![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Media, information & communication industries > Information technology industries
Examining the flow of technical knowledge between the US, Taiwan and Mainland China over the last sixty-five years, this book shows that the technical knowledge that has moved between these states is vast and varied. It includes the invention and production of industrial goods, as well as knowledge of the patterns of corporate organization and management. Indeed, this diversity is reflected in the process itself, which is driven both by returning expatriates with knowledge acquired overseas and by successful government intervention in acquiring technology from multinational firms. Technology Transfer Between the US, China and Taiwan engages with the evolving debates on the merits, importance and feasibility of technology transfer in the process of economic development globally, and uses the example of Taiwan to show that multinational corporations can indeed play a positive role in economic development. Further, it reveals the underlying tension between international cooperation and nationalism which inevitably accompanies international exchanges, as well as the delicate balancing act required between knowledge acquisition and dangerous levels of dependency, and the beneficial role of the US in East Asia's technological development. With contributors from disciplines ranging from history, geography, urban planning, sociology, political science and electrical engineering, this multi-disciplinary book will be of great interest to students and scholars working across a broad range of subjects including Taiwan studies, Chinese studies, economics, business studies and development studies.
When one considers broadband, the Internet immediately springs to mind. However, broadband is impacting society in many ways. For instance, broadband networks can be used to deliver healthcare or community related services to individuals who don't have computers, have distance as an issue to contend with, or don't use the internet. Broadband can support better management of scarce energy resources with the advent of smart grids, enables improved teleworking capacity and opens up a world of new entertainment possibilities. Yet scholarly examinations of broadband technology have so far examined adoption, usage, or diffusion but missed exploring the capacity of broadband networks to enable new applications, the management aspects of funding and developing broadband-enabled services, or the policy environment in which such networks are developed. This book explores a wide range of issues associated with the deployment and use of broadband including its impacts on individuals, organizations, and society, and offers a generalist understanding of the technical aspects of broadband. Management of Broadband Technology and Innovation offers insights on broadband from the perspectives of Information Systems, Management, Strategy, and Communications Policy scholars, drawing on research from these disciplines to inform diverse aspects of broadband deployment, policy, and use. Issues associated with a subject technical in nature, but now researched in many ways, are emphasised. This book explains various softer aspects of broadband deployment and use, focusing on the benefits of broadband rather than on details of the technology.
The latest edition of this international edited book series, based on the formation and growth problems of High Technology Small Firms (HTSF), contains the best papers presented at the 2011 and 2013 conferences, both held at Manchester Business School. This volume remains true to the initial mission of the HTSF Conference, established in 1993, to advance our knowledge of high-technology entrepreneurship and to advocate the need for more and better designed policy to promote such entrepreneurship. The need is as great as ever it was, not least given the continued economic stagnation of the European economy in the wake of the Financial Crisis and the Euro crisis. These papers address key themes relating to improving our understanding of the processes involved in high-technology entrepreneurship and of the design of effective policy to promote this research. The first two groups of papers examine the start-up and commercialization processes and the internationalization processes, which are often important for new high-technology businesses. Other papers examine topics like entrepreneurship clusters, inter-firm collaboration, and growth strategy for high-technology small firms.
Originally published in 1988 this book was the culmination of 7 years of research in micro-electronics by the Center for Science and Technology Policy in New York. It includes original comparative study of corporate strategy in American, Japanese, and European firms, as well as an account of the evolution of technical alliances. It provides a detailed examination of the global micro-electronics industry in all its aspects - technological, economic, strategic and institutional and goes beyond organizing and presenting the facts to offer new perspectives, analyses and opinions.
Originally published in 1990 this book provides an authoritative and detailed account of the initiatives of US state governments with science and technology programs designed to foster economic growth. Two key questions are posed: Do state governments have policy instruments that are sufficiently powerful to affect thelevels and growth rates of their regional economies? and Are national and global economic forces so powerful that they render state action ineffective? Several subsidiary themes are discusses in this context, namely: the most commonly used policy instruments, the impacts on federalism and on governance and how well the universities and other educational institutions serve the economic activities imposed on them.
Originally published in 1987, this book explores the history and geography of the computer industry in Britain and the evolution of the market leader firms, STC ICL and IBM (UK). It also examines the rising rate of new firm formation in the 1980s and the technology policies adopted by successive governments and analyses how well the industry is placed to cope with the challenges of technological change and increased international competition.
Fifteen years ago, a company was considered innovative if the CEO and board mandated a steady flow of new product ideas through the company's innovation pipeline. Innovation was a carefully planned process, driven from above and tied to key strategic goals. Nowadays, innovation means entrepreneurship, self-organizing teams, fast ideas and cheap, customer experiments. Innovation is driven by hacking, and the world's most innovative companies proudly display their hacker credentials. Hacker culture grew up on the margins of the computer industry. It entered the business world in the twenty-first century through agile software development, design thinking and lean startup method, the pillars of the contemporary startup industry. Startup incubators today are filled with hacker entrepreneurs, running fast, cheap experiments to push against the limits of the unknown. As corporations, not-for-profits and government departments pick up on these practices, seeking to replicate the creative energy of the startup industry, hacker culture is changing how we think about leadership, work and innovation. This book is for business leaders, entrepreneurs and academics interested in how digital culture is reformatting our economies and societies. Shifting between a big picture view on how hacker culture is changing the digital economy and a detailed discussion of how to create and lead in-house teams of hacker entrepreneurs, it offers an essential introduction to the new rules of innovation and a practical guide to building the organizations of the future.
The mobile communications market in developing countries is growing at a rapid rate. This is evident in the rapid spread of mobile broadband cellular networks such as 3G. 4G is also being deployed in developing countries around the world. As the global communications market proceeds towards 5G, it is evident that developing countries will not be left behind. However, there are challenges and barriers on the road ahead specific to developing countries. To aid policy makers, researchers and members of the academia make informed decision that will help the advancement of 5G, this handbook provides an insight into the impact of existing mobile cellular networks in some developing countries. Topics discussed in this handbook include: * Digital divide * Policy outlook * 5G and rural areas * 5G readiness * Telco Business models * Telecom tower pricing * Mobile application adoption
Fifteen years ago, a company was considered innovative if the CEO and board mandated a steady flow of new product ideas through the company's innovation pipeline. Innovation was a carefully planned process, driven from above and tied to key strategic goals. Nowadays, innovation means entrepreneurship, self-organizing teams, fast ideas and cheap, customer experiments. Innovation is driven by hacking, and the world's most innovative companies proudly display their hacker credentials. Hacker culture grew up on the margins of the computer industry. It entered the business world in the twenty-first century through agile software development, design thinking and lean startup method, the pillars of the contemporary startup industry. Startup incubators today are filled with hacker entrepreneurs, running fast, cheap experiments to push against the limits of the unknown. As corporations, not-for-profits and government departments pick up on these practices, seeking to replicate the creative energy of the startup industry, hacker culture is changing how we think about leadership, work and innovation. This book is for business leaders, entrepreneurs and academics interested in how digital culture is reformatting our economies and societies. Shifting between a big picture view on how hacker culture is changing the digital economy and a detailed discussion of how to create and lead in-house teams of hacker entrepreneurs, it offers an essential introduction to the new rules of innovation and a practical guide to building the organizations of the future.
A myriad of security vulnerabilities in the software and hardware we use today can be exploited by an attacker, any attacker. The knowledge necessary to successfully intercept your data and voice links and bug your computers is widespread and not limited to the intelligence apparatus. Consequently, the knowledge required can - at least in part - also easily be accessed by criminals trying to 'transfer your wealth' and competitors looking for your trade secrets. The temptation to use these easily accessible resources to the disadvantage of a rival company grows as global competition gets fiercer. Corporate espionage is nothing new, but since the dawn of the Internet Age the rules have changed. It is no longer necessary to be on-site to steal proprietary information. Cyberattacks today are cheap and attackers run a very low risk of getting caught, as attacks can be executed from anywhere in the world - an ideal breeding ground for criminal activities - and the consequences can be disastrous. In Understanding Cyber Risk: Protecting your Corporate Assets the author provides a wealth of real world examples from diverse industries from all over the world on how company assets are attacked via the cyber world. The cases clearly show that every organization can fall victim to a cyberattack, regardless of the size or country of origin. He also offers specific advice on how to protect core assets and company secrets. This book is essential reading for anyone interested in cyber security, and the use of cyberattacks in corporate espionage.
This book details qualitative research focusing on Internet startups, digital entrepreneurship, race and sex discrimination, and the sharing economy. Addressing the intersections between issues of gender, age, ethnicity and class, the author interviews startup founders, including many husband and wife teams, in order to understand the working and private lives of digital entrepreneurs in and from Taiwan who utilise Internet and mobile technologies, against a backdrop of the country's political, social and economic history. It investigates contemporary debates about entrepreneurship as they are experienced by new generations of start-uppers who challenge existing social and cultural norms by becoming creative workers and embracing the precarity that exists in the volatile digital economy.
The role of service level manager is a critical one in that the agreements negotiated with customers should inform the activities of the service provider. This book aims to help those whose role is to establish, negotiate, manage or update service level agreements and to use these as the basis of continual service improvement. It covers areas such as purpose, required skills, responsibilities, interface and career progression as well as tools, standards and frameworks related to the role.
Are entrepreneurs essentially the same everywhere? Are the
processes of entrepreneurship similar? Or are they shaped by their
environments? If so, how?
The global impact of so-called 'offshoring', including of information technology (IT) and related services, continues to be a topic of great interest to academics, practitioners and policy makers. The Indian IT industry has sustained high levels of growth in revenues and employment since the late 1980s. Even following the global financial crisis and meltdown in 2008, the industry has reported growth, albeit at a lower rate. Furthermore, the high rates of technological change and increased competition has forced businesses and managers to be innovative and create new business models. This book examines how managers and entrepreneurs in the Indian IT industry have explored and exploited human capital opportunities at various stages of the industry's evolution to create innovative human resources (HR) practices and new business models. Based on extensive academic research and deep reflective practitioner accounts, this collection presents expert content, views and a coherent picture of the challenges and changes in the Indian IT industry and analyses how the industry has remained competitive in a constantly changing environment. This book will appeal to researchers, students and practitioners, particularly in the fields of human resources and strategic management.
This book is a multidisciplinary study of the translation and localisation of video games. It offers a descriptive analysis of the industry - understood as a global phenomenon in entertainment - and aims to explain the norms governing present industry practices, as well as game localisation processes. Additionally, it discusses particular translation issues that are unique to the multichannel nature of video games, in which verbal and nonverbal signs must be cohesively combined with interactivity to achieve maximum playability and immerse players in the game's virtual world. Although positioned within the theoretical framework of descriptive translation studies, Bernal-Merino incorporates research from audiovisual translation, software localisation, computer assisted translation, comparative literature, and video game production. Moving beyond this framework, Translation and Localisation in Video Games challenges some of the basic tenets of translation studies and proposes changes to established and unsatisfactory processes in the video game and language services industries.
This book offers an in-depth analysis of the roles and strategies of subsidiaries of American multinational companies (MNCs) in Taiwan's IT industry. Based on semi-structured interviews with 16 managing directors of the different foreign-owned subsidiaries and 100 functional unit managers, the authors investigate (1) the roles of functional units in evaluating strategy formulation and change in foreign subsidiaries; (2) the factors that determine strategy formulation and change in foreign subsidiaries and their functional units; and (3) the linkages between cross-functional units. The research underscores the view that MNCs' strategies are composed of assorted heterogeneous elements.
Blogging and other types of social media such as wikis and social networking sites have transformed the way we use the internet in recent years. It is a transformation that business is eager to exploit. In order to do so, a clear commercial strategy needs to be established; does your organization wish to use the media actively as a business tool, or do you need to respond to the use of social media by others? Blogging and Other Social Media will address this question with practical guidance on using social media as well as the risks associated with it. A collaboration by leading thinkers and business users of social media, the book contains detailed and practical advice on the various forms of social media - their applications, advantages and disadvantages, how these technologies are evolving, and whether or not their use will benefit your business. The section covering social media and the law explains the risks and remedies related to abuse of copyright, defamation, privacy, data protection and user contracts as well as the opportunities and threats for online reputation. If you are looking to encourage your employees but want to protect your business from the threats this emerging media presents, get a copy of this practical guide and study it before you start including social media as part of your corporate marketing or communications strategy.
MANAGING INFORMATION TECHNOLOGY PROJECTS, 6e, International Edition offers the "behind-the-scene" aspect of technology. By weaving together theory and practice, this text presents an understandable, integrated view of the many concepts skills, tools, and techniques involved in project management.
"This is the book executives have been waiting for. It is clear: With deep expertise but in nontechnical language, it describes what cybersecurity risks are and the decisions executives need to make to address them. It is crisp: Quick and to the point, it doesn't waste words and won't waste your time. It is candid: There is no sure cybersecurity defense, and Chris Moschovitis doesn't pretend there is; instead, he tells you how to understand your company's risk and make smart business decisions about what you can mitigate and what you cannot. It is also, in all likelihood, the only book ever written (or ever to be written) about cybersecurity defense that is fun to read." --Thomas A. Stewart, Executive Director, National Center for the Middle Market and Co-Author of Woo, Wow, and Win: Service Design, Strategy, and the Art of Customer Delight Get answers to all your cybersecurity questions In 2016, we reached a tipping point--a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term "cybersecurity" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk. This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise. Unlike other cybersecurity books, the text is not bogged down with industry jargon Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs Shows you how to make pragmatic, rational, and informed decisions for your organization Written by a top-flight technologist with decades of experience and a track record of success If you're a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you.
Global corporations initiate, join and maintain socio-technological change and hence, alter the ways in which we organize our lives. Demanding significant investment of resources and time, the development and implementation of new technologies on different levels must take into consideration these subtle processes. As such, it is particularly important that we have a greater insight into the practices of hi-tech corporations, in view of the often inflated promises of and concerns about the destiny of technological breakthroughs, especially those promising sizeable economic outcomes and societal transformation. Elena Simakova undertook a lengthy ethnographic study, working alongside marketing managers in a global IT corporation in their Europe, Middle East and Africa (EMEA) headquarters in the UK. Using the experience gained through a close participation in their everyday corporate rituals and routines, her account challenges common perceptions of how corporations make the world think and act with regard to technologies in particular ways. The book contains an interesting case study on the launch of a radio frequency identification (RFID) based solution. Unravelling the construction of expectations, inclusions and exclusions around emerging technologies, this reflexive account also tackles uneasy practical and methodological questions pertinent to corporate ethnography. This book is an essential read for scholars in science and technology studies, economic sociology, anthropology, as well as management and organizational studies and research policy.
Identifying security gaps in an organisation's information systems is a first and vital step in protecting data and information. This is what makes the role of an information security (or assurance) auditor so important. However, this is a role that is often maligned as a 'check list monkey' who adds nothing to the business. This practical book confronts this stereotype and gives an excellent introduction to the role, covering areas such as purpose, required skills, responsibilities, interface and career progression as well as tools, standards and frameworks related to the role. Based on the author's extensive experience, it gives practical guidance to those new to the role or interested in developing a better understanding of what it entails.
Research interest in the service sector has boomed in recent years as deindustrialisation became entrenched. Instead of being regarded as merely supplementary to traditional industry and manufacturing, services have generated progressively rising levels of growth in developed economies while at the same time coming to be recognised as major drivers of innovation. Among the factors which have helped service companies notch up swifter growth rates than all other sectors are the outsourcing of such services by other sectors, including the development of information and communication technologies, and changes to the regulatory, legal and market frameworks as well as globalisation and internationalisation. The result is a cluster of highly innovative firms which can loosely be grouped under the heading of Knowledge Intensive Business Services (KIBS). Knowledge Intensive Business Services and Regional Competitiveness charts the development of these firms and explores their success through four mutually linked parts: KIBS and industrial dynamics; KIBS and their context; KIBS and their contribution to regional competitiveness and economic development; and finally, KIBS and public policy. This book is suitable for researchers and policy makers interested in the rise of these influential actors and their influence on regional competitiveness.
This edited volume brings together experts from around the world to provide coverage and analysis of infrastructure's role in Internet governance, both now and in the future. Never in history have conflicts over Internet governance attracted such widespread attention. High-profile controversies include the disclosures about NSA surveillance by intelligence analyst Edward Snowden, controversy over a decision by the US government to relinquish its historic oversight of Internet names and numbers, and countless cybersecurity breaches involving unauthorized access to Internet users' personal data. Much of the Internet governance ecosystem-both technical architecture and coordinating institutions-is behind the scenes but increasingly carries significant public interest implications. An area once concealed in institutional and technological complexity is now rightly bracketed among other shared global issues-such as environmental protection and human rights-that have considerable global implications but are simply incongruous with national borders. This transformation into an era of global governance by Internet infrastructure presents a moment of opportunity for scholars to bring these politicized infrastructures to the foreground.
Whether you're preparing for your service management foundation exam, or simply want to understand service management better, this new edition of our popular book covers the latest thinking and provides a comprehensive, practical introduction to IT service management. Building on their collective service management experience, the authors walk you through essential concepts including processes, functions and roles and illustrate these with real-life examples. |
You may like...
Effects of Peri-Adolescent Licit and…
Shafiqurrahman, Richard L. Bell
Hardcover
R5,121
Discovery Miles 51 210
Semiconductor Lasers - Fundamentals and…
Alexei Baranov, Eric Tournie
Hardcover
R5,574
Discovery Miles 55 740
|