In the last few decades, managerial and business studies have shown an increasing inability to explain and forecast emergent dynamics in society, economics, and the environment.
Knowledge integration - the purposeful combination of specialized and complementary knowledge to achieve specific tasks - is becoming increasingly important for organizations facing rapidly changing institutional environments, globalized markets, and fast-paced technological developments.
Knowledge integration - the purposeful combination of specialized and complementary knowledge to achieve specific tasks - is becoming increasingly important for organizations facing rapidly changing institutional environments, globalized markets, and fast-paced technological developments.
Macroeconomic research on human capital - the stock of human capabilities and knowledge - has been extensively published but to date the literature has lacked a comprehensive analysis of human capital within the organization.
Macroeconomic research on human capital - the stock of human capabilities and knowledge - has been extensively published but to date the literature has lacked a comprehensive analysis of human capital within the organization.
After twenty-five years of preparation, the Large Hadron Collider at CERN, Geneva, is finally running its intensive scientific experiments into high-energy particle physics.
After twenty-five years of preparation, the Large Hadron Collider at CERN, Geneva, is finally running its intensive scientific experiments into high-energy particle physics.
The governance of the public sciences has profoundly changed since the Second World War, especially with regard to funding structures, the autonomy, and accountability of public research organizations and universities, and the extent to which research is steered towards societal usefulness.
Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact.
The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response.
The Digital Hand, Volume 2, is a historical survey of how computers and telecommunications have been deployed in over a dozen industries in the financial, telecommunications, media and entertainment sectors over the past half century.
The Handbook of Behavioral Operations Management provides easy-to-access insights into why associated behavioral phenomena exist in specific production and service settings, illustrated through ready-to-play games and activities that allow instructors to demonstrate the phenomena in class settings along with applicable prescriptions for practice.
The World's Leading Business Minds on Today's Most Critical Challenges The most innovative ideas from the Thinkers50India now produces a disproportionately high percentage of the business world's most influential thinkers.
Making Data Integration Work: How to Systematically Reduce Cost, Improve Quality, and Enhance Effectiveness Today's enterprises are investing massive resources in data integration.
The Easy Introduction to Machine Learning (Ml) for Nontechnical People--In Business and Beyond Artificial Intelligence for Business is your plain-English guide to Artificial Intelligence (AI) and Machine Learning (ML): how they work, what they can and cannot do, and how to start profiting from them.
Ho> For CEOs, CIOs, CFOs, and IT leaders: The green IT business case and best practices for making it happen Timely help for companies facing rising energy costs, new government rules, and growing public concern Powerful new insights from IBM's breakthrough $1 billion green computing initiative Chances are your enterprise IT organization has a significant carbon footprint.
The complete guide to planning, implementing, and operating IT as a Service (ITaaS) Ongoing digitization, along with the risks of digital disruption, mean today's Enterprise businesses are more reliant than ever on their IT Organizations to be successful; but business cannot wait on IT.
The complete guide to planning, implementing, and operating IT as a Service (ITaaS) Ongoing digitization, along with the risks of digital disruption, mean today's Enterprise businesses are more reliant than ever on their IT Organizations to be successful; but business cannot wait on IT.
Protect Your Organization Against Massive Data Breaches and Their Consequences Data breaches can be catastrophic, but they remain mysterious because victims don't want to talk about them.
Protect Your Organization Against Massive Data Breaches and Their Consequences Data breaches can be catastrophic, but they remain mysterious because victims don't want to talk about them.
This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book.