|
Books > Business & Economics > Industry & industrial studies > Media, information & communication industries > Information technology industries
Have you ever felt like students are inundated with material that's
outside of their field, subject to change, or so technical the
student loses interest? Information Systems for the Non-Technical
Manager provides an inside look at the principles that make
information systems a field in its own right and invites students
to apply these principles to all aspects of business management.
The book presents an unfolding explanation of information systems
through the lens of custom-designed conceptual models. The four
distinct parts of the book invite the reader to consider the
purpose of information systems. In the first part, students
consider what questions are being asked that information systems
can answer. In the second part, students break apart and examine
each component of information systems piece by piece. In the third
part, the pieces are joined together and presented as a cohesive
whole. Finally, there is a practical section that includes
interviews with current experts in the field, select case studies,
and a historical survey that provides context for how modern
information systems have developed over time. Presenting the reader
with timeless principles that apply to real-world scenarios,
regardless of discipline, Information Systems for the Non-Technical
Manager is the ideal solution for survey courses for non-majors.
The world has changed since the first edition was published in
2006. There have been many technological changes in communications
and networking and in other areas of computer science. More focus
is given to implementing cybersecurity protections and technical
countermeasures. The second edition also takes advantage of the
evolved industry-specific cybersecurity standards that have
emerged, especially in the electric power and oil-and-gas pipeline
industry sectors. Cybersecurity for SCADA Systems, 2nd Edition is
intended to provide a general background of SCADA system technology
and cybersecurity concepts and technologies, showing how the two
can be brought together to safeguard our infrastructure and
computer automation systems. This book provides a high-level
overview of this unique technology, with an explanation of each
market segment. Readers will understand the vital issues and learn
strategies for decreasing or eliminating system vulnerabilities.
Cybersecurity for SCADA Systems, 2nd Edition is suitable for
nontechnical, management-level personnel as well as IT personnel
without SCADA experience. Features and Benefits Functional
breakdown and explanation of the typical features, capabilities,
and components of a SCADA system IT and cybersecurity technology
and terminology overview and explanation Industry-specific as well
as generalized discussion of SCADA vulnerabilities and available
remediation strategies Discussion of physical and electronic
security issues and strategies Audience IT personnel Management
Students
Emerging Media: Virtual Issues, Legal Principles introduces
contemporary media and information studies students to the nexus
between law and emerging media technology. With a goal to present a
clear and succinct overview of communication and media law, the
text presents legal doctrines in accessible terms and in the
context of current issues and technology. Author Jason Zenor
encourages students to think critically about the psychological,
social, and political harms that communication technology can
cause. Students are exposed to a myriad of current examples that
reflect issues in today's media environment, with legal analysis of
how these issues could be resolved. Specific topical areas include
censorship, false speech, privacy, civil liability, obscenity,
identity rights, intellectual property, consumer protection, and
market regulation. Each chapter concludes with a case study and
discussion questions so students can apply the legal doctrine to a
communication technology problem. Emerging Media provides students
with a timely and valuable focus on legal and policy issues
attendant to new communication technologies.
A Review of Personality in Human-Robot Interactions reviews the
literature on personality and embodied physical action (EPA)
robots. This monograph investigates the current state of
human-robot personality research, discusses the unique role of
personality in human-robot research, and offers guidance for future
research. A Review of Personality in Human-Robot Interactions
offers several contributions to the literature. First, it presents
a conceptual integrated model of the literature on personality in
human-robot literature. Second, it highlights four thrust areas in
the literature. These areas include: (1) Human Personality and HRI,
(2) Robot Personality and HRI, (3) Robot Personality and HRI, and
(4) Factors Impacting Robot Personality. Third, it derives and
presents major insights from the literature. Finally, it identifies
gaps in the literature that need to be addressed. After the
introduction, Section 2 presents the relevant literature including
the inclusion and exclusion criteria for articles. Section 3
presents and discusses Thrust Area 1: Human Personality and HRI. In
sections 4, 5, and 6, a similar discussion takes place for Thrust
Area 2: Robot Personality and HRI, Thrust Area 3: Robot Personality
and HRI, and Thrust Area 4: Factors Impacting Robot Personality,
respectively. Section 7 follows with a discussion on the way
forward, focusing on the opportunities for personality research in
human-robot interaction.
This is a book for anyone intrigued by the complexities of digital
leadership that require a capability to constantly balance the
routines of everyday business with the ability to innovate. Finding
the appropriate mix between the dichotomy stability-flexibility has
been a delicate task that few, if any, corporations have properly
managed to overcome. Why is that? This conundrum becomes acute as
businesses embark on digital transformations, an often-painful
venture highlighting the deficiencies of traditional management
styles but also agile methodologies. They deliver results that are
far below initial expectations, provide half-baked digital
solutions where potential commercial gains are poorly captured and
leveraged, and, far too often, not even identified. Mismatches
between technologies, the man-machine (dis)connect, or
organizational dysfunctionality are typically identified as root
causes, but beneath them lurks a more scathing problem: an
inadequate leadership. This inadequacy rests on a lack of holistic
insights backed by well-rounded skills and sets of knowledge that
are required to understand all aspects of a digital transformation,
as well as its participants from employees to customers. Thus, what
is needed is a modern take of the Renaissance Man.
Rapid development of new technologies is leading to ever more
versatile, multipurpose mobile devices, including 4G and 5G
smartphones. Wireless networking and wireless Internet access are
developing and expanding on a global basis at a rapid rate.
Meanwhile, RFID (radio frequency identification) will revolutionize
wireless tracking, inventory and logistics, from manufacturing to
shipping to retailing. We analyze mobile advertising, mobile
banking, WiMax, LTE and other wireless standards. Mobile
entertainment is covered, including TV and other programming
adapted for the cell screen. In addition, we cover wireless markets
in India, China and Africa, competition between handset
manufacturers, as well as the iPhone and other smartphones. Our
coverage includes business trends analysis and industry statistics.
We also include a wireless and cellular business glossary and a
listing of industry contacts, such as industry associations and
government agencies. Next, we profile hundreds of leading
companies. Our 330 company profiles include complete business
descriptions and up to 27 executives by name and title. You'll find
a complete overview, industry analysis and market research report
in one superb, value-priced package.
Technology is breaking politics-what can be done about it?
Artificially intelligent "bot" accounts attack politicians and
public figures on social media. Conspiracy theorists publish junk
news sites to promote their outlandish beliefs. Campaigners create
fake dating profiles to attract young voters. We live in a world of
technologies that misdirect our attention, poison our political
conversations, and jeopardize our democracies. With massive amounts
of social media and public polling data, and in-depth interviews
with political consultants, bot writers, and journalists, Philip N.
Howard offers ways to take these "lie machines" apart. Lie Machines
is full of riveting behind-the-scenes stories from the world's
biggest and most damagingly successful misinformation
initiatives-including those used in Brexit and U.S. elections.
Howard not only shows how these campaigns evolved from older
propaganda operations but also exposes their new powers, gives us
insight into their effectiveness, and explains how to shut them
down.
|
You may like...
The New Kingdom
Wilbur Smith, Mark Chadbourn
Hardcover
(1)
R317
Discovery Miles 3 170
The Spy Coast
Tess Gerritsen
Paperback
R380
R339
Discovery Miles 3 390
Leo
Deon Meyer
Paperback
(2)
R415
R370
Discovery Miles 3 700
Doolhof
Rudie van Rensburg
Paperback
R375
R352
Discovery Miles 3 520
Blood Trail
Tony Park
Paperback
R310
R281
Discovery Miles 2 810
Moederland
Madelein Rust
Paperback
R370
R347
Discovery Miles 3 470
|