Preface

One of the most important tools accessible to company managers for attaining operational excellence, generating new goods and services, enhancing decision-making, and gaining a competitive edge in information systems. This book provides a current and complete introduction to information systems utilized by businesses today. It is for the technical reader who deals with huge amounts of data.

The book includes chapters on software development, cloud implementation, networking, managing massive datasets, and more. Technologies like blockchain and artificial intelligence (AI) are the backbone of automated systems. Using these foundational areas of IT, the authors provide their perspectives on information management.

Chapter 1, "Software Development Management", discusses how to choose the correct model for software development, ensuring that its principles will be followed and enforced at every stage of the process. Organizations may benefit from software development management (SDM) because it ensures their applications are being developed and maintained in a logical fashion and that they are producing software solutions that satisfy the needs of all their stakeholders, both internal and external.

Chapter 2, "Classification in Multi-Label Datasets", discusses classification, which is the most often performed activity in data mining. It focuses on multi-label classification, presenting problem transformation strategies and algorithm adaptations.

Chapter 3, "Research Trends in Library and Information Science in India during 2011 to 2018", is a bibliometric analysis of PhD theses submitted to the Sodhganaga repository between 2011 and 2018. The results show that academic attention is shifting from fundamental library and information science (LIS) subjects to IT and computer applications.

Chapter 4, "Network Analysis in the Information Systems Management: Implications for a Transdisciplinary Approach", looks at how information flows in the digital world by analyzing the processes involved in this flow using information-measuring tools.

Chapter 5, "Secured Storage Mechanism for the Cloud-Based Banking Applications Using ECC", discusses elliptical curve cryptography (ECC) as a safe storage mechanism for cloud-based financial apps.

Chapter 6, "Impact of Digital Vehicle Identification Errors on Critical Information Systems", examines the role a high-quality Vehicle Identification Number (VIN) plays in ensuring a vehicle will be used safely. Accident victims' safety may be jeopardized if emergency responders waste time trying to figure out who the car's owner is due to incorrect identification, which may slow down or compromise the quality of their work.

Chapter 7, "Blockchain-Based Educational Certificates: A Proposal", discusses the use of blockchain databases to store academic transcripts. Most such systems today use blockchain as a safe means of verifying and exchanging student information, academic certificates, and institution databases.

Chapter 8, "Artificial Intelligence and the Media: Revisiting Digital Dichotomy Theory", reviews the impact of AI on the media industry in which it is revolutionizing various aspects of content creation, distribution, and consumption.

Chapter 9, "Hybrid Perovskite-Based Memristor Devices", discusses the development of modern electronic devices for advanced applications driven by AI and machine learning (ML). It highlights the increasing demand for "universal memory" devices with exceptional qualities. The chapter explores the history and current state of memristor technology, including novel structures, switching mechanisms, materials, and various applications such as data storage, artificial synapse, light-induced resistive switching, logic gates, and mimicking human behavior.

Chapter 10, "Technology Strategy Formulation for Global Corporations", discusses technology strategy formulation for global corporations, considering the social and political factors that arise due to cultural and geographical diversity across different countries and locations. The author emphasizes that focusing solely on technology and economics is not sufficient for these corporations, as the execution of technology strategies is influenced by social structures and political dynamics.

Finally, Chapter 11, "Comparative Study of Information Security in Mobile Operating Systems: Android and Apple iOS", is a comparative study of Android and iOS mobile operating systems that finds through qualitative and quantitative analysis that iOS offers stronger information security compared to the Android system. Although virus infections are less prevalent in iOS, risks exist from other cyber-attacks like spyware capturing sensitive information. Cybercriminals target both platforms, particularly social networks. The study recommends security measures such as strong passwords, advanced encryption, firewall and privacy tools, document encryption, and encrypted communication apps like Signal to enhance overall security.

> **Dr. Rohit Raja** Associate Professor, IT Department, Guru Ghasidas Vishwavidyalaya (A Central University), Bilaspur (CG), India

### **Dr. Hiral Raja**

**1**

Section 1

Introduction

Associate Professor, Mathematics Department, Dr. C.V. Raman University, Bilaspur (CG), India

Section 1 Introduction
