Fields of Application, Methods of and Current Trends in Information Management

  • Marek R. Ogiela
  • Urszula Ogiela
Part of the Advanced Information and Knowledge Processing book series (AI&KP)


Topics of information management are coming up not only in the literature of the subject [1–4] but also in everyday life. Aspects of these topics are particularly worthy of attention as this process increasingly expands beyond the boundaries of a specific business organisation – an enterprise – and is becoming widespread in politics, culture, science and, obviously, in business. This is because information management processes encompass not just simple information processing and analysis, but primarily its acquisition, collecting and transmission.


Organisational Structure Information Management Information Flow Secret Sharing Secret Sharing Scheme 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Haag, S., & Cummings, M. (2012). Management information systems for the information age. Irwin: McGraw-Hill.Google Scholar
  2. 2.
    Krcmar, H. (2006). Information management. Springer.Google Scholar
  3. 3.
    Ladley, J. (2010). Making enterprise information management (EIM) work for business: A guide to understanding information as an asset. Burlington: Morgan Kaufman.Google Scholar
  4. 4.
    Schermerhorn, J. R. (2012). Management. Hoboken: Wiley.Google Scholar
  5. 5.
    Shannon, C. E. (1945). A mathematical theory of cryptography. New York: Bell Laboratories, Classified Memorandum.Google Scholar
  6. 6.
    Shannon, C. E. (1948). A mathematical theory of communication. New York: American Telephone and Telegraph Company.Google Scholar
  7. 7.
    Ogiela, L. (2009). UBIAS systems for cognitive interpretation and analysis of medical images. Opto-Electronics Review, 17(2), 166–179.CrossRefGoogle Scholar
  8. 8.
    Ogiela, L., & Ogiela, M. R. (2009). Cognitive techniques in visual data interpretation (Studies in computational intelligence, Vol. 228). Berlin/Heidelberg: Springer.CrossRefGoogle Scholar
  9. 9.
    Ogiela, L., & Ogiela, M. R. (2012). Advances in cognitive information systems (Cognitive systems monographs, Vol. 17). Berlin/Heidelberg: Springer.MATHCrossRefGoogle Scholar
  10. 10.
    Ward, J., Griffiths, P., & Whitemore, P. (1992). Strategic planning for information systems. Chichester: Wiley.Google Scholar
  11. 11.
    Schwarze, P. (1998). Informationsmanagement, Planung, Steuerung, Koordination und Kontrolle der Informationsversorgung im Unternehmen. Herne/Berlin: Verlag Neue Wirtschafts-Briefe.Google Scholar
  12. 12.
    Tipton, H. F. (2007). Information security management handbook. Boca Raton: Auerbach.MATHGoogle Scholar
  13. 13.
    Whitman, M. E., & Mattord, H. J. (2010). Management of information security. Boston: Course Technology.Google Scholar
  14. 14.
    Li, H., & Singhal, M. (2007). Trust management in distributed systems. Computer, 40(2), 45–53.CrossRefGoogle Scholar
  15. 15.
    Mackenzie, O. J. (Ed.). (2006). Information science and knowledge management. Berlin: Springer.Google Scholar
  16. 16.
    O’Brien, J., & Marakas, G. (2010). Management information systems. Irwin: McGraw-Hill.Google Scholar
  17. 17.
    Ogiela, M.R., & Ogiela, U. (2008). Linguistic extension for secret sharing (m, n)-threshold schemes. In: SecTech 2008 – 2008 International Conference on Security Technology, December 13–15, 2008 (pp. 125–128). Hainan Island, Sanya.Google Scholar
  18. 18.
    Ogiela, M. R., & Ogiela, U. (2010). Grammar encoding in DNA-like secret sharing infrastructure. Lecture Note in Computer Science, 6059, 175–182.CrossRefGoogle Scholar
  19. 19.
    Ogiela, M. R., & Ogiela, U. (2010). The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers & Mathematics with Applications, 60(2), 267–271.MathSciNetMATHCrossRefGoogle Scholar
  20. 20.
    Ogiela, M. R., & Ogiela, U. (2012). Linguistic protocols for secure information management and sharing. Computers & Mathematics with Applications, 63(2), 564–572.MathSciNetCrossRefGoogle Scholar
  21. 21.
    Ogiela, M. R., & Ogiela, U. (2012). DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management, 32, 175–181.CrossRefGoogle Scholar
  22. 22.
    Ong, H., Schnorr, C. P., & Shamir, A. (1985). Efficient signature schemes based on polynomial equations. In: Advances in cryptology proceedings of CRYPTO’84 (pp. 37–46). New York: Springer.Google Scholar
  23. 23.
    Reynolds, G. (2009). Information technology for managers. Boston: Course Technology.Google Scholar
  24. 24.
    Cellary, W., Wiza, W., & Walczak, K. (2004). Visualizing web search results in 3D. Computer, 37(5), 87–89.CrossRefGoogle Scholar
  25. 25.
    ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, 469–472.MathSciNetMATHCrossRefGoogle Scholar
  26. 26.
    Ogiela, M. R., & Ogiela, U. (2009). Shadow generation protocol in linguistic threshold schemes. Communication in Computer and Information Science, 58, 35–42. Springer, Berlin/Heidelberg.CrossRefGoogle Scholar
  27. 27.
    Okamoto, T. (1990). A fast signature scheme based on congruential polynomial operations. IEEE Transactions on Information Theory, 1, 47–53.CrossRefGoogle Scholar
  28. 28.
    Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. New York: Wiley.MATHGoogle Scholar
  29. 29.
    Seberry, J., & Pieprzyk, J. (1989). Cryptography: An introduction to computer security. Englewood Cliffs: Prentice-Hall.MATHGoogle Scholar
  30. 30.
    Tang, S. (2004). Simple secret sharing and threshold RSA signature schemes. Journal of Information and Computational Science, 1, 259–262.Google Scholar
  31. 31.
    Tompa, M., & Woll, H. (1988). How to share a secret with cheaters. Journal of Cryptology, 2, 133–138.MathSciNetGoogle Scholar
  32. 32.
    van Dijk, M. (1995). On the information rate of perfect secret sharing schemes. Designs, Codes and Cryptography, 6, 143–169.MATHCrossRefGoogle Scholar
  33. 33.
    Wang, S. J., Tsai, Y. R., & Chen, P. Y. (2007). Proactive (k, n) threshold secret sharing scheme with variant k and n. In: Proceedings of the IPC 2007 – The 2007 International Conference on Intelligent Pervasive Computing (pp. 117–120), October 11–13th, 2007, Jeju Island.Google Scholar

Copyright information

© Springer-Verlag London 2014

Authors and Affiliations

  • Marek R. Ogiela
    • 1
  • Urszula Ogiela
    • 1
  1. 1.AGH University of Science and TechnologyKrakówPoland

Personalised recommendations