Application of Information Systems

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: 20 May 2024 | Viewed by 3722

Special Issue Editors

School of Science and Technology, University of Trás-os-Montes e Alto Douro, 5000-801 Vila Real, Portugal
Interests: information systems; IT adoption; digital transition; web accessibility and usability; business analytics
AquaValor – Centre for Water Valorization and Knowledge Transfer, 5400-342 Chaves, Portugal
Interests: information systems; adoption of technology, digital transition; ICT4 development
Department of Sciences and Technology, Universidade Aberta, 1269-001 Lisbon, Portugal
Interests: information systems; enterprise engineering; enterprise architecture; digital transformation

Special Issue Information

Dear Colleagues,

As information and communication systems and technologies evolve, organizations are also carrying out their digital transition process concerning their three main functional scopes: operational control, management and executive administration.

The current stage of adoption and use of information systems at the enterprise level is directly associated with the emergence of digital ecosystems. Both are populated by digital entities, including software applications, IT infrastructures and digital processes, and by specialized communities continuously focused on the permanent incorporation of innovation.

So far, these digital ecosystems have aimed at the transition from product and service-oriented organizations to data-driven organizations, where information systems play an essential role in maintaining the competitiveness and performance of these same organizations.

That said, this Special Issue proposes to present innovative proposals for using information systems in companies and the digital transition of their business.

This Special Issue encourages the submission of state-of-the-art research in information systems and technologies to support the digital transition of both organizations and their business processes. Topics of interest include (but are not limited to) the following subject categories:

  • Management Information Systems.
  • Digital Transition.
  • Internet of Things.
  • Information Systems Management and Governance.
  • Data Governance.
  • Master Data Management.
  • Big Data.
  • Enterprise Architectures.
  • Business Intelligence Tools and Techniques.
  • Green Information Technologies.
  • Information Security.
  • Information Systems Online Training and Certification.

Dr. Frederico Branco
Dr. José Martins
Dr. Henrique Mamede
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • information systems
  • digital transition
  • digital business ecosystems
  • digital business
  • information systems security

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

37 pages, 9684 KiB  
Article
PatentInspector: An Open-Source Tool for Applied Patent Analysis and Information Extraction
by Konstantinos Petrakis, Konstantinos Georgiou, Nikolaos Mittas and Lefteris Angelis
Appl. Sci. 2023, 13(24), 13147; https://doi.org/10.3390/app132413147 - 11 Dec 2023
Viewed by 1071
Abstract
Patent analysis is a field that concerns the analysis of patent records, for the purpose of extracting insights and trends, and it is widely used in various fields. Despite the abundance of proprietary software employed for this purpose, there is currently a lack [...] Read more.
Patent analysis is a field that concerns the analysis of patent records, for the purpose of extracting insights and trends, and it is widely used in various fields. Despite the abundance of proprietary software employed for this purpose, there is currently a lack of easy-to-use and publicly available software that can offer simple and intuitive visualizations, while advocating for open science and scientific software development. In this study, we attempt to fill this gap by offering PatentInspector, an open-source, public tool that, by leveraging patent data from the United States Trademark and Patent Office, is able to produce descriptive analytics, thematic axes and citation network analysis. The use and interpretability of PatentInspector is illustrated through a use case on human resource management-related patents, highlighting its functionalities. The results indicate that PatentInspector is a practical resource for conducting patent analytics and can be used by individuals with a limited or no background in coding and software development. Full article
(This article belongs to the Special Issue Application of Information Systems)
Show Figures

Figure 1

23 pages, 1323 KiB  
Article
Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework
by Jacek Piątkowski and Sabina Szymoniak
Appl. Sci. 2023, 13(23), 12668; https://doi.org/10.3390/app132312668 - 25 Nov 2023
Viewed by 489
Abstract
Internet communication is one of the significant aspects of modern civilization. People use banking, health, social, or shopping platforms and send a lot of data. Each communication should be secured and protected against dishonest users’ activities during its transfer via network links. Cryptographic [...] Read more.
Internet communication is one of the significant aspects of modern civilization. People use banking, health, social, or shopping platforms and send a lot of data. Each communication should be secured and protected against dishonest users’ activities during its transfer via network links. Cryptographic protocols provide such security and protection. Because of the evolution of the vulnerabilities and attackers’ methods, the cryptographic protocols should be regularly verified. This paper presents a methodology for testing the security of cryptographic protocols using the CMMTree framework. We developed and adapted a software package for analyzing cryptographic protocols regarding compatibility with the CMMTree framework using a predicate according to the approach described in Siedlecka-Lamch et al.’s works. We optimized and strengthened the mentioned approach with tree optimization methods and a lexicographic sort rule. Next, we researched the well-known security protocols using a developed tool and compared and verified the results using sorted and shuffled data. This work produced promising results. No attacks on the tested protocols were discovered. Full article
(This article belongs to the Special Issue Application of Information Systems)
Show Figures

Figure 1

24 pages, 7639 KiB  
Article
Compiling Requirements from Models for Early Phase Scope Estimation in Agile Software Development Projects
by Lina Bisikirskienė, Lina Čeponienė, Mantas Jurgelaitis, Linas Ablonskis and Eglė Grigonytė
Appl. Sci. 2023, 13(22), 12353; https://doi.org/10.3390/app132212353 - 15 Nov 2023
Viewed by 734
Abstract
Inadequate early scope estimation is a common problem in software projects, leading to failures in meeting project requirements. Agile projects usually do not concentrate on a comprehensive requirements analysis and specification before the start of the project, making scope assessment difficult. This paper [...] Read more.
Inadequate early scope estimation is a common problem in software projects, leading to failures in meeting project requirements. Agile projects usually do not concentrate on a comprehensive requirements analysis and specification before the start of the project, making scope assessment difficult. This paper presents the methodology for facilitating a more accurate early estimation of project scope, based on requirements information gathered in various forms (requirements models and textual descriptions) during the requirements workshop. The requirements from different sources are compiled into one list and reconciled, since they are prepared by a number of participants in the requirements workshop using different notations (UML diagrams, SysML models, Story map) and may have differences in the vocabulary. Reconciliation encompasses the unification of vocabulary, as well as the identification and the removal of overlaps in requirements. The final list of requirements is used to estimate the scope of the project in story points. The estimate can be presented to the client and used as a basis for the project contract. A case study on the application of the proposed methodology is presented, using the animal shelter information system as a development project. It demonstrates that the methodology is viable and can facilitate the gathering of a more extensive set of requirements, thus ensuring a more detailed scope estimation. Full article
(This article belongs to the Special Issue Application of Information Systems)
Show Figures

Figure 1

Review

Jump to: Research

19 pages, 2728 KiB  
Review
Exploring a Multidisciplinary Assessment of Organisational Maturity in Business Continuity: A Perspective and Future Research Outlook
by Nelson Russo, Henrique São Mamede, Leonilde Reis, José Martins and Frederico Branco
Appl. Sci. 2023, 13(21), 11846; https://doi.org/10.3390/app132111846 - 30 Oct 2023
Viewed by 875
Abstract
In a competitive business landscape heavily reliant on information and communication technology, organisations must be prepared to address disruptions in their business operations. Business continuity management involves effective planning for the swift reestablishment of business processes in the short term. However, there are [...] Read more.
In a competitive business landscape heavily reliant on information and communication technology, organisations must be prepared to address disruptions in their business operations. Business continuity management involves effective planning for the swift reestablishment of business processes in the short term. However, there are still obstacles to implementing business continuity plans, which can be justified by various factors. The purpose of this study is to present the perspectives and future research paths based on a systematic literature review from the peer-reviewed literature published from 1 January 2000 to 31 December 2021. This systematic literature review adheres to the guidelines established by evidence-based software engineering and leverages the Parsifal online tool. The primary research results identify and establish connections between the common components and activities of business continuity management as defined in international standards and frameworks to identify gaps in the existing knowledge. These findings will contribute to the development of a framework that provides a practical approach applicable to organisations of all sizes, taking into account each aspect of business continuity management, with a particular emphasis on information and communication technology systems. This paper’s contribution lies in offering insights from a systematic literature review regarding the strategic principles for designing and implementing a business continuity plan, along with a comprehensive overview of related research. Furthermore, it presents a path forward to guide future research efforts aimed at addressing the gaps in the literature concerning continuity planning. Full article
(This article belongs to the Special Issue Application of Information Systems)
Show Figures

Figure 1

Back to TopTop