![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Media, information & communication industries > Information technology industries
The second edition of Sports Journalism: An Introduction to Reporting and Writing has passed the test of time, been used in classrooms internationally, received approval and praise from professors and students, and now it, too, has moved into the new environment of sports media. New chapters on social media and topical issues in the sports world, as well as fresh examples and new references to current technology fill its pages whether you choose to read from a tablet, a Smartphone, a Chromebook or old-fashioned paper wrapped in a cardboard cover. Inside this new edition you'll find * Three new chapters devoted to the evolution from a daily news source to a 24/7 news cycle. * Interviews with journalists whose circulation is measured in the number of Twitter followers he or she has. * A chapter encouraging discussion of ethical issues affecting today's athletes: Should college athletes be paid to compete? Can play be too violent? Is there a level playing field for men and women? How should eligibility be determined for athletes who may be transitioning their gender identity? * A glossary that includes terms such as 'hot takes,' 'scrum,' 'trolls.'
Its vast infrastructure projects now extend from the ocean floor to outer space, and from Africa's megacities into rural America. China is wiring the world, and, in doing so, rewriting the global order. As things stand, the rest of the world still has a choice. But the battle for tomorrow will require America and its allies to take daring risks in uncertain political terrain. Unchecked, China will reshape global flows of data to reflect its interests. It will develop an unrivalled understanding of market movements, the deliberations of foreign competitors, and the lives of countless individuals enmeshed in its systems. Networks create large winners, and this is one contest that democracies can't afford to lose. Taking readers on a global tour of these emerging battlefields, Jonathan Hillman reveals what China's digital footprint looks like on the ground, and explores the dangers of a world in which all routers lead to Beijing.
Is it time to become a manager? Nest and vest? Join that start-up? Tell your boss he's a liar? Or resign in disgust? As a software engineer, you'll face many important decisions such as these, and when you do, you realize there's much more to your career than dealing with code. Author Michael Lopp recalls his own make-or-break moments with Silicon Valley giants such as Apple, Borland, Netscape, and Symantec in Being Geek, the insightful and entertaining book that may help you manage your career better. Through a series of entertaining stories, Lopp walks through a complete job lifecycle, starting with the job search and finishing with the realization it might be time to look again. Plenty of books teach you how to interview for a job, or how to manage a project more successfully, but only "Being Geek" will help you handle all the baffling circumstances you experience at work, including how to: understand your boss with the chapter on 'Manager Management'; boost your career through networking with 'We Travel in Tribes'; deliver effective presentations, with 'How Not to Throw Up'; manage and actively participate in meetings, with 'What's On the Agenda'; and, realize when you should be looking for a new gig, with 'The Itch'.
Do conceptions of the Rule of Law reflect timeless truths, or are they in fact contingent on a particular information and communications infrastructure - one that we are fast leaving behind? Hildebrandt has engineered a provocative encounter between law and networked digital technologies that cuts to the heart of the dilemma confronting legal institutions in a networked world.' - Julie E. Cohen, Georgetown University, US'Many contemporary authors are wrestling with two technological developments which will change our society beyond recognition: big data analytics and smart technologies. Few though understand, or can explain, these developments in the way Mireille Hildebrandt does. In ambitiously bringing together legal theory, psychology, social ethnology and of course smart agency and ambient intelligence, Hildebrandt gives the most complete study of these vitally important developments. Books are often described as 'must read' though few actually are; this one genuinely is.' - Andrew Murray, London School of Economics, UK This timely book tells the story of the smart technologies that reconstruct our world, by provoking their most salient functionality: the prediction and preemption of our day-to-day activities, preferences, health and credit risks, criminal intent and spending capacity. Mireille Hildebrandt claims that we are in transit between an information society and a data-driven society, which has far reaching consequences for the world we depend on. She highlights how the pervasive employment of machine-learning technologies that inform so-called 'data-driven agency' threaten privacy, identity, autonomy, non-discrimination, due process and the presumption of innocence. The author argues how smart technologies undermine, reconfigure and overrule the ends of the law in a constitutional democracy, jeopardizing law as an instrument of justice, legal certainty and the public good. Nevertheless, the book calls on lawyers, computer scientists and civil society not to reject smart technologies, explaining how further engaging these technologies may help to reinvent the effective protection of the Rule of Law. Academics and researchers interested in the philosophy of law and technology will find this book both discerning and relevant. Practitioners and policy makers in the areas of law, computer science and engineering will benefit from the insight into smart technologies and their impact today.
Information Technology and Organizational Transformation is arguably the key challenge facing corporate executives and business school academics alike as we approach the millennium. Much that is superficial has been written on the topic in recent years. The siren call of the more popular literature in this area — seductive in the simplicity of the message of radically improved business performance brought about by IT and process re-engineering — has led to the unwary foundering on the rocks of the realpolitik associated with organizational change. But organizational innovation is possible — as the case studies included in this book amply demonstrate. While ‘best practice’ solutions may be illusory, the examples given herein, taken together with the fruits of research undertaken by leading academics from Continental Europe, Scandinavia, North America and the UK, provide key lessons that one ignores at one’s peril. This is a highly important contribution to knowledge. Bringing together such key themes as organizational learning, knowledge management, IT and business strategy alignment, the management of change, inter-organizational communications, corporate innovation and business process change, this book provides significant learning for those willing to challenge much of the received wisdom on this fascinating topic.
In the weird glow of the dying millennium, Michael Lewis set out on a safari through Silicon Valley to find the world s most important technology entrepreneur. He found this in Jim Clark, a man whose achievements include the founding of three separate billion-dollar companies. Lewis also found much more, and the result the best-selling book The New New Thing is an ingeniously conceived history of the Internet revolution."
"In their 'deliberately short book' IT analysts, management consultants and technology practitioners Roehrig and Pring explore how big a beast technology has become, and how we can tame it to maintain our freedom and privacy while still realising its benefits. The pandemic has shown just how much we rely on technology and how addictive it has become...The authors address the important questions...[and] urge us not to slay the monster but rather to leverage its power and reorient technology as a tool for good." --Financial Times Monster explains how we can responsibly engage with technology, and avoid its darker tendencies, while accepting its necessary gifts. The authors, insiders at one of the world's largest tech consulting firms, give a unique take on: The addictive nature of tech and how to fight it The growing backlash against big tech--where it's right and what it misses Crucial steps for taming technology's role in your life and in your organization--without becoming a modern Luddite Written for managers, leaders, and employees at companies of all sizes and in all industries, Monster will help you understand and take control of technology's powerful role in your life and your organization. "You must read this book." --Michael Schrage, Research Fellow, MIT Sloan School Initiative on the Digital Economy "Pithy insights and recommendations on helping tech fulfill its potential as a force for good." --Erik Brynjolfsson, Director of the Stanford Digital Economy Lab and co-author of The Second Machine Age "Making technology serve--not subvert--the public interest requires better leaders, not more engineers and coders. Monster explains how to become one of those leaders." --Rosabeth Moss Kanter, Harvard Business School Professor and author of Think Outside the Building "A bracing new book about some of the most pressing questions of our time." --Carl Benedikt Frey, Oxford Martin Citi Fellow at Oxford University and author of The Technology Trap "Provocative and concise, Monster is an important book on rescuing ourselves from technology that now feels corrosive and overwhelming." --Daniel H. Pink, author of WHEN, DRIVE, and TO SELL IS HUMAN "Clarifies a complex web of issues and provides bold steps for a healthier economy, society, and future." --Francisco D'Souza, former CEO and Vice Chairman of Cognizant "Sheds light on how we can collectively use technology for the good of all." --Soumitra Dutta, Founding Dean, SC Johnson College of Business, Cornell University "A cornucopia of pragmatic, actionable, and bold ideas." --Gary J. Beach, Publisher Emeritus, CIO magazine and author of U.S. Technology Skills Gap
Concluding the Commodore trilogy, this book takes a look at Commodore's resurgence in the late 1980's and then ultimate demise. This was a period of immense creativity from engineers within the company, who began “moonshot†projects using emerging CD-ROM technology. Get to know the people behind Commodore's successes and failures as they battle to stay relevant amidst blistering competition from Nintendo, Apple, and the onslaught of IBM PC clones. Told through interviews with company insiders, this examination of the now defunct company traces the engineering breakthroughs and baffling decisions that led to the demise of Commodore.
Teaches visual literacy, theory, scholarly critique, and practical application of visuals in professional communication careers Visual Communication: Insights and Strategies explores visual imagery in advertising, news coverage, political discourse, popular culture, and digital and social media technologies. It is filled with insights into the role of visuals in our dynamic social environment and contains strategies on how to use them. The authors provide an overview of theoretically-informed literacy and critical analysis of visual communication and demonstrate the ways in which we can assess and apply this knowledge in the fields of advertising, public relations, journalism, organizational communication, and intercultural communication. This important book: Reveals how to analyze visual imagery Introduces a 3-step process, Research-Evaluate-Create, to apply the knowledge gained Combines research, theory, and professional practice of visual communication Designed for undergraduate and graduate courses in visual communication as well as visual rhetoric, visual literacy, and visual culture, Visual Communication: Insights and Strategies reveals how to apply rhetorical theories to visual imagery.
Very Short Introductions: Brilliant, Sharp, Inspiring This lively Very Short Introduction reviews the central events, machines, and people that feature in established accounts of the history of computing, critically examining received perceptions and providing a fresh look at the nature and development of the modern electronic computer. The book begins by discussing a widely accepted linear narrative of the history of computing, centred around innovatory highlights that start with the use of knotted cords to aid calculation, all the way to the smartphones of the present day. It discusses the problems and simplifications present in such a narrative, and offers instead an account, centred on users, that identifies four distinct historical threads: calculation, automatic computing, information management, and communication. These threads are examined individually, tracing their paths and the convergences of related technologies into what has come to be called 'the information age'. ABOUT THE SERIES: The Very Short Introduction series from Oxford University Press contains hundreds of titles in almost every subject area. These pocket-sized books are the perfect way to get ahead in a new subject quickly. Our expert authors combine facts, analysis, perspective, new ideas, and enthusiasm to make interesting and challenging topics highly readable.
This book is the second part of Applications and Trends in Fintech, which serves as a comprehensive guide to the advanced topics in fintech, including the deep learning and natural language processing algorithms, blockchain design thinking, token economics, cybersecurity, cloud computing and quantum computing, compliance and risk management, and global fintech trends. Readers will gain knowledge about the applications of fintech in finance and its latest developments as well as trends.This fifth volume covers global fintech trends and emerging technologies such as cloud computing and quantum computing, as well as the compliance and risk management frameworks for fintech companies. Together with the first part in applications and trends (fourth volume), these two books will deepen readers' understanding of the fintech fundamentals covered in previous volumes through various applications and analysis of impacts and trends.Bundle set: Global Fintech Institute-Chartered Fintech Professional Set I
With the widespread transformation of information into digital form throughout society - firms and organisations are embracing this development to adopt multiple types of IT to increase internal efficiency and to achieve external visibility and effectiveness - we have now reached a position where there is data in abundance and the challenge is to manage and make use of it fully. This book addresses this new managerial situation, the post-digitalisation era, and offers novel perspectives on managing the digital landscape. The topics span how the post-digitalisation era has the potential to renew organisations, markets and society. The chapters of the book are structured in three topical sections but can also be read individually. The chapters are structured to offer insights into the developments that take place at the intersection of the management, information systems and computer science disciplines. It features more than 70 researchers and managers as collaborating authors in 23 thought-provoking chapters. Written for scholars, researchers, students and managers from the management, information systems and computer science disciplines, the book presents a comprehensive and thought-provoking contribution on the challenges of managing organisations and engaging in global markets when tools, systems and data are abundant.
This book sets out to provide postgraduate researchers with guidance on selecting and applying sociotechnical theories to the study of information systems, including how they can be combined to complement each other. Until now it has been difficult to source advice on the application of these theories, and there has been no single book that combines multiple theories as this does. Examining the impacts of technological developments and seeking to understand how humans interact with computers and systems is a dynamic field but can often confuse researchers with the overwhelming number of social theories that are utilised to derive insights. Instead, the author in this book breaks down some of the most popular theories used to underpin information system research, such as activity theory (AT), actor-network theory (ANT), contingency theory (CT), diffusion of innovation (DOI) theory, structuration theory (ST), and the technology acceptance model (TAM). By doing so, this book serves to enable a simpler, faster selection of appropriate theories, and a more effective and productive application that leads to richer, more rigorous research outcomes. Written for postgraduates, researchers, and academics in the fields of information technology and information systems, this book provides a valuable resource of sociotechnical research methodologies that will enable and enhance future studies.
This practical text offers a research-based account of the technical communication profession and its practice, outlining emergent touchpoints of this fast-changing field while highlighting its diversity. Through research on the history and the globalization of technical communication and up-to-date industry analysis, including first-hand narratives from industry practitioners, this book brings together common threads through the industry, suggests future trends, and points toward strategic routes for development. Vignettes from the workplace and examples of industry practice provide tangible insights into the different paths and realities of the field, furnishing readers with a range of entry routes and potential career sectors, workplace communities, daily activities, and futures. This approach is central to helping readers understand the diverse competencies of technical communicators in the modern, globalized economy. The Profession and Practice of Technical Communication provides essential guidance for students, early professionals, and lateral entrants to the profession and can be used as a textbook for technical communication courses.
'This open access book addresses an urgent issue on which little organized information exists. It reflects experience in Africa but is highly relevant to other fragile states as well.' -Constantine Michalopoulos, John Hopkins University, USA and former Director of Economic Policy and Co-ordination at the World Bank Fragile countries face a triple data challenge. Up-to-date information is needed to deal with rapidly changing circumstances and to design adequate responses. Yet, fragile countries are among the most data deprived, while collecting new information in such circumstances is very challenging. This open access book presents innovations in data collection developed with decision makers in fragile countries in mind. Looking at innovations in Africa from mobile phone surveys monitoring the Ebola crisis, to tracking displaced people in Mali, this collection highlights the challenges in data collection researchers face and how they can be overcome.
The question of how to tax multinational companies that operate highly digitalised business models is one of the most contested areas of international taxation. The tax paid in the jurisdictions in which these companies operate has not kept pace with their immense growth and the OECD has proposed a new international tax compromise that will allocate taxing rights to market jurisdictions and remove the need to have a physical presence in the taxing jurisdictions in order to sustain taxability. In this work, Craig Elliffe explains the problems with the existing international tax system and its inability to respond to challenges posed by digitalised companies. In addition to looking at how the new international tax rules will work, Elliffe assesses their likely effectiveness and highlights features that are likely to endure in the next waves of international tax reform.
"This is the book executives have been waiting for. It is clear: With deep expertise but in nontechnical language, it describes what cybersecurity risks are and the decisions executives need to make to address them. It is crisp: Quick and to the point, it doesn't waste words and won't waste your time. It is candid: There is no sure cybersecurity defense, and Chris Moschovitis doesn't pretend there is; instead, he tells you how to understand your company's risk and make smart business decisions about what you can mitigate and what you cannot. It is also, in all likelihood, the only book ever written (or ever to be written) about cybersecurity defense that is fun to read." --Thomas A. Stewart, Executive Director, National Center for the Middle Market and Co-Author of Woo, Wow, and Win: Service Design, Strategy, and the Art of Customer Delight Get answers to all your cybersecurity questions In 2016, we reached a tipping point--a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term "cybersecurity" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk. This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise. Unlike other cybersecurity books, the text is not bogged down with industry jargon Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs Shows you how to make pragmatic, rational, and informed decisions for your organization Written by a top-flight technologist with decades of experience and a track record of success If you're a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you.
The American edition of the revelatory Swedish book Spotify Untold, the basis of the new Netflix Original series The Playlist, out now! "Two excellent Swedish journalists recount the historic rise of the company that changed modern music not just as a riveting business tale, but as a lesson in tech geopolitics. Spotify's Daniel Ek shows why Silicon Valley does not always win."--David Kirkpatrick, New York Times bestselling author of The Facebook Effect Steve Jobs tried to stop this moment from ever happening. Google and Microsoft made bids to preempt it. The music industry blocked it time and again. Yet, on a summer's eve in 2011, the whiz kid CEO of a Swedish start-up celebrated his company's US launch. In the midst of the Apple-Android tech war and a music label crusade against piracy and illegal downloading, Spotify redrew the battle lines, sent shockwaves through Silicon Valley, and got the hardline executives at Universal, Sony, and Warner to sign with its "free-mium" platform. In The Spotify Play, now adapted into an upcoming Netflix Original series, Swedish investigative tech journalists Sven Carlsson and Jonas Leijonhufvud, who covered the company from its inception, draw upon hundreds of interviews, previously untapped sources, and in-depth reporting on figures like Mark Zuckerberg, Sean Parker, Steve Jobs, Taylor Swift, Jay-Z, Pony Ma Huateng, and Jimmy Iovine. They have captured the riveting David vs. Goliath story of a disruptive innovator who played the industry giants in a quest to revolutionize the consumption of sound, building today's largest online source of audio, with more than 50 million songs, one million-plus podcasts, and over 300 million users.
Territories of Profit compares Dell Computer, the dominant computer manufacturer of the late twentieth century, and G. F. Swift, the leading meatpacking firm of the late nineteenth century, to reveal how communications revolutions in different periods enabled businesses to innovate their operations, reorganize the structure of the firm, and reshape the geography of profit-making. By depicting the parallel experiences of Dell and Swift, which both deployed revolutionary communications technologies in their business systems and transformed patterns of development through their innovative advances, the book challenges simplified representations of the contemporary economy as historically unprecedented. Territories of Profit also incorporates information from interview sources within Dell to portray the "Dell Model" in ways never before revealed in existing studies of the PC maker.
Protect your information assets with effective risk management In today's information economy, the development, exploitation and protection of information and associated assets are key to the long-term competitiveness and survival of corporations and entire economies. The protection of information and associated assets - information security - is therefore overtaking physical asset protection as a fundamental corporate governance responsibility. Information security management system requirements ISO 27000, which provides an overview for the family of international standards for information security, states that "An organisation needs to undertake the following steps in establishing, monitoring, maintaining and improving its ISMS [...] assess information security risks and treat information security risks". The requirements for an ISMS are specified in ISO 27001. Under this standard, a risk assessment must be carried out to inform the selection of security controls, making risk assessment the core competence of information security management and a critical corporate discipline. Plan and carry out a risk assessment to protect your information Information Security Risk Management for ISO 27001 / ISO 27002 Provides information security and risk management teams with detailed, practical guidance on how to develop and implement a risk assessment in line with the requirements of ISO 27001. Draws on national and international best practice around risk assessment, including BS 7799-3:2017 (BS 7799-3). Covers key topics such as risk assessment methodologies, risk management objectives, information security policy and scoping, threats and vulnerabilities, risk treatment and selection of controls. Includes advice on choosing risk assessment software. Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as providing useful background material for auditors, this book will enable readers to develop an ISO 27001-compliant risk assessment framework for their organisation and deliver real, bottom-line business benefits. Buy your copy today! About the authors Alan Calder is the Group CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru and a leading author on information security and IT governance issues. He has been involved in the development of a wide range of information security management training courses that have been accredited by IBITGQ (International Board for IT Governance Qualifications). Alan has consulted for clients in the UK and abroad, and is a regular media commentator and speaker. Steve G Watkins is an executive director at GRC International Group plc. He is a contracted technical assessor for UKAS - advising on its assessments of certification bodies offering ISMS/ISO 27001 and ITSMS/ISO 20000-1 accredited certification. He is a member of ISO/IEC JTC 1/SC 27, the international technical committee responsible for information security, cyber security and privacy standards, and chairs the UK National Standards Body's technical committee IST/33 (information security, cyber security and privacy protection) that mirrors it. Steve was an active member of IST/33/-/6, which developed BS 7799-3. |
![]() ![]() You may like...
The Pact - Messages From the Other Side
David Lee Sinor, Barbara Sinor
Hardcover
R639
Discovery Miles 6 390
My Son and the Afterlife - Conversations…
Elisa Medhus M D
Paperback
Women, Literature, and the Domesticated…
Judith W. Page, Elise L. Smith
Hardcover
|