![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Business & management > Business mathematics & systems
This book highlights state-of-the-art research on big data and the Internet of Things (IoT), along with related areas to ensure efficient and Internet-compatible IoT systems. It not only discusses big data security and privacy challenges, but also energy-efficient approaches to improving virtual machine placement in cloud computing environments. Big data and the Internet of Things (IoT) are ultimately two sides of the same coin, yet extracting, analyzing and managing IoT data poses a serious challenge. Accordingly, proper analytics infrastructures/platforms should be used to analyze IoT data. Information technology (IT) allows people to upload, retrieve, store and collect information, which ultimately forms big data. The use of big data analytics has grown tremendously in just the past few years. At the same time, the IoT has entered the public consciousness, sparking people's imaginations as to what a fully connected world can offer. Further, the book discusses the analysis of real-time big data to derive actionable intelligence in enterprise applications in several domains, such as in industry and agriculture. It explores possible automated solutions in daily life, including structures for smart cities and automated home systems based on IoT technology, as well as health care systems that manage large amounts of data (big data) to improve clinical decisions. The book addresses the security and privacy of the IoT and big data technologies, while also revealing the impact of IoT technologies on several scenarios in smart cities design. Intended as a comprehensive introduction, it offers in-depth analysis and provides scientists, engineers and professionals the latest techniques, frameworks and strategies used in IoT and big data technologies.
This book presents 3D3C platforms - three-dimensional systems for community, creation and commerce. It discusses tools including bots in social networks, team creativity, privacy, and virtual currencies & micropayments as well as their applications in areas like healthcare, energy, collaboration, and art. More than 20 authors from 10 countries share their experiences, research fi ndings and perspectives, off ering a comprehensive resource on the emerging fi eld of 3D3C worlds. The book is designed for both the novice and the expert as a way to unleash the emerging opportunities in 3D3C worlds. This Handbook maps with breadth and insight the exciting frontier of building virtual worlds with digital technologies. David Perkins, Research Professor, Harvard Graduate School of Education This book is from one of the most adventurous and energetic persons I have ever met. Yesha takes us into new undiscovered spaces and provides insight into phenomena of social interaction and immersive experiences that transform our lives. Cees de Bont, Dean of School of Design & Chair Professor of Design, School of Design of the Hong Kong Polytechnic University When you read 3D3C Platforms you realize what a domain like ours -- 3D printing -- can and should do for the world. Clearly we are just starting. Inspiring.David Reis, CEO, Stratasys Ltd This book provides a stunning overview regarding how virtual worlds are reshaping possibilities for identity and community. Th e range of topics addressed by the authors- from privacy and taxation to fashion and health care-provide a powerful roadmap for addressing the emerging potential of these online environments. Tom Boellstorff , Professor, Department of Anthropology, University of California, Irvine Handbook on 3D3C Platforms amassed a unique collection of multidisciplinary academic thinking. A primer on innovations that will touch every aspect of the human community in the 21st century. Eli Talmor, Professor, London Business School
European venture capital (VC) funds have historically underperformed their US counterparts. This has resulted in reduced investment into European VC by the traditional institutional investors. This book investigates the factors that give rise to the performance difference. It is based on the author's research at the Adam Smith Business School, University of Glasgow which involved a qualitative study of some 64 VC firms in the UK, continental Europe and the US, supplemented by 40 interviews with other stakeholders, including limited partner investors, corporate venturers, entrepreneurs and advisors. Readers will gain an in-depth understanding of the various structural, operational and wider environmental factors that impact on the performance difference between UK/European and US VC funds. The study is unique in that it provides, for the first time, a holistic and extensive analysis of the entire investment process from sourcing deals to exiting deals specifically contrasting Europe and the US in terms of the variables pertaining to the investment process and the impact on the fund performance. Factors impacting on the performance differential are structural, resulting from characteristics of the funds themselves, operational such as the investment practices of the VC firms which manage the funds and environmental such as culture and attitude to risk and the wider ecosystem in which the funds operate. These factors are set out clearly for the reader. The characteristics of the better performing funds in Europe and the US are also investigated. The book is aimed at academics who are researching venture capital fund performance and investment practices and also at practitioners, advisors and policymakers who want to learn about best VC investment practices. Whilst the book is focused on European and US VC investing, the best practices are also pertinent for VC firms and funds setting up in other geographies, particularly in emerging markets. To this end, best practice guidelines based on the research are included.
The recent surge of technology outsourcing has intensified the cross-cultural effects of information systems designs and constructions, as well as the potential shortage of suitable information specialists at strategic locations. Millions of dollars of investments in information systems are at risk of being underutilized or rejected by users for cultural reasons. ""Information Resources Management: Global Challenges"" addresses challenges in managing information resources in dynamic social environments across cultures, including research on key factors for social acceptance of information technology, and user adoption of information management methods. ""Information Resources Management: Global Challenges"" explores new paradigms under which information resources will generate original meanings for a contemporary generator of users, with increasing interest toward user-centered and culturecentric information systems.
Researchinbothacademicandnon-academiccircleshasremainedvirtuallyiden- calinitsconductandorganizationoverthelastfewdecades. Disparategroupsof researchershaveworkedontheirideas,projectsandinventionsinisolatedclusters, withlittlesharingofinformationandsynergiesfromcollaboration. Theadventof social networks and Web technologies has led to the creation of new research networksthathavedramaticallyreducedthebarriersandobstaclestocollaboration forresearcherswhoaregeographicallyandorganizationallydistant. Webtechnologiesusebroadbandconnections,improvedbrowsers,and"rich" multimediainconcertwithanewgenerationofwebsitesthatencouragedusersto contribute to content. Blogs, forums, wikis, and other forms of user-generated contentare,inmanycases,themajorsourceofcontentforthesewebsites. Theevolutionofsocialnetworksbeganwiththetrulysocialnetworksoffriends pavingthewayforbusinessnetworks,whichinturnledtothecurrentresearch networksthatconnectacademicandnon-academicresearchersacrosstheworld. Beingmuchmorerobustthantheoriginalsocialnetworksandthebusinessn- worksthatfollowed,collaborativeresearchnetworkshavethepotentialtoeven- ate in technological advances, innovation, and economic contributions to both industryandnations. Currently,tensofthousandsofresearchersareusingresearchnetworks,ushering in a new paradigm for research. In this paradigm, collaboration is made much easier,andsharingofresearchknowledgeisinstant. Synergiesfromroutinecoll- oration will yield huge advances in research productivity and innovation. The challengeforadministratorsinbothindustryandacademiaistounderstandhow researchnetworksarechangingthepracticeofresearchandtodecidehowbestto embracesuchtechnologiesandusethemtotheirbestadvantage. v . Contents PartI e-ResearchCollaboration:Theory AnOverviewofe-ResearchCollaboration ...3 1 Introduction...3 2 SocialNetworksandResearchCollaboration ...6 3 WebTechnologies,SocialNetworksande-ResearchCollaboration...6 4 AnOverviewofThisBook...7 5 PartOne:e-ResearchCollaboration:Theory...8 6 PartTwo:e-ResearchCollaboration:Technologies...9 7 PartThree:e-ResearchCollaboration:Challenges...10 8 Conclusions...12 References...1 2 AnAnatomyofCollaborationWithintheOnlineEnvironment ...15 1 IntroductiontoCollaborationTheory...15 2 De?ningCollaboration...16 2. 1 Cooperation...16 2. 2 Coordination...17 2. 3 Collaboration...18 3 EssentialElementsofCollaboration...19 3. 1 Communication...19 3. 2 TrustandRespect ...20 3. 3 EqualityandPower...21 3. 4 StrategicAlliances...22 3. 5 IncentiveandValue...23 3. 6 Negotiation...23 3. 7 Inter-organisationalKnowledgeSharing...24 vii viii Contents 4 ComparisonofCooperation,CoordinationandCollaboration...25 5 PracticalImplicationsforCollaborationTheory...30 References...32 Time,PlaceandCyberspace:FoundationsforSuccessful e-ResearchCollaboration ...35 1 Introduction...35 2 Context:RoleofCommunicationinCollaborations ...36 3 Methodology:CaseStudyofDigitalHumanitiesCommunity...39 4 Findings:e-ResearchCommunicationTools,UsesandDrawbacks...40 5 ImplicationsofResearchResults:FindingtheBalance Betweene-ResearchToolsandIn-personCommunications...43 6 ConclusionsandRecommendationsforGlobalResearchTeams...46 References...47 GapsandBridgesinInterdisciplinaryKnowledgeIntegration ...49 1 Introduction...49 2 KnowledgeIntegrationWithinandBeyondEpistemicCultures...5 1 3 ThePuzzleofInterdisciplinaryKnowledgeIntegration...51 4 ResearchApproach...54 5 COMDEV ...54 6 CollaborationGapsandBridges...55 6. 1 CollaborationBridges...56 7 EntrepreneurialGaps ...57 8 EntrepreneurialBridges...59 9 Conclusion...60 References...63 BuildingaConceptualFrameworkforCreatingNewKnowledge ThroughaVirtualInterdisciplinaryEnvironmentProcess ...
This book summarizes the results of Design Thinking Research carried out at Stanford University in Palo Alto, California, USA and Hasso Plattner Institute in Potsdam, Germany. The authors offer readers a closer look at Design Thinking with its processes of innovations and methods. The contents of the articles range from how to design ideas, methods and technologies via creativity experiments and wicked problem solutions, to creative collaboration in the real world and the connectivity of designers and engineers. But the topics go beyond this in their detailed exploration of design thinking and its use in IT systems engineering fields and even from a management perspective. The authors show how these methods and strategies work in companies, introduce new technologies and their functions and demonstrate how Design Thinking can influence as diverse a topic area as marriage. Furthermore, we see how special design thinking use functions in solving wicked problems in complex fields. Thinking and creating innovations are basically and inherently human - so is Design Thinking. Due to this, Design Thinking is not only a factual matter or a result of special courses nor of being gifted or trained: it's a way of dealing with our environment and improving techniques, technologies and life.
This book explores the influence of the modes of knowledge transfer and environmental dynamism on the relationship between strategic actions and the sustainable balanced scorecard measurement of performance. Special emphasis is placed on emerging multinational enterprises in Kenya, a country that is rapidly becoming one of the fastest growing economies in Africa. The chapters address the best strategy for sustainable performance, the integral modes of knowledge transfer on strategy for sustainable performance and the achievement of sustainable performance in dynamic business environments. Providing innovative research on 25 diverse MNEs in Kenya, this book can be used by managers, investors, consultants, researchers and postgraduate students to understand the strategic mechanisms used by these emerging enterprises.
This book is a guide to asset and risk management from a practical point of view. It is centered around two questions triggered by the global events on the stock markets since the middle of the last decade: - Why do crashes happen when in theory they should not? - How do investors deal with such crises in terms of their risk measurement and management and as a consequence, what are the implications for the chosen investment strategies? The book presents and discusses two different approaches to finance and investing, i.e., modern portfolio theory and behavioral finance, and provides an overview of stock market anomalies and historical crashes. It is intended to serve as a comprehensive introduction to asset and risk management for bachelor s and master s students in this field as well as for young professionals in the asset management industry. A key part of this bookis the exercises to further demonstrate the concepts presented with examples and a step-by-step business case. AnExcel file with the calculations and solutions for all 17 examples as well as all business case calculations can be downloaded at extras.springer.com."
This book explores the possibility of using social media data for detecting socio-economic recovery activities. In the last decade, there have been intensive research activities focusing on social media during and after disasters. This approach, which views people's communication on social media as a sensor for real-time situations, has been widely adopted as the "people as sensor" approach. Furthermore, to improve recovery efforts after large-scale disasters, detecting communities' real-time recovery situations is essential, since conventional socio-economic recovery indicators, such as governmental statistics, are not published in real time. Thanks to its timeliness, using social media data can fill the gap. Motivated by this possibility, this book especially focuses on the relationships between people's communication on Twitter and Facebook pages, and socio-economic recovery activities as reflected in the used-car market data and the housing market data in the case of two major disasters: the Great East Japan Earthquake and Tsunami of 2011 and Hurricane Sandy in 2012. The book pursues an interdisciplinary approach, combining e.g. disaster recovery studies, crisis informatics, and economics. In terms of its contributions, firstly, the book sheds light on the "people as sensors" approach for detecting socio-economic recovery activities, which has not been thoroughly studied to date but has the potential to improve situation awareness during the recovery phase. Secondly, the book proposes new socio-economic recovery indicators: used-car market data and housing market data. Thirdly, in the context of using social media during the recovery phase, the results demonstrate the importance of distinguishing between social media data posted both by people who are at or near disaster-stricken areas and by those who are farther away.
The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment. Combine this with a slowdown in IT spending resulting in justifications of every purchase, and security professionals are forced to scramble to find comprehensive and effective ways to assess their environment in order to discover and prioritize vulnerabilities, and to develop cost-effective solutions that show benefit to the business. A Practical Guide to Security Assessments is a process-focused approach that presents a structured methodology for conducting assessments. The key element of the methodology is an understanding of business goals and processes, and how security measures are aligned with business risks. The guide also emphasizes that resulting security recommendations should be cost-effective and commensurate with the security risk. The methodology described serves as a foundation for building and maintaining an information security program. In addition to the methodology, the book includes an Appendix that contains questionnaires that can be modified and used to conduct security assessments. This guide is for security professionals who can immediately apply the methodology on the job, and also benefits management who can use the methodology to better understand information security and identify areas for improvement.
This book focuses on why and how to achieve digital transformation for enterprises and organizations by introducing cases in China. Its purpose is to highlight the importance and improve the understanding for digital transformation and related issues, like human resource allocation, and how to improve the efficiency and success rate in a low-cost and low-risk way. In this way, the cases in the book avoid the most common traps during the digital transformation process, enabling R&D and business personnel, and data practitioners in the organization to figure out the implementation and processes involved, and hence better understand how to work with senior management team when implementing the transition plan. The middle and senior level managers such as company executives, presidents in banks and universities, and officials in government, are also the target audience.
This book is designed to provide the reader with the fundamentals of computers and MIS in an easy to understand, "self-teaching" format. It introduces the major subjects such as hardware components, software applications, detailed information on Microsoft Office, information systems, ERP, CRM, security, business ethics, and cybercrime. Features: Covers the major components of MS Office: Excel, Word, PowerPoint, and Access Provides an overview of theworkings of a computer, software applications, and MIS Includes discussion of information systems, ERP, security, businessethics, and cybercrime
This book provides the interplay between digital transformation, industry 4.0 technologies, and sustainable supply chain performance. The book mainly focuses on presenting case studies and empirical studies demonstrating how the industry 4.0 technologies interact with the conventional manufacturing practices such as lean manufacturing, circular economy practices, total quality management, and maintenance management, while achieving enhanced sustainable supply chain performance. The book guides the practitioners to consider the status of conventional supply chains in their organisations while designing industry 4.0 systems. This book is a useful resource for researchers and academicians to understand the interplay between existing technologies, industry 4.0 technologies, and sustainable performance in the digital transformation journey.
Performance Assurance for IT Systems emphasizes the importance of addressing performance and technology-related issues from the beginning of the planning process, at the feasibility and bid stages. It promotes the concept of Performance Assurance throughout the entire system lifecycle, covering technology, relevant processes, and people-related topics. This accessible, jargon-free book shows how to meet the increasing pressure to deliver proposals and systems in shorter timescales, emphasizing pragmatic, cost-effective, and well-designed systems. The book consists of two major parts: Part I covers the processes deployed throughout the system lifecycle, including the choice of technologies, client requirements, sizing, stress testing, and capacity management; Part II provides a technology foundation made up of brief primers on hardware and software technologies, discussing key factors that influence performance and helping management make informed decisions on technical risk. The author includes references to problems encountered on "real life" projects, and provides insight valuable to a variety of IT professionals, from technical architects and developers to IT management.
As the use of digital technology has grown, so necessarily has the body of research into its effects at the personal, group and organizational levels, but there is no one book that looks at how digital technology has specifically influenced creativity. Digital Creativity: Individuals, Groups, and Organizations discusses all spectrums of influence that digital technologies have on creativity from the individual, team, and organization level. This book offers a new kind of creativity model encompassing all three levels of creativity. It combines each level into a unified creativity framework in which organizations regardless of their industry types could benefit in reengineering their business processes as well as strategies. For this purpose, the book considers various factors that would affect creativity- individuals' digital efficacy, heterogeneity among members (i.e., age, gender, races, tenure, education, and culture, etc), CMC (Computer-Mediated Communication), task complexity, exploitation, exploration, culture, organizational learning capability, and knowledge networks among members. This book introduces a theorized and systematic glimpse into the exciting realm of digital creativity. It is organized with contents starting from individuals to teams and ultimately to organizations, each with various techniques and cases. Each chapter shows how individuals, teams, and organizations can become more creative through use of digital technologies.
Lankhorst and his co-authors present ArchiMate (R) 3.0, enterprise modelling language that captures the complexity of architectural domains and their relations and allows the construction of integrated enterprise architecture models. They provide architects with concrete instruments that improve their architectural practice. As this is not enough, they additionally present techniques and heuristics for communicating with all relevant stakeholders about these architectures. Since an architecture model is useful not only for providing insight into the current or future situation but can also be used to evaluate the transition from 'as-is' to 'to-be', the authors also describe analysis methods for assessing both the qualitative impact of changes to an architecture and the quantitative aspects of architectures, such as performance and cost issues. The modelling language presented has been proven in practice in many real-life case studies and has been adopted by The Open Group as an international standard. So this book is an ideal companion for enterprise IT or business architects in industry as well as for computer or management science students studying the field of enterprise architecture. This fourth edition of the book has been completely reworked to be compatible with ArchiMate (R) 3.0, and it includes a new chapter relating this new version to other standards. New sections on capability analysis, risk analysis, and business architecture in general have also been introduced.
The Early Development of the Aviation Industry: Entrepreneurs of the Sky provides an introduction to the world of the early aviation industry and the business endeavours of the original aviators. Many of the first pioneers who flew heavier-than-air planes went on to develop considerable industrial concerns. In doing so they exhibited a number of entrepreneurial qualities, which provide useful case studies for those interested in studying how successful entrepreneurs create or develop opportunities at the inception and emergence of high-tech industries. This book looks at the careers of pioneer aviators in the United States, Britain and France such as A.V. Roe, Thomas Sopwith, Glenn Curtiss and William Boeing. It examines this group of entrepreneurs during the start-up and early development stages of an emerging industry undergoing considerable technological change, and relates this experience to contemporary studies and experiences of entrepreneurship. The book explores what made these men successful in their entrepreneurial endeavours to help promote a better understanding of what makes an entrepreneur and what business and economic conditions are needed to allow such men to be successful. This book makes a major contribution to our knowledge of the development of the twentieth century economy and is essential reading for students and academics who are interested in the development of aviation and the nature of entrepreneurial behaviour.
This book examines central aspects of the new technologies and the legal questions raised by them from both an international and an inter-disciplinary perspective. The technology revolution and the global networking of IT systems pose enormous challenges for the law. Current areas of discussion relate to autonomous systems, big data and issues surrounding legal tech. Ensuring data protection and IT security as well as the creation of a legal framework for the new technology as a whole can only be achieved through international and inter-disciplinary co-operation. The team of authors is made up of experienced, internationally renowned experts as well as young researchers and professionals who give valuable insights from numerous different jurisdictions. This book is written for jurists and those responsible for technology in public authorities and companies as well as practising lawyers and researchers.
This book captures a range of important developments that have occurred in Information Systems over the last forty years, with a particular focus on India and the developing world. Over this time, Information and Communications Technology (ICT) and Information Systems (IS) have come to play a critical role in supporting, complementing and automating managerial decisions, shaping and transforming industries, and contributing to deep societal and economic change. This volume examines a range of topics for those interested in the adoption and use of these technologies across varied situations. It combines empirical studies on the application and impact of IS with commentaries, debates and insights on the transformative role that IT and the IT industry have played, and continue to play, within India as well as globally. The book draws attention to issues and challenges that organizations grapple with in tech-enabled environments, and provides insights on the role of automation and computational techniques. It explores the global impact of the technology revolution on economic growth and development, electronic globalization, and the wider opportunities and challenges of a hi-tech world. The chapters cover various themes such as e-government in India, internet-based distribution systems, internet banking, and use of collaborative IT tools and functions to support virtual teams in the software industry and the business process outsourcing industry. Other chapters focus on methodological advances, such as systems thinking which finds applications in organizational decision-making, and the use of fuzzy logic. This volume will interest professionals and scholars of information technology and information systems, computer studies, IT systems, economics, and business and management studies.
Cyber risk is the second highest perceived business risk according to U.S. risk managers and corporate insurance experts. Digital assets now represent over 85% of an organization's value. In a survey of Fortune 1000 organizations, 83% surveyed described cyber risk as an organizationally complex topic, with most using only qualitative metrics that provide little, if any insight into an effective cyber strategy. Written by one of the foremost cyber risk experts in the world and with contributions from other senior professionals in the field, Managing Cyber Risk provides corporate cyber stakeholders - managers, executives, and directors - with context and tools to accomplish several strategic objectives. These include enabling managers to understand and have proper governance oversight of this crucial area and ensuring improved cyber resilience. Managing Cyber Risk helps businesses to understand cyber risk quantification in business terms that lead risk owners to determine how much cyber insurance they should buy based on the size and the scope of policy, the cyber budget required, and how to prioritize risk remediation based on reputational, operational, legal, and financial impacts. Directors are held to standards of fiduciary duty, loyalty, and care. These insights provide the ability to demonstrate that directors have appropriately discharged their duties, which often dictates the ability to successfully rebut claims made against such individuals. Cyber is a strategic business issue that requires quantitative metrics to ensure cyber resiliency. This handbook acts as a roadmap for executives to understand how to increase cyber resiliency and is unique since it quantifies exposures at the digital asset level.
Cyber risk is the second highest perceived business risk according to U.S. risk managers and corporate insurance experts. Digital assets now represent over 85% of an organization's value. In a survey of Fortune 1000 organizations, 83% surveyed described cyber risk as an organizationally complex topic, with most using only qualitative metrics that provide little, if any insight into an effective cyber strategy. Written by one of the foremost cyber risk experts in the world and with contributions from other senior professionals in the field, Managing Cyber Risk provides corporate cyber stakeholders - managers, executives, and directors - with context and tools to accomplish several strategic objectives. These include enabling managers to understand and have proper governance oversight of this crucial area and ensuring improved cyber resilience. Managing Cyber Risk helps businesses to understand cyber risk quantification in business terms that lead risk owners to determine how much cyber insurance they should buy based on the size and the scope of policy, the cyber budget required, and how to prioritize risk remediation based on reputational, operational, legal, and financial impacts. Directors are held to standards of fiduciary duty, loyalty, and care. These insights provide the ability to demonstrate that directors have appropriately discharged their duties, which often dictates the ability to successfully rebut claims made against such individuals. Cyber is a strategic business issue that requires quantitative metrics to ensure cyber resiliency. This handbook acts as a roadmap for executives to understand how to increase cyber resiliency and is unique since it quantifies exposures at the digital asset level.
This volume shows that in today's globalized world, clusters are an important factor in explaining the different growth rates of firms, cities and regions. Drawing on the expertise of an international contributor team, it covers topics such as clusters and small and medium-sized enterprise competitiveness, innovation and science parks, clusters and multinationals, and information and communication technology clusters. It reveals great diversity in terms of the origin of clusters, the organizational relationships at play, and the characteristics of the firms involved. Taking lessons from a rich variety of literature and empirical cases, the book provides valuable insights for regional development and industrial policy. Economic Clusters and Globalization will be of interest to scholars and policymakers in economic geography, regional studies, entrepreneurship and international business.
More than ever, organisations are facing a data avalanche from various sources, be they in electronic or hard copy format. How an organisation manages this ever-increasingly important resource - data - can benefit or hinder its ability to achieve its objectives. Creating and Managing a CRM Platform for Your Organisation not only covers how the principles of data management, including data quality and data security, can be applied to an organisation's customer relationship management (CRM) platform, but also highlights how aspects of data management, marketing and technology are needed to operate, develop and manage a CRM platform in order to carry out tasks such as reporting and analysis, developing data plans, undertaking data audits, data migrations and campaign mailings which will result in an organisation using data effectively in order to achieve its goals and objectives. The issues and topics covered apply to all organisations that use a CRM platform and the data it contains as part of their business activities, regardless of the industry sector or size of the organisation. A comprehensive overview of the practices that can be effectively implemented when managing a CRM platform, this book is essential reading for professionals involved in the administration of the CRM platform within their organisation and data management.
Strategic Renewal is an original research anthology offering insight into a subject area which, although critical for the sustained success of organizations, has received relatively little attention as distinct from the more general phenomenon of strategic change. Firstly, by providing a summary of the literature, this research anthology helps graduate students and new researchers grasp the current state of affairs in the field. Secondly, this research anthology will help update the knowledge base of the existing researchers in the field. By bringing together various studies, the research anthology determines the core concepts of the field and elucidates the key gaps and future research areas. Through contributions building on the knowledge bases of other disciplines, this research anthology develops an interdisciplinary research agenda, giving the reader an in-depth understanding of the mediating, moderating, and antecedent variables concerning strategic renewal. Strategic Renewal aims to provide a state-of-understanding to the subject, as well as a clear picture of the cross-disciplinary landscape that informs the subject. Thus, this research anthology is essential reading for managers, consultants, and other practitioners, as well as students and scholars of business.
This book explores intra-team interaction in workplace settings devoted to technological breakthroughs and innovative entrepreneurship. The first set of studies to investigate these economically important institutions through the lens of talk-at-work, this book begins by discussing the ethnomethodological traditions of Conversation Analysis and institutional interaction and linking them to innovation and entrepreneurship. The book offers rich and detailed empirical accounts of teams talking new technologies and new ventures into being. By focusing on the observable language of teams in action, the book reveals the situated practices that teams use to enact their work, including the means by which team members verbally grapple with the uncertainties inherent in doing work in uncharted domains. The book presents important findings about the conversational accomplishment of work and demonstrates the value of examining the practices of teams in action. A valuable contribution to studies of talk-in-interaction, as well as entrepreneurship-as-practice, this book can help to bridge the gap between scholarly investigations and the practical experiences of entrepreneurs. The author closes by considering the ways that practice-based studies of entrepreneurial work can improve issues of diversity and inclusion within the entrepreneurial ecosystem. This book is intended to serve as an invaluable sourcebook for scholars and students interested in innovation, entrepreneurship, and organizations as well as those focused on applied Conversation Analysis. The book's insights are presented in a richly detailed manner while remaining accessible to readers who are new to the methodologies and activity contexts. |
You may like...
Grindhouse - Cultural Exchange on 42nd…
Austin Fisher, Johnny Walker
Hardcover
R4,960
Discovery Miles 49 600
|