![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Business & management > Business mathematics & systems
The most important theme of the discourse on sustainable development and sustainability challenges concerns the relationship between innovation and sustainability. This book represents a realistic critical overview of the state of affairs of sustainable innovations, offering an accessible and comprehensive diagnostic point of reference for both the academic and practitioner worlds. In order for sustainable innovation to truly become mainstream practice in business it is necessary to find out how organizations can strategically and efficiently accommodate sustainability and innovation in such a manner that they accomplish value capturing (for firms, stakeholders, and for society), not merely creating a return on the social responsibility agenda. Addressing this challenge, the book draws together research from a range of perspectives in order to understand the potential shifts and barriers, benefits, and outcomes from all angles: inception, strategic process, and impact for companies and society. The book also delivers insights of (open) innovation in public sector organizations, which is not so much a process of invention as it is one of adoption and diffusion. It examines how the environmental pillar of the triple bottom line in private firms is often a by-product of thinking about the economic pillar, where cost reductions may be achieved through process innovation in terms of eliminating waste and reducing energy consumption. The impact of open innovation on process innovation, and sustainable process innovation in particular, is an underexplored area but is examined in this book. It also considers the role of the individual entrepreneur in bringing about sustainable innovation; entrepreneurs, their small- and medium-sized enterprises (SMEs), as well as the innovation ecosystems they build play a significant role in generating sustainable innovations where these smaller organizations are much more flexible than large organizations in targeting societal needs and challenges. The readership will incorporate PhD students and postgraduate researchers, as well as practitioners from organizational advisory fields.
Ideas are the fuel of industry and the entertainment business. Likewise, manufacturers receive suggestions for new products or improvements to existing products, and retailers frequently receive ideas for new marketing campaigns. Many ideas are not new and may be used by anyone without the risk of incurring any legal liability, but some ideas are novel and valuable. If the originator of a potentially useful idea does not have the financial resources to exploit the idea, he or she may submit it to another, with the expectation of receiving compensation if the idea is used. Although an extensive body of intellectual property law exists to protect the rights of inventors, authors, and businesses that own valuable brands or confidential proprietary information, raw ideas receive no protection. Nevertheless, the originator of a potentially useful and marketable idea is not without legal recourse. The courts have developed, through a long line of common law precedents, legal protection for novel and concrete ideas under certain circumstances. The originator of an idea can rely on contract law, whereby the recipient may expressly or impliedly agree to pay for the idea. Alternatively, if the idea is disclosed in confidence, its unauthorized use by the recipient allows the originator of the idea to recover compensation. Finally, some courts have treated the ownership of ideas as quasi-property rights.
Software product lines represent perhaps the most exciting paradigm shift in software development since the advent of high-level programming languages. Nowhere else in software engineering have we seen such breathtaking improvements in cost, quality, time to market, and developer productivity, often registering in the order-of-magnitude range. Here, the authors combine academic research results with real-world industrial experiences, thus presenting a broad view on product line engineering so that both managers and technical specialists will benefit from exposure to this work. They capture the wealth of knowledge that eight companies have gathered during the introduction of the software product line engineering approach in their daily practice.
The main purpose of this paper is to contribute to the discussion about the design of computer and communication systems that can aid the management process. 1.1 Historical Overview We propose that Decision Support System can be considered as a design conception conceived within the computer industry to facilitate the use of computer technology in organisations (Keen, 1991). This framework, built during the late 1970s, offers computer and communication technology as support to the decision process which constitutes, in this view, the core of the management process. The DSS framework offers the following capabilities: * Access: ease of use, wide variety of data, analysis and modelling capacity. * Technological: software gel)eration tools. * Development modes: interactive and evolutionary. Within this perspective, computer and communication technologies are seen as an amplification of the human data processing capabilities which limit the decision process. Thus, the human being is understood metaphorically as a data processing machine. Mental processes are associated with the manipulation of symbols aOO human communication to signal transmission.
For graduate and executive level MIS students, and practicing IS managers. A thorough and practical guide to IT management practices and issues. Managing Information Technology provides comprehensive coverage of IS management practices and technology trends for advanced students and managers. Through an approach that offers up-to-date chapter content and full-length case studies, this text presents a unique set of materials that educators can customize to their students' needs. The sixth edition has been thoroughly updated and streamlined to reflect current IS practices.
Business information systems and business information technology are integral aspects of modern business, and managers in these areas are now expected to have knowledge of human and managerial issues, as well as technical ones. This concise and readable book is a level-by-level primer that addresses the core subjects in business information systems and business information technology to enhance students' understanding of the key areas. Each chapter begins with a case study and features at the end: a summary of major points, glossary of terms, suggested further reading and student activities. Some areas covered include: Different functional areas of business, including accounting, HRM and marketing Development and implementation of information systems Methods to support the analysis and design of policy and practice Strategic management to align information technology with organizational needs Covering the subject matter in a highly accessible manner, this is an ideal text for both undergraduate and masters students on business information systems, business information technology and business information management courses. This text is supplemented with over 900 detailed powerpoint slides for instructors, accessible via the Routledge Instructor Resource page at http://cw.routledge.com/textbooks/instructordownload/
Global Enterprise Transitions: Managing the Process addresses the importance of information technology management and issues in operating information systems in the global dynamic business environment. This book embraces discussions of the global information technology theory, frameworks and IT architecture, discovery of global knowledge management, improvement of the global information systems development methodologies, and applications of the latest technologies such as mobile technology and web services in the global information systems development and operations.
Advanced Topics in Global Information Management is a series of books that examine global information management (GIM), and its research and implications. GIM research continues to progress, with some scholars pushing the boundaries of thinking and others challenging the status quo. ""Advanced Topics in Global Information Management, Volume 5"" is a part of this series. ""Advanced Topics in Global Information Management, Volume 5"" discusses how many businesses exist in a global environment. Whether they are large or small companies, they may have suppliers or customers that reside in different geographical locations. The ability to function in this global environment has been facilitated by the use of information technology. Through research projects, this book addresses the ability of both large and small business, and government, from the national level to local level, to function in altered environments by using information technology. In all of these situations, both businesses and governments must be able to function and respond to various stakeholders by adopting the appropriate, and necessary, cultural perspective.
Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance. Establishing this understanding and keeping it up to date requires a resource with coverage as diverse as the field it covers. Filling this need, the Encyclopedia of Information Assurance presents an up-to-date collection of peer-reviewed articles and references written by authorities in their fields. From risk management and privacy to auditing and compliance, the encyclopedia's four volumes provide comprehensive coverage of the key topics related to information assurance. This complete IA resource: Supplies the understanding needed to help prevent the misuse of sensitive information Explains how to maintain the integrity of critical systems Details effective tools, techniques, and methods for protecting personal and corporate data against the latest threats Provides valuable examples, case studies, and discussions on how to address common and emerging IA challenges Placing the wisdom of leading researchers and practitioners at your fingertips, this authoritative reference provides the knowledge and insight needed to avoid common pitfalls and stay one step ahead of evolving threats. Also Available OnlineThis Taylor & Francis encyclopedia is also available through online subscription, offering a variety of extra benefits for researchers, students, and librarians, including: Citation tracking and alerts Active reference linking Saved searches and marked lists HTML and PDF format options Contact Taylor and Francis for more information or to inquire about subscription options and print/online combination packages. US: (Tel) 1.888.318.2367; (E-mail) [email protected] International: (Tel) +44 (0) 20 7017 6062; (E-mail) [email protected]
This book provides a coherent overview of the most important modelling-related security techniques available today, and demonstrates how to combine them. Further, it describes an integrated set of systematic practices that can be used to achieve increased security for software from the outset, and combines practical ways of working with practical ways of distilling, managing, and making security knowledge operational. The book addresses three main topics: (1) security requirements engineering, including security risk management, major activities, asset identification, security risk analysis and defining security requirements; (2) secure software system modelling, including modelling of context and protected assets, security risks, and decisions regarding security risk treatment using various modelling languages; and (3) secure system development, including effective approaches, pattern-driven development, and model-driven security. The primary target audience of this book is graduate students studying cyber security, software engineering and system security engineering. The book will also benefit practitioners interested in learning about the need to consider the decisions behind secure software systems. Overall it offers the ideal basis for educating future generations of security experts.
Presented are innovative teaching and learning techniques for the teaching of knowledge-based paradigms. The main knowledge-based intelligent paradigms are expert systems, artificial neural networks, fuzzy systems and evolutionary computing. Expert systems are designed to mimic the performance of biological systems. Artificial neural networks can mimic the biological information processing mechanism in a very limited sense. Evolutionary computing algorithms are used for optimization applications, and fuzzy logic provides a basis for representing uncertain and imprecise knowledge.
The Remote Work Handbook: The Definitive Guide for Operationalizing Remote Work as a Competitive Business Strategy is for readers seeking to leverage the business benefits of a flexible, remote workforce. It is a practical guide for building and implementing remote work at any size organization. C-suite executives, operation leaders, business owners, or entrepreneurs who recognize the workplace is changing can use it to re-tool their operations for a strategic business advantage. Mari Anne Snow, the author, is a recognized remote work expert with over 20 years of experience leading remote teams and has re-written the rules of leadership to unlock the potential in remote and distributed teams. In this book, she shares all her secrets. The book explores the untapped potential of remote teams and lays out the business case for adopting a new, flexible workplace model to build organizational resilience and a competitive edge. It takes the reader through the step-by-step process of constructing a remote work operating model, staging an implementation, then institutionalizing and sustaining the change. It includes down-to-earth professional and personal stories that alert the reader to the top priorities and operational realities they will face as they craft their own implementation plan for operationalizing remote work at their company.
"[A] valuable addition[s] to the stock of material available for fledgling social scientists. Lewis-Bec?s book is best for early nurture. . . " --Eric Tanenbaum in ESRC Data Archive Bulletin "This book, I predict, will turn the statistics-shy into eager practitioners, and skillful ones to boot. . . . It?s a masterpiece of clarity and appliedness, written in a refreshing and engaging style. Not only is a lot of ground covered--as much as can be packed into a first-semester course in data analysis--but the author also grapples with issues of statistical theory (specification error, collinearity, least-squares estimation)." --Helmet Norpoth, SUNY at Stony Brook "This is a very fine book that will make an excellent addition to the Sage quantitative application series. It does a nice job of illustrating how data analysis is conducted by taking a simple, easy-to-motivate example and following it through the entire gamut of data analysis steps." --Herbert Weisberg, The Ohio State University Written at a level appropriate for the advanced undergraduate course on data analysis, this accessible volume introduces the reader to the "art" of data analysis from data-gathering to multiple regression in which a dependent variable is influenced by several independent variables. The book focuses on the interpretation of a statistical result, in particular those that come from nonexperimental social research. Using a consistent data set throughout the book in order to illustrate the various analytic techniques, the author covers such topics as univariate statistics, measures of association, the statistical significance of the relationship between two variables, and simple regression where the dependent variable is influenced by a single independent variable. The last chapter offers analysis recommendations. Data Analysis will provide social science researchers with the tools to select and evaluate statistical tests appropriate for their particular research question.
Traditional business practices have been left behind due to the increased use of data analytics and information technology in companies worldwide. This development has led to businesses implementing transformative projects that use these new technologies in their decision-making systems. Altering the entire architecture of a company is a daunting task; however, researchers are finding methods through applied mathematics that can make it easier on companies. Implementing analytical models into current business processes is vital for professionals across the globe. Using Applied Mathematical Models for Business Transformation is an essential reference source that discusses the advancement of decision-making systems in business environments with the use of applied mathematics, algorithms, and information technology. Featuring research on topics such as decision-making systems, critical success factors, and global enterprise architecture, this book is ideally designed for project managers, financial analysts, business strategists, software engineers, technical architects, students, researchers, and educators seeking coverage on the transformation of business practices using applied mathematics and information technology.
The only up-to-date introductory textbook on sport entrepreneurship and innovation. Entrepreneurial skills are essential for anybody working in sport management, particularly in the face of COVID-related challenges. Introduces key theory and focuses on best practice, based on real world scenarios. Includes practitioner voices throughout.
Data mining is the process of extracting hidden patterns from data, and it's commonly used in business, bioinformatics, counter-terrorism, and, increasingly, in professional sports. First popularized in Michael Lewis' best-selling Moneyball: The Art of Winning An Unfair Game, it is has become an intrinsic part of all professional sports the world over, from baseball to cricket to soccer. While an industry has developed based on statistical analysis services for any given sport, or even for betting behavior analysis on these sports, no research-level book has considered the subject in any detail until now. Sports Data Mining brings together in one place the state of the art as it concerns an international array of sports: baseball, football, basketball, soccer, greyhound racing are all covered, and the authors (including Hsinchun Chen, one of the most esteemed and well-known experts in data mining in the world) present the latest research, developments, software available, and applications for each sport. They even examine the hidden patterns in gaming and wagering, along with the most common systems for wager analysis.
Here's a broad, integrated view of existing communications technologies available world-wide -- including the Internet and Web, digital mobile telephony, ISDN, SMDS, frame relay, and ATM -- from a practical business perspective. Covering both private and public networks, the book offers a basic explanation of a wide range of technologies and describes their underlying principles and features, as well as the factors that differentiate them. The guide also showcases typical applications, exposes inherent limitations, explains pricing and methods of comparison, and discusses security pitfalls and protection systems.
1) What to do when you get hacked 2) A guide to incident response 3) Incident response and cybersecurity for small businesses
* International approach, with examples and cases from the US, Europe and Africa * Each chapter contains objectives, case studies, discussion questions and further reading suggestions. * PPT slides and data sets available as digital supplements
This is a compilation of papers presented at the Information System Concepts conference in Marburg, Germany. The special focus is consolidation and harmonisation of the numerous and widely diverging views in the field of information systems. This issue has become a hot topic, as many leading information system researchers and practitioners come to realise the importance of better communication among the members of the information systems community, and of a better scientific foundation of this rapidly evolving field.
This book collects high-quality papers on the latest fundamental advances in the state of Econophysics and Management Science, providing insights that address problems concerning the international economy, social development and economic security. This book applies the multi-fractal detrended class method, and improves the method with different filters. The authors apply those methods to a variety of areas: financial markets, energy markets, gold market and so on. This book is arguably a systematic research and summary of various kinds of multi-fractal detrended methods. Furthermore, it puts forward some investment suggestions on a healthy development of financial markets.
This book is comprised of the presentations delivered at the 25th ICSA Applied Statistics Symposium held at the Hyatt Regency Atlanta, on June 12-15, 2016. This symposium attracted more than 700 statisticians and data scientists working in academia, government, and industry from all over the world. The theme of this conference was the "Challenge of Big Data and Applications of Statistics," in recognition of the advent of big data era, and the symposium offered opportunities for learning, receiving inspirations from old research ideas and for developing new ones, and for promoting further research collaborations in the data sciences. The invited contributions addressed rich topics closely related to big data analysis in the data sciences, reflecting recent advances and major challenges in statistics, business statistics, and biostatistics. Subsequently, the six editors selected 19 high-quality presentations and invited the speakers to prepare full chapters for this book, which showcases new methods in statistics and data sciences, emerging theories, and case applications from statistics, data science and interdisciplinary fields. The topics covered in the book are timely and have great impact on data sciences, identifying important directions for future research, promoting advanced statistical methods in big data science, and facilitating future collaborations across disciplines and between theory and practice.
Current database technology and computer hardware allow us to gather, store, access, and manipulate massive volumes of raw data in an efficient and inexpensive manner. In addition, the amount of data collected and warehoused in all industries is growing every year at a phenomenal rate. Nevertheless, our ability to discover critical, non-obvious nuggets of useful information in data that could influence or help in the decision making process, is still limited. Knowledge discovery (KDD) and Data Mining (DM) is a new, multidisciplinary field that focuses on the overall process of information discovery from large volumes of data. The field combines database concepts and theory, machine learning, pattern recognition, statistics, artificial intelligence, uncertainty management, and high-performance computing. To remain competitive, businesses must apply data mining techniques such as classification, prediction, and clustering using tools such as neural networks, fuzzy logic, and decision trees to facilitate making strategic decisions on a daily basis. Knowledge Discovery for Business Information Systems contains a collection of 16 high quality articles written by experts in the KDD and DM field from the following countries: Austria, Australia, Bulgaria, Canada, China (Hong Kong), Estonia, Denmark, Germany, Italy, Poland, Singapore and USA.
This book examines the requirements, risks, and solutions to improve the security and quality of complex cyber-physical systems (C-CPS), such as production systems, power plants, and airplanes, in order to ascertain whether it is possible to protect engineering organizations against cyber threats and to ensure engineering project quality. The book consists of three parts that logically build upon each other. Part I "Product Engineering of Complex Cyber-Physical Systems" discusses the structure and behavior of engineering organizations producing complex cyber-physical systems, providing insights into processes and engineering activities, and highlighting the requirements and border conditions for secure and high-quality engineering. Part II "Engineering Quality Improvement" addresses quality improvements with a focus on engineering data generation, exchange, aggregation, and use within an engineering organization, and the need for proper data modeling and engineering-result validation. Lastly, Part III "Engineering Security Improvement" considers security aspects concerning C-CPS engineering, including engineering organizations' security assessments and engineering data management, security concepts and technologies that may be leveraged to mitigate the manipulation of engineering data, as well as design and run-time aspects of secure complex cyber-physical systems. The book is intended for several target groups: it enables computer scientists to identify research issues related to the development of new methods, architectures, and technologies for improving quality and security in multi-disciplinary engineering, pushing forward the current state of the art. It also allows researchers involved in the engineering of C-CPS to gain a better understanding of the challenges and requirements of multi-disciplinary engineering that will guide them in their future research and development activities. Lastly, it offers practicing engineers and managers with engineering backgrounds insights into the benefits and limitations of applicable methods, architectures, and technologies for selected use cases.
Innovation, agility, and coordination are paramount in the support of value in the global knowledge economy. Therefore, the long-term success of a company is increasingly dependent on its underlying resilience and agility. ""Knowledge Reuse and Agile Processes"" addresses flexibility of both business and information systems through component technology at the nexus of three seemingly unrelated disciplines: service-oriented architecture, knowledge management, and business process management. Providing practitioners and academicians with timely, compelling research on agile, adaptive processes and information systems, this premier reference source will enhance the collection of every reference library. |
![]() ![]() You may like...
Proceedings of the Botanical Society of…
Botanical Society Of London
Paperback
R403
Discovery Miles 4 030
The Manager's Handbook for Corporate…
Gerald L. Kovacich, Edward Halibozek
Hardcover
STEM Research for Students Volume 1…
Julia H Cothron, Ronald N Giese, …
Hardcover
R2,880
Discovery Miles 28 800
The Comprehensive Public High School…
G. Sherington, Craig Campbell
Hardcover
Optimizing Health Monitoring Systems…
Nilmini Wickramasinghe
Hardcover
R7,958
Discovery Miles 79 580
|