao, F., Kreeger, M. N., Randell, B., Clarke, D., Shahandashti, S. F., & Lee, P. H. -J. (2014). Every vote counts: Ensuring integrity in large-scale electronic voting. The USENIX Journal of Election Technology and Systems, 1.
37.
Zurück zum Zitat Kiayias, A., Korman, M., & Walluck, D. (2006). An internet voting system supporting user privacy. In Computer Security Applications Conference, 2006. ACSAC’06. 22nd Annual (pp. 165–174). Kiayias, A., Korman, M., & Walluck, D. (2006). An internet voting system supporting user privacy. In Computer Security Applications Conference, 2006. ACSAC’06. 22nd Annual (pp. 165–174).
38.
Zurück zum Zitat Adida, B., Marneffe, O., Pereira, O., & Quisquater, J. -J. (2009). Electing a university president using open-audit voting: Analysis of real-world use of helios. In Proceedings of the Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE). USENIX Association. Adida, B., Marneffe, O., Pereira, O., & Quisquater, J. -J. (2009). Electing a university president using open-audit voting: Analysis of real-world use of helios. In Proceedings of the Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE). USENIX Association.
39.
Zurück zum Zitat Andrew C. (2004). Practical high certainty intent verification for encrypted votes. Andrew C. (2004). Practical high certainty intent verification for encrypted votes.
40.
Zurück zum Zitat Ryan, P. Y. A., Bismark, D., Heather, J., Schneider, S., & Xia, Z. (2009). Prêt à voter: a voter-verifiable voting system. IEEE Transactions on Information Forensics and Security, 4(4), 662–673.CrossRef Ryan, P. Y. A., Bismark, D., Heather, J., Schneider, S., & Xia, Z. (2009). Prêt à voter: a voter-verifiable voting system. IEEE Transactions on Information Forensics and Security, 4(4), 662–673.CrossRef
41.
Zurück zum Zitat Shahandashti S. F., & Hao F. (2016). DRE-ip: A verifiable evoting scheme without tallying authorities. In European Symposium on Research in Computer Security (pp. 223–240). Springer.CrossRef Shahandashti S. F., & Hao F. (2016). DRE-ip: A verifiable evoting scheme without tallying authorities. In European Symposium on Research in Computer Security (pp. 223–240). Springer.CrossRef
42.
Zurück zum Zitat Chaum, D. (2004). Secret-ballot receipts: True voter-verifiable elections. IEEE Security & Privacy, 2(1), 38–47.CrossRef Chaum, D. (2004). Secret-ballot receipts: True voter-verifiable elections. IEEE Security & Privacy, 2(1), 38–47.CrossRef
43.
Zurück zum Zitat Bell, S., Benaloh, J., Byrne, M. D., DeBeauvoir, D., Eakin, B., Fisher, G., et al. (2013). STAR-Vote: A secure, transparent, auditable, and reliable voting system. USENIX Journal of Election Technology and Systems, 1(1), 18–37. Bell, S., Benaloh, J., Byrne, M. D., DeBeauvoir, D., Eakin, B., Fisher, G., et al. (2013). STAR-Vote: A secure, transparent, auditable, and reliable voting system. USENIX Journal of Election Technology and Systems, 1(1), 18–37.
44.
Zurück zum Zitat Chaum, D., Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R. L., et al. (2008). Scantegrity II: End-to-End verifiability for optical scan election systems using invisible ink confirmation codes. EVT, 8, 1–13. Chaum, D., Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R. L., et al. (2008). Scantegrity II: End-to-End verifiability for optical scan election systems using invisible ink confirmation codes. EVT, 8, 1–13.
45.
Zurück zum Zitat Groth, J. (2004). Efficient maximal privacy in boardroom voting and anonymous broadcast. In International Conference on Financial Cryptography (pp. 90–104). Springer.CrossRef Groth, J. (2004). Efficient maximal privacy in boardroom voting and anonymous broadcast. In International Conference on Financial Cryptography (pp. 90–104). Springer.CrossRef
46.
Zurück zum Zitat Kiayias, A., & Yung, M. (2002). Self-tallying elections and perfect ballot secrecy. In International Workshop on Public Key Cryptography (pp. 141–158). Springer.CrossRef Kiayias, A., & Yung, M. (2002). Self-tallying elections and perfect ballot secrecy. In International Workshop on Public Key Cryptography (pp. 141–158). Springer.CrossRef
48.
Zurück zum Zitat McCorry, P., Shahandashti, S. F., & Feng, H. A smart contract for boardroom voting with maximum voter privacy. McCorry, P., Shahandashti, S. F., & Feng, H. A smart contract for boardroom voting with maximum voter privacy.
49.
Zurück zum Zitat Feng, H., Ryan, P. Y., & Zielinski, P. (2010). Anonymous voting by two-round public discussion. IET Information Security, 4(2), 62–67.CrossRef Feng, H., Ryan, P. Y., & Zielinski, P. (2010). Anonymous voting by two-round public discussion. IET Information Security, 4(2), 62–67.CrossRef
50.
Zurück zum Zitat Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts.
51.
Zurück zum Zitat Yang, N., & Clark, J. Practical governmental voting with unconditional integrity and privacy. Yang, N., & Clark, J. Practical governmental voting with unconditional integrity and privacy.
52.
Zurück zum Zitat Kohno T., Stubblefield A., Rubin A. D., & Wallach D. S. (2004). Analysis of an electronic voting system. In IEEE Symposium on Security and Privacy (pp. 27–42). Kohno T., Stubblefield A., Rubin A. D., & Wallach D. S. (2004). Analysis of an electronic voting system. In IEEE Symposium on Security and Privacy (pp. 27–42).
53.
Zurück zum Zitat Tatsuaki O. (1998) Receipt-free electronic voting schemes for large scale elections. In: Security Protocols, 5th International Workshop (Vol. 1361, pp. 25–35). Tatsuaki O. (1998) Receipt-free electronic voting schemes for large scale elections. In: Security Protocols, 5th International Workshop (Vol. 1361, pp. 25–35).
54.
Zurück zum Zitat Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.MathSciNetCrossRef Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.MathSciNetCrossRef
55.
Zurück zum Zitat Nazmul, I., et al. (2017). A new e-voting scheme based on revised simplified verifiable re-encryption mixnet. In Paper presenter in Networking, Systems and Security (NSysS), 2017 International IEEE Conference. Nazmul, I., et al. (2017). A new e-voting scheme based on revised simplified verifiable re-encryption mixnet. In Paper presenter in Networking, Systems and Security (NSysS), 2017 International IEEE Conference.
56.
Zurück zum Zitat Meenal, J., & Singh, M. (2017) Identity based secure RSA encryption system. In: Proceedings of International Conference on Communication and Networks. Springer: Singapore. Meenal, J., & Singh, M. (2017) Identity based secure RSA encryption system. In: Proceedings of International Conference on Communication and Networks. Springer: Singapore.
57.
Zurück zum Zitat Chugunkov, I. V. et al. (2017). Classification of pseudo-random number generators applied to information security. In: Proceedings in Young Researchers in Electrical and Electronic Engineering (EIConRus), 2017 IEEE Conference of Russian. Chugunkov, I. V. et al. (2017). Classification of pseudo-random number generators applied to information security. In: Proceedings in Young Researchers in Electrical and Electronic Engineering (EIConRus), 2017 IEEE Conference of Russian.
58.
Zurück zum Zitat Olivier, P., & Ronald, L. Rivest. Marked Mix-Nets. Olivier, P., & Ronald, L. Rivest. Marked Mix-Nets.
59.
Zurück zum Zitat King-Hang W., et al. A review of contemporary E-voting: Requirements, technology, systems and usability. King-Hang W., et al. A review of contemporary E-voting: Requirements, technology, systems and usability.
61.
Zurück zum Zitat Ali, T. S., & Murray J. (2016) An overview of end-to-end verifiable voting systems. In Real-world electronic voting: Design, analysis and deployment (pp. 171–218). CRC Press. Ali, T. S., & Murray J. (2016) An overview of end-to-end verifiable voting systems. In Real-world electronic voting: Design, analysis and deployment (pp. 171–218). CRC Press.
62.
Zurück zum Zitat Herschberg, Mark A. (1997). Secure electronic voting over the world wide Web. Massachusetts Institute of Technology: Diss. Herschberg, Mark A. (1997). Secure electronic voting over the world wide Web. Massachusetts Institute of Technology: Diss.
63.
Zurück zum Zitat Neumann, S., Budurushi, J., & Volkamer, M. (2014). Analysis of security and cryptographic approaches to provide secret and verifiable electronic voting. In Design, development, and use of secure electronic voting systems. IGI Global. Neumann, S., Budurushi, J., & Volkamer, M. (2014). Analysis of security and cryptographic approaches to provide secret and verifiable electronic voting. In Design, development, and use of secure electronic voting systems. IGI Global.
64.
Zurück zum Zitat Jonker, H., Mauw, S., & Pang, J. (2013). Privacy and verifiability in voting systems: Methods, developments and trends. Computer Science Review, 10, 1–30.CrossRef Jonker, H., Mauw, S., & Pang, J. (2013). Privacy and verifiability in voting systems: Methods, developments and trends. Computer Science Review, 10, 1–30.CrossRef
65.
Zurück zum Zitat Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on Computing, 18(1), 186–208.MathSciNetCrossRef Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on Computing, 18(1), 186–208.MathSciNetCrossRef
66.
Zurück zum Zitat Ewanick, B. (2011). Zero knowledge proof. Ewanick, B. (2011). Zero knowledge proof.
67.
Zurück zum Zitat Bootle J., et al. (2016). Efficient zero-knowledge proof systems. In Foundations of security analysis and design VIII (pp. 1–31). Springer International Publishing.MATH Bootle J., et al. (2016). Efficient zero-knowledge proof systems. In Foundations of security analysis and design VIII (pp. 1–31). Springer International Publishing.MATH
76.
Zurück zum Zitat Liu, B. (2012). Sentiment analysis and opinion mining. Morgan & Claypool Publishers. Liu, B. (2012). Sentiment analysis and opinion mining. Morgan & Claypool Publishers.
77.
78.
Zurück zum Zitat Kaplan, A. M., & Haenlein, M. (2012). Users of the world, unite! The challenges and opportunities of social media. Business Horizons, 53(1), 59–68.CrossRef Kaplan, A. M., & Haenlein, M. (2012). Users of the world, unite! The challenges and opportunities of social media. Business Horizons, 53(1), 59–68.CrossRef
82.
Zurück zum Zitat Hugo, N. C., & Lacher, R. G. (2014). Understanding the role of culture and heritage in community festivals: An importance-performance analysis. Journal of Extension, 52. Hugo, N. C., & Lacher, R. G. (2014). Understanding the role of culture and heritage in community festivals: An importance-performance analysis. Journal of Extension, 52.
83.
Zurück zum Zitat Gertz, D. (1991). Festivals, special events, and tourism. Gertz, D. (1991). Festivals, special events, and tourism.
84.
Zurück zum Zitat Rice, D. R., & Zorn, C. (2013). Corpus-based dictionaries for sentiment analysis of specialized vocabularies. In New Directions in Analyzing Text as Data Workshop. London. Rice, D. R., & Zorn, C. (2013). Corpus-based dictionaries for sentiment analysis of specialized vocabularies. In New Directions in Analyzing Text as Data Workshop. London.
85.
Zurück zum Zitat Wang, S., & Manning, C. D. (2012). Baselines and bigrams: simple, good sentiment and topic classification. In Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics. Wang, S., & Manning, C. D. (2012). Baselines and bigrams: simple, good sentiment and topic classification. In Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics.
86.
Zurück zum Zitat Gamallo, P., & Garcia, M. (2014). Citius: A naive-bayes strategy for sentiment analysis on english tweets. In Proceedings of the 8th International Workshop on Semantic Evaluation, (pp. 171–175). Dublin, Ireland. Gamallo, P., & Garcia, M. (2014). Citius: A naive-bayes strategy for sentiment analysis on english tweets. In Proceedings of the 8th International Workshop on Semantic Evaluation, (pp. 171–175). Dublin, Ireland.
87.
Zurück zum Zitat Mehra, N., Khandelwal, S., & Patel, P. (2012). Sentiment identification using maximum entropy analysis of movie reviews. USA. Mehra, N., Khandelwal, S., & Patel, P. (2012). Sentiment identification using maximum entropy analysis of movie reviews. USA.
88.
Zurück zum Zitat Lehrer, A. (1985). Markedness and antonymy. Journal of Linguistics, 397–429.CrossRef Lehrer, A. (1985). Markedness and antonymy. Journal of Linguistics, 397–429.CrossRef
89.
Zurück zum Zitat Turney, P. (2002). Thumbs up or thumbs down? Semantic orientation applied to unsupervised classification of reviews. In ACL 2002 (pp. 417–424). Turney, P. (2002). Thumbs up or thumbs down? Semantic orientation applied to unsupervised classification of reviews. In ACL 2002 (pp. 417–424).
90.
Zurück zum Zitat Baccianella, E. A., Sebastiani, S., & Sebastiani, F. (2010). An enhanced lexical resource for sentiment analysis and opinion mining. LREC, 10, 2200–2204. Baccianella, E. A., Sebastiani, S., & Sebastiani, F. (2010). An enhanced lexical resource for sentiment analysis and opinion mining. LREC, 10, 2200–2204.
91.
Zurück zum Zitat Wiebe, J., & Cardie, C. (2005). Annotating expressions of opinions and emotions in language. Language Resources and Evaluation, 165–210.CrossRef Wiebe, J., & Cardie, C. (2005). Annotating expressions of opinions and emotions in language. Language Resources and Evaluation, 165–210.CrossRef
92.
Zurück zum Zitat Strapparava, C., & Valitutti, A. (2004). Wordnet affect: An affective extension of wordnet. LREC, 4, 1083–1086. Strapparava, C., & Valitutti, A. (2004). Wordnet affect: An affective extension of wordnet. LREC, 4, 1083–1086.
93.
Zurück zum Zitat Moreno-Ortiz, A., & Hernández, C. P. (2013). Lexicon-based sentiment analysis of twitter messages in Spanish. Procesamiento del Lenguaje Natural, Revista, 93–100. Moreno-Ortiz, A., & Hernández, C. P. (2013). Lexicon-based sentiment analysis of twitter messages in Spanish. Procesamiento del Lenguaje Natural, Revista, 93–100.
94.
Zurück zum Zitat Musto, C., Semeraro, S., & Polignano, M. (2014). A comparison of lexicon based approaches for sentiment analysis of microblog posts. Information filtering and retrieval. In Proceedings of the 8th International Workshop on Information Filtering (pp. 12–23). Musto, C., Semeraro, S., & Polignano, M. (2014). A comparison of lexicon based approaches for sentiment analysis of microblog posts. Information filtering and retrieval. In Proceedings of the 8th International Workshop on Information Filtering (pp. 12–23).
95.
Zurück zum Zitat Momtazi, S. (2012). Natural language processing sentiment analysis. Momtazi, S. (2012). Natural language processing sentiment analysis.
96.
Zurück zum Zitat Bonev, B., Sanchez, R., & Rojas, S. O. (2012). Opinum: statistical sentiment analysis for opinion classification. In Computational approaches to subjectivity and sentiment analysis, (pp. 29–37). Jeju. Bonev, B., Sanchez, R., & Rojas, S. O. (2012). Opinum: statistical sentiment analysis for opinion classification. In Computational approaches to subjectivity and sentiment analysis, (pp. 29–37). Jeju.
97.
Zurück zum Zitat Jurafsky, D., & Martin, J. (2014). Speech and language processing. Jurafsky, D., & Martin, J. (2014). Speech and language processing.
98.
Zurück zum Zitat Cambria, E., Schuller, B., Xia, Y., & Havasi, C. (2013). Knowledge-based approaches to concept- level sentiment analysis. IEEE Computer Society.CrossRef Cambria, E., Schuller, B., Xia, Y., & Havasi, C. (2013). Knowledge-based approaches to concept- level sentiment analysis. IEEE Computer Society.CrossRef
99.
Zurück zum Zitat Bing, L. (2015). Opinions, sentiment, and emotion in text. Cambridge University Press. Bing, L. (2015). Opinions, sentiment, and emotion in text. Cambridge University Press.
100.
Zurück zum Zitat Gundla, V. A., & Otari, M. S. (2013). A review on sentiment analysis and visualization of customer reviews. International Journal of Science and Research, 4. Gundla, V. A., & Otari, M. S. (2013). A review on sentiment analysis and visualization of customer reviews. International Journal of Science and Research, 4.
101.
Zurück zum Zitat Chunping, O., Yongbin, L. Shuqing, Z., & Yang Xiaohua, Y. (2015). Features-level sentiment analysis of movie reviews. Advanced Science and Technology Letters, 110–113. Chunping, O., Yongbin, L. Shuqing, Z., & Yang Xiaohua, Y. (2015). Features-level sentiment analysis of movie reviews. Advanced Science and Technology Letters, 110–113.
102.
Zurück zum Zitat Jagtap, V. S., & Pawar, K. (2013). Analysis of different approaches to sentence-level sentiment. International Journal of Scientific Engineering and Technology, 164–170. Jagtap, V. S., & Pawar, K. (2013). Analysis of different approaches to sentence-level sentiment. International Journal of Scientific Engineering and Technology, 164–170.
103.
Zurück zum Zitat Steinberger, J., Brychcin, T., & Konkol, M. (2014). Aspect-level sentiment analysis in Czech. In Computational Approaches to Subjectivity, Sentiment and Social Media Analysis. Baltimore. Steinberger, J., Brychcin, T., & Konkol, M. (2014). Aspect-level sentiment analysis in Czech. In Computational Approaches to Subjectivity, Sentiment and Social Media Analysis. Baltimore.
104.
Zurück zum Zitat Bongirwar, V. (2015). A survey on sentence level sentiment analysis. International Journal of Computer Science Trends and Technology (IJCST), 3(3). Bongirwar, V. (2015). A survey on sentence level sentiment analysis. International Journal of Computer Science Trends and Technology (IJCST), 3(3).
105.
Zurück zum Zitat Zhang, L., & Liu B. (2014). Aspect and entity extraction for opinion mining. In Data mining and knowledge discovery for big data. Springer. Zhang, L., & Liu B. (2014). Aspect and entity extraction for opinion mining. In Data mining and knowledge discovery for big data. Springer.
106.
Zurück zum Zitat Tan, C., Lee, L., Tang, J., Jiang, L., Zhou, M., & Li, P. (2011). User-level sentiment analysis incorporating social networks. San Diego, California: KKD.CrossRef Tan, C., Lee, L., Tang, J., Jiang, L., Zhou, M., & Li, P. (2011). User-level sentiment analysis incorporating social networks. San Diego, California: KKD.CrossRef
107.
Zurück zum Zitat Tripati, G., & Naganna, S. (2015). Feature selection and classification approach for sentiment analysis. Machine Learning and Applications: An International Journal, 2. Tripati, G., & Naganna, S. (2015). Feature selection and classification approach for sentiment analysis. Machine Learning and Applications: An International Journal, 2.
110.
Zurück zum Zitat Garbarino, S., & Holland, J. (2009). In J. Holland (Ed.) Quantitative and qualitative methods in impact evaluation and measuring results. Social Development Dialect. Garbarino, S., & Holland, J. (2009). In J. Holland (Ed.) Quantitative and qualitative methods in impact evaluation and measuring results. Social Development Dialect.
111.
Zurück zum Zitat Schmuck, R. (1997). Practical action research for change. IRI/Skylight Training and Publishing. Schmuck, R. (1997). Practical action research for change. IRI/Skylight Training and Publishing.
113.
Zurück zum Zitat Prevention, C. F. (2008). Evaluation briefs. Prevention, C. F. (2008). Evaluation briefs.
114.
Zurück zum Zitat Wilkinson, S. (2004). Focus groups: A feminist method. In S. Hesse-Biber (Eds.), Femininst perspective on social research (pp. 271–295). New York: Oxford University Press. Wilkinson, S. (2004). Focus groups: A feminist method. In S. Hesse-Biber (Eds.), Femininst perspective on social research (pp. 271–295). New York: Oxford University Press.
115.
Zurück zum Zitat Mmari, K. (2006). Using qualitative methods for monitoring and evaluation. Johns Hopkins University. Mmari, K. (2006). Using qualitative methods for monitoring and evaluation. Johns Hopkins University.
119.
Zurück zum Zitat Pine, B. J., II, & Gilmore, J. H. (1999). The experience economy. Boston: Harvard Business School Press. Pine, B. J., II, & Gilmore, J. H. (1999). The experience economy. Boston: Harvard Business School Press.
120.
Zurück zum Zitat Duncan, E., Jones, C., & Rawson, A. (2013). The truth about customer experience. Harvard Business School Publishing Corporation. Retrieved from www.mckinsey.com. Duncan, E., Jones, C., & Rawson, A. (2013). The truth about customer experience. Harvard Business School Publishing Corporation. Retrieved from www.​mckinsey.​com.
123.
Zurück zum Zitat Zykov, S. (2017). Crisis response and management: technological and human factor-based agility (Chapter 120/705). In M. Khosrow-Pour (Ed.), Encyclopedia of information science and technology (4th Ed., pp. 1396–1406). Information resources management association, USA, Vol. 2, Section: Crisis Response and Management, Release Date: July 2017, ©2018, 7500 pp. Zykov, S. (2017). Crisis response and management: technological and human factor-based agility (Chapter 120/705). In M. Khosrow-Pour (Ed.), Encyclopedia of information science and technology (4th Ed., pp. 1396–1406). Information resources management association, USA, Vol. 2, Section: Crisis Response and Management, Release Date: July 2017, ©2018, 7500 pp.
Metadaten
Titel
The Agile Way
verfasst von
Sergey V. Zykov
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-77917-1_1