In this volume, the authors apply insights from a variety of perspectives to explore the alignment among strategy, organization design, process and human resource management, and e-business practices on developing successful social networking programs-with particular regard to applying such initiatives against the backdrop of the global financial crisis and challenges to traditional business models.
ICT Development for Social and Rural Connectedness provides an introduction to the concept of 'connectedness', and explores how this socio-psychological term has evolved during the age of the Internet.
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups.
Interactive Operations Research with Maple: Methods and Models has two ob- jectives: to provide an accelerated introduction to the computer algebra system Maple and, more importantly, to demonstrate Maple's usefulness in modeling and solving a wide range of operations research (OR) problems.
Bildung und Digitalität bilden einen Zusammenhang, der in seiner Dringlichkeit an unzähligen wissenschaftlichen, institutionellen und gesellschaftlichen Stellschrauben diskutiert und gestaltet wird.
In our profoundly complex and interconnected world, there is a pressing need for systems thinking, to consider environmental, societal and organisational issues as interconnected wholes rather than separating them into parts and looking at each in isolation.
The five approaches outlined in this book offers the systems thinking practitioner a range of interchangeable tools for pro-actively making systemic improvements amidst complex situations of change and uncertainty.
This book presents a guide to navigating the complicated issues of quality and process improvement in enterprise software implementation, and the effect these have on the software development life cycle (SDLC).
An Introduction to Computer Graphics for Artists is an application-independent, reader-friendly primer for anyone with a serious desire to understand 3D Computer Graphics.
Remarkable progress in eye-tracking technologies opened the way to design novel attention-based intelligent user interfaces, and highlighted the importance of better understanding of eye-gaze in human-computer interaction and human-human communication.
This edited collection provides an alternative discourse on cities evolving with physically and virtually networked communities-the 'digital polis'-and offers a variety of perspectives from the humanities, media studies, geography, architecture, and urban studies.
Broadband Infrastructure: The Ultimate Guide to Understanding and Delivering OSS/BSS is a "e;how to"e; book for Internet infrastructure companies to help them prepare for the decisions they will face when constructing their core OSS strategies and infrastructure.
When work began on the first volume ofthis text in 1992, the science of dis- tribution management was still very much a backwater of general manage- ment and academic thought.
Social network analysis applications have experienced tremendous advances within the last few years due in part to increasing trends towards users interacting with each other on the internet.
Information and communication technology (ICT) is permeating all aspects of service management; in the public sector, ICT is improving the capacity of government agencies to provide a wide array of innovative services that benefit citizens.
A new model of business has emerged within the Digital-Economy called Internetworked Enterprise (IE); it's a model that posits networks, communities of individuals and refusal of a centralized mindset as the core elements of the new frame of reference.
Driven by counter-terrorism efforts, marketing analysis and an explosion in online social networking in recent years, data mining has moved to the forefront of information science.
Sociological theories of crime include: theories of strain blame crime on personal stressors; theories of social learning blame crime on its social rewards, and see crime more as an institution in conflict with other institutions rather than as in- vidual deviance; and theories of control look at crime as natural and rewarding, and explore the formation of institutions that control crime.
It is 5 years since the publication of the seminal paper on "e;Design Science in Information Systems Research"e; by Hevner, March, Park, and Ram in MIS Quarterly and the initiation of the Information Technology and Systems department of the Communications of AIS.
Computer-based infectious disease surveillance systems are capable of real-time or near real-time detection of serious illnesses and potential bioterrorism agent exposures and represent a major step forward in disease surveillance.
Web services and service oriented environments are key enablers for the migration of entertainment, business, sociability, science and health-care from the physical world to the virtual world.
For over a decade, William Lehr, Lorenzo Pupillo, and their colleagues in academia, industry, and policy have been on the electronic frontier, exploring the implications of the technologies that are revolutionizing communication and culture.
Beginning Hibernate, Third Edition is ideal if you’re experienced in Java with databases (the traditional, or "e;connected,"e; approach), but new to open-source, lightweight Hibernate, a leading object-relational mapping and database-oriented application development framework.
Digital Asset Management: Content Architectures, Project Management, and Creating Order out of Media Chaos is for those who are planning a digital asset management system or interested in becoming digital asset managers.