Contents



Preface

One of the most important tools accessible to company managers for attaining operational excellence, generating new goods and services, enhancing decision-making, and gaining a competitive edge in information systems. This book provides a current and complete introduction to information systems utilized by businesses today. It is

The book includes chapters on software development, cloud implementation, networking, managing massive datasets, and more. Technologies like blockchain and artificial intelligence (AI) are the backbone of automated systems. Using these foundational areas of IT, the authors provide their perspectives on information

Chapter 1, "Software Development Management", discusses how to choose the correct model for software development, ensuring that its principles will be followed and enforced at every stage of the process. Organizations may benefit from software development management (SDM) because it ensures their applications are being developed and maintained in a logical fashion and that they are producing software solutions that satisfy the needs of all their stakeholders, both internal and external.

Chapter 2, "Classification in Multi-Label Datasets", discusses classification, which is the most often performed activity in data mining. It focuses on multi-label classification,

presenting problem transformation strategies and algorithm adaptations.

Chapter 3, "Research Trends in Library and Information Science in India during 2011 to 2018", is a bibliometric analysis of PhD theses submitted to the Sodhganaga repository between 2011 and 2018. The results show that academic attention is shifting from fundamental library and information science (LIS) subjects to IT and

Chapter 4, "Network Analysis in the Information Systems Management: Implications for a Transdisciplinary Approach", looks at how information flows in the digital world by analyzing the processes involved in this flow using information-measuring tools.

Chapter 5, "Secured Storage Mechanism for the Cloud-Based Banking Applications Using ECC", discusses elliptical curve cryptography (ECC) as a safe storage mechanism

Chapter 6, "Impact of Digital Vehicle Identification Errors on Critical Information Systems", examines the role a high-quality Vehicle Identification Number (VIN) plays in ensuring a vehicle will be used safely. Accident victims' safety may be jeopardized if emergency responders waste time trying to figure out who the car's owner is due to incorrect identification, which may slow down or compromise the quality of their

for the technical reader who deals with huge amounts of data.

management.

computer applications.

for cloud-based financial apps.

work.
