Special Issue "Information for Business and Management–Software Development for Data Processing and Management"

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information Applications".

Deadline for manuscript submissions: closed (31 October 2021).

Special Issue Editor

Prof. Dr. Aneta Poniszewska-Maranda
E-Mail Website
Guest Editor
Institute of Information Technology, Lodz University of Technology, 90-924 Lodz, Poland
Interests: software engineering; information systems security; multi-agent-based systems; cloud computing; Internet of Things; mobile security; blockchain; data analysis; machine learning; data processing; distributed systems
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Today, data and information are among the most important resources in various aspects of our life and economy. Data and information are created, generated, collected, stored, and then processed and shared in various ways. All these activities are performed with the participation of contemporary software, applications, IT systems and their components.

Thus, in addition to creating the software itself, it is becoming increasingly important to manage the data and information that the software uses, processes and stores. Hence, it is extremely important not only the software itself and the process of its development, but also information management at the appropriate level, while maintaining a sufficiently high level of data protection, information and its flow.

The process of software development and information management are becoming more and more interconnected and dependent, striving to develop and support a modern society based on knowledge and modern technologies.

Therefore, this Special Issue aims to show various aspects of software creation and development, designed for fast, easy and secure processing and management of data and information.

The areas of interest for this Special Issue include the following topics: software analysis and design for processing and management of data and information, software deployment for data processing, business analysis, business rules, requirements engineering, software development process, information management system, knowledge management solutions, software for security and privacy of data, software for data mining, software for knowledge management. 

Prof. Dr. Aneta Poniszewska-Maranda
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Software engineering for data
  • Requirements engineering for information management
  • Data processing and management
  • Business analysis
  • Knowledge management
  • Security and privacy of data
  • Software for data mining

Published Papers (5 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Article
Automation of Basketball Match Data Management
Information 2021, 12(11), 461; https://0-doi-org.brum.beds.ac.uk/10.3390/info12110461 - 08 Nov 2021
Viewed by 270
Abstract
Despite the fact that sport plays a substantial role in people’s lives, funding varies significantly from one discipline to another. For example, in Poland, women’s basketball in the lower divisions, is primarily developing thanks to enthusiasts. The aim of the work was to [...] Read more.
Despite the fact that sport plays a substantial role in people’s lives, funding varies significantly from one discipline to another. For example, in Poland, women’s basketball in the lower divisions, is primarily developing thanks to enthusiasts. The aim of the work was to design and implement a system for analyzing match protocols containing data about the match. Particular attention was devoted to the course of the game, i.e., the order of scoring points. This type of data is not typically stored on the official websites of basketball associations but is significant from the point of view of coaches. The obtained data can be utilized to analyze the team’s game during the season, the quality of players, etc. In terms of obtaining data from match protocols, a dedicated algorithm for identifying the table was used, while a neural network was utilized to recognize the numbers (with 70% accuracy). The conducted research has shown the proposed system is well suited for data acquisition based on match protocols what implies the possibility of increasing the availability of data on the games. This will allow the development of this sport discipline. Obtained conclusions can be generalized to other disciplines, where the games are recorded in paper form. Full article
Show Figures

Figure 1

Article
Graph Analysis Using Fast Fourier Transform Applied on Grayscale Bitmap Images
Information 2021, 12(11), 454; https://0-doi-org.brum.beds.ac.uk/10.3390/info12110454 - 01 Nov 2021
Viewed by 345
Abstract
There is spiking interest in graph analysis, mainly sparked by social network analysis done for various purposes. With social network graphs often achieving very large size, there is a need for capable tools to perform such an analysis. In this article, we contribute [...] Read more.
There is spiking interest in graph analysis, mainly sparked by social network analysis done for various purposes. With social network graphs often achieving very large size, there is a need for capable tools to perform such an analysis. In this article, we contribute to this area by presenting an original approach to calculating various graph morphisms, designed with overall performance and scalability as the primary concern. The proposed method generates a list of candidates for further analysis by first decomposing a complex network into a set of sub-graphs, transforming sub-graphs into intermediary structures, which are then used to generate grey-scaled bitmap images, and, eventually, performing image comparison using Fast Fourier Transform. The paper discusses the proof-of-concept implementation of the method and provides experimental results achieved on sub-graphs in different sizes randomly chosen from a reference dataset. Planned future developments and key considered areas of application are also described. Full article
Show Figures

Figure 1

Article
Spatial Pattern and Influencing Factors of Outward Foreign Direct Investment Enterprises in the Yangtze River Economic Belt of China
Information 2021, 12(9), 381; https://0-doi-org.brum.beds.ac.uk/10.3390/info12090381 - 18 Sep 2021
Viewed by 478
Abstract
This paper studies outward foreign direct investment (OFDI) enterprises in the Yangtze River Economic Belt. Using geographical information system (GIS) spatial analysis and SPSS correlation analysis methods, it analyzes the change in the spatial distribution of OFDI enterprises in 2010, 2014, and 2018. [...] Read more.
This paper studies outward foreign direct investment (OFDI) enterprises in the Yangtze River Economic Belt. Using geographical information system (GIS) spatial analysis and SPSS correlation analysis methods, it analyzes the change in the spatial distribution of OFDI enterprises in 2010, 2014, and 2018. It explores the influencing factors that have an impact on this change. The results show the following: (1) The geographical distribution of OFDI enterprises in the Yangtze River Economic Belt is uneven. In the downstream region, OFDI enterprises have significant advantages in both quantity and quality over those in the mid- and up-stream regions. In recent years, a multi-core spatial pattern has gradually emerged. (2) The factors influencing the spatial distribution of OFDI enterprises have been gradually changing from one dominant factor, i.e., technological innovation capability, to four core factors, namely, urbanization level, economic development level, technological innovation capability, and degree of economic openness. The research results serve as an important reference for future policy adjustment in the Yangtze River Economic Belt. First, the Yangtze River Economic Belt should adjust industrial policies; comprehensively increase the level of OFDI; accelerate the upgrading and transformation of regional industries; and, at the same time, inject vitality into the development of the world economy. Moreover, the downstream region should fully play a leading role in the Yangtze River Economic Belt, especially in encouraging OFDI enterprises to establish global production networks. Meanwhile, enterprises in the upstream region are encouraged to establish regional production networks to accelerate the development of inland open highlands. Full article
Show Figures

Figure 1

Article
Use Dynamic Scheduling Algorithm to Assure the Quality of Educational Programs and Secure the Integrity of Reports in a Quality Management System
Information 2021, 12(8), 315; https://0-doi-org.brum.beds.ac.uk/10.3390/info12080315 - 06 Aug 2021
Viewed by 503
Abstract
The implementation of quality processes is essential for an academic setting to meet the standards of different accreditation bodies. However, processes are complex because they involve several steps and several entities. Manual implementation (i.e., using paperwork), which many institutions use, has difficulty following [...] Read more.
The implementation of quality processes is essential for an academic setting to meet the standards of different accreditation bodies. However, processes are complex because they involve several steps and several entities. Manual implementation (i.e., using paperwork), which many institutions use, has difficulty following up the progress and closing the cycle. It becomes more challenging when more processes are in place, especially when an academic department runs more than one program. Having n programs per department means that the work is replicated n times. Our proposal in this study is to use the concept of the Tomasulo algorithm to schedule all processes of an academic institution dynamically. Because of the similarities between computer tasks and the processes of workplaces, applying this method enhances work efficiencies and reduces efforts. Further, the method provides a mechanism to secure the integrity of the reports of these processes. In this paper, we provided an educational institution case study to understand the mechanism of this method and how it can be applied in an actual workplace. The case study included operational activities that are implemented to assure the program’s quality. Full article
Show Figures

Figure 1

Article
Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques
Information 2021, 12(8), 298; https://0-doi-org.brum.beds.ac.uk/10.3390/info12080298 - 26 Jul 2021
Viewed by 847
Abstract
For effective vulnerability management, vulnerability and attack information must be collected quickly and efficiently. A security knowledge repository can collect such information. The Common Vulnerabilities and Exposures (CVE) provides known vulnerabilities of products, while the Common Attack Pattern Enumeration and Classification (CAPEC) stores [...] Read more.
For effective vulnerability management, vulnerability and attack information must be collected quickly and efficiently. A security knowledge repository can collect such information. The Common Vulnerabilities and Exposures (CVE) provides known vulnerabilities of products, while the Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of common attributes and approaches employed by adversaries to exploit known weaknesses. Due to the fact that the information in these two repositories are not linked, identifying related CAPEC attack information from CVE vulnerability information is challenging. Currently, the related CAPEC-ID can be traced from the CVE-ID using Common Weakness Enumeration (CWE) in some but not all cases. Here, we propose a method to automatically trace the related CAPEC-IDs from CVE-ID using three similarity measures: TF–IDF, Universal Sentence Encoder (USE), and Sentence-BERT (SBERT). We prepared and used 58 CVE-IDs as test input data. Then, we tested whether we could trace CAPEC-IDs related to each of the 58 CVE-IDs. Additionally, we experimentally confirm that TF–IDF is the best similarity measure, as it traced 48 of the 58 CVE-IDs to the related CAPEC-ID. Full article
Show Figures

Figure 1

Back to TopTop