Unprecedented social changes, accelerated by facilitating technologies and the COVID-19 pandemic, are calling for airlines to think deeply and non-conventionally on what will be important to existing and new travelers, as they change their lifestyles.
This book provides a framework for evaluating big data and cloud computing based on how they evolve to fit users' needs in developing countries in key areas, such as agriculture and education.
Industrial Clusters shows the latest state of knowledge on the topic of industrial clusters, with a particular focus on clustering in the UK, bringing together a chronological coverage of the phenomenon.
Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization.
Introduction to Emergency Management, Third Edition provides a comprehensive update of this foundational text on the background components and systems involved in the management of disasters and other emergencies.
The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response.
The objective of Creating a Culture for Information Systems Success is to assist CIOs and IT managers on how to use their managerial actions to create a suitable cultural environment in the organization that leads to a successful and sustainable implementation of information systems function.
In The Chasm Companion, The Chasm Group's Paul Wiefels presents readers with a new analysis of the ideas introduced in bestselling author Geoffrey Moore's classic books, Crossing the Chasm and Inside the Tornado, and focuses on how to translate these ideas into actionable strategy and implementation programs.
This book highlights the practical aspects of using Oracle Essbase and Oracle Business Intelligence Enterprise Edition (OBIEE) as a comprehensive BI solution.
Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems.
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development.
The New York Times and USA Today bestseller-updated to bring you up to speed on the latest social media sites, features, and strategiesFrom one of the world's leading figures in social media marketing, networking, and business applications comes the heavily revised and updated edition of the Likeable Social Media.
Sustainable Self-Governance in Businesses and Society offers a sound introduction to Stafford Beer's Viable System Model (VSM) and clarifies its relevance to support organisational sustainability and self-governance.
We now possess the capability to make great business decisions in even the most difficult situations with the use of today's advanced software capability.
'Corporate Politics for IT Managers: How to get Streetwise' addresses some of the most persistent problems faced by IT managers which undermine their power and influence in their organisations and which prevents them obtaining seat on the board of directors.
IT Performance Management addresses the way organizations should balance the demand and the supply of information technology, optimizing the cost and maximizing the business value of IT.
Humans at Work in the Digital Age explores the roots of twenty-first-century cultures of digital textual labor, mapping the diverse physical and cognitive acts involved, and recovering the invisible workers and work that support digital technologies.
In Obstructive Marketing, Maitland Hyslop deals with a very negative kind of activity which embraces activities, legal or otherwise, designed to prevent or restrict the distribution of a product or service, temporarily or permanently, against the wishes of the product manufacturer, service provider or customer.
This book draws on important original transdisciplinary research to address a wide range of issues relating to the remodeling of existing schools for pre-teenagers to fit them to various novel teaching models (e.
In today's digital environment the workplace is characterised by individuals creating information perhaps independently of formal systems, or establishing new systems without knowledge of information management requirements.
Deconstruct the history of patterns of innovation in business and connect them to existing and failed attempts in management consultancies, engineering, web technologies and academic institutions.
Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft.
Despite providing us with a good understanding of how firms use certain mechanisms to benefit from open innovation strategies, current research provides only limited insights into how barriers internal to the firm may hamper knowledge transfer and limit effective utilization of external knowledge sources.
This book provides a clear and concise overview of Information Management covering the key aspects of infrastructure, design, information assets and managing information.
Unmasking Project Management helps professionals in information technology (IT) and business identify successful approaches to management of information systems (MIS) that will work for their organizations and projects.
First published in 1989, this book presents a unique comparative perspective on the relationship between technological change and human resource management.
In Rethinking Information Systems in Organizations John Paul Kawalek challenges the current orthodoxy of information systems and proposes new alternatives.