![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Media, information & communication industries > Information technology industries
For e-commerce to work and be implemented successfully, specific skills and knowledge are required - in the fields of information and communications technology (ICT) and business and marketing management in particular. Research in South Africa indicates a growing need for training in managing e-commerce. This book attempts to train people in understanding the ICT principles that underlie e-commerce and e-commerce management against the background of this need, in a disciplined and dedicated way that aims to satisfy specific business needs and meet objectives.
Raised in a small town in Georgia with no money or connections, Pat Mitchell challenged expectations to become one of media's most admired leaders-the first woman president of PBS and CNN productions, an award-winning film and TV producer, and the co-founder and curator of TEDWomen.
Thilo Busching und Gabriele Goderbauer-Marchner analysieren sowohl wissenschaftlich fundiert als auch praxisorientiert, wie E-Publishing-Produkte entwickelt, realisiert und vermarktet werden. Das Spektrum reicht von innovativen Geschafts- und Erloesmodellen uber klassische Content-Formate bis hin zu E-Books, Web-TV, Apps und Social Media. Dabei werden auch spezielle, ubergreifende Aspekte wie die Entwicklung des Content-Marktes, journalistische Darstellungsformen, Produktspezifika und das User-Experience-Management berucksichtigt. Die Medien-Professoren erklaren E-Publishing-Management leicht verstandlich, prazise und profund fur Lehrende wie Lernende, fur Anwender wie fur Digital-Media-Projektmanager - kurz: ein Lehrbuch, das konkrete Medienkompetenzen vermittelt. Der Inhalt Einleitung - Definition von E-Publishing - A. Markt: Markt-Entwicklung - Der Publishing-Markt im Wandel, Entwicklung und Wandel des Nutzerverhaltens - die neue Interaktivitat, Die Entwicklung der Anbieter im Zeitungs- und Buchmarkt - B. OEkonomische Grundlagen: Geschaftsmodelle, Produktspezifika, User-Experience-Management - C. Content- und Format-Management: Content-Beschaffung im Zeitalter von Web 2.0, Journalistische Darstellungsformen, Fur Crossmedia-Produkte kreativ texten, E-Books, Web-TV, Audio-Formate - E-Publishing im Bereich Audio, Social Media als Kommunikations-, Informations- und Werbekanal, Klassische, Online- und Crossmedia-PR, Apps verstehen und gestalten, Qualitatssicherung auf der Mikro-, Meso- und Makroebene Die Zielgruppen * Studierende und Dozenten der Medien- und Kommunikationswissenschaften und des Journalismus * Alle, die einen ersten UEberblick uber den Markt und die verschiedenen Formate des E-Publishing erhalten moechten Die Autoren Thilo Busching ist Professor fur digitale Medienwirtschaft an der Hochschule Wurzburg-Schweinfurt. Sein Arbeitsschwerpunkt ist das innovative E-Publishing-, E-Commerce- und E-Marketing-Management. Gabriele Goderbauer-Marchner, Professorin fur Print- und Onlinejournalismus an der Universitat der Bundeswehr Munchen, arbeitet und forscht vor allem zu Qualitat in den Medien.
How craigslist champions openness, democracy, and other vanishing principles of the early web Begun by Craig Newmark as an e-mail to some friends about cool events happening around San Francisco, craigslist is now the leading classifieds service on the planet. It is also a throwback to the early internet. The website has barely seen an upgrade since it launched in 1996. There are no banner ads. The company doesn't profit off your data. An Internet for the People explores how people use craigslist to buy and sell, find work, and find love-and reveals why craigslist is becoming a lonely outpost in an increasingly corporatized web. Drawing on interviews with craigslist insiders and ordinary users, Jessa Lingel looks at the site's history and values, showing how it has mostly stayed the same while the web around it has become more commercial and far less open. She examines craigslist's legal history, describing the company's courtroom battles over issues of freedom of expression and data privacy, and explains the importance of locality in the social relationships fostered by the site. More than an online garage sale, job board, or dating site, craigslist holds vital lessons for the rest of the web. It is a website that values user privacy over profits, ease of use over slick design, and an ethos of the early web that might just hold the key to a more open, transparent, and democratic internet.
Public Service Information Technology explains how all areas of IT management work together. Building a computer-based information system is like constructing a house; different disciplines are employed and need to be coordinated. In addition to the technical aspects like computer networking and systems administration, the functional, business, management, and strategic aspects all are equally important. IT is not as simple as expecting to use a software program in three months. Information Technology is a complex field that has multiple working parts that require proper management. This book demystifies how IT operates in an organization, giving the public manager the necessary details to manage Information Technology and to use all of its resources for proper effect. This book is for technical IT managers and non-technical (non-IT) managers and senior executive leaders. Not only will the Chief Information Officer, the IT Director, and the IT Manager find this book invaluable to running an effective IT unit, the Chief Financial Officer, the HR Director, and functional managers will understand their roles in conjunction with the technical team. Every manager at all levels of the organization has a small yet consequential role to play in developing and managing an IT system. With practical guidelines and worksheets provided in the book, both the functional team and the technical team will be able to engage collaboratively to produce a high-quality computer-based information system that everyone involved can be proud to use for many years and that can deliver an effective and timely public program to citizens. This book includes:
From dial-up to wi-fi, an engaging cultural history of the commercial web industry In the 1990s, the World Wide Web helped transform the Internet from the domain of computer scientists to a playground for mass audiences. As URLs leapt off computer screens and onto cereal boxes, billboards, and film trailers, the web changed the way many Americans experienced media, socialized, and interacted with brands. Businesses rushed online to set up corporate "home pages" and as a result, a new cultural industry was born: web design. For today's internet users who are more familiar sharing social media posts than collecting hotlists of cool sites, the early web may seem primitive, clunky, and graphically inferior. After the dot-com bubble burst in 2000, this pre-crash era was dubbed "Web 1.0," a retronym meant to distinguish the early web from the social, user-centered, and participatory values that were embodied in the internet industry's resurgence as "Web 2.0" in the 21st century. Tracking shifts in the rules of "good web design," Ankerson reimagines speculation and design as a series of contests and collaborations to conceive the boundaries of a new digitally networked future. What was it like to go online and "surf the Web" in the 1990s? How and why did the look and feel of the web change over time? How do new design paradigms like user-experience design (UX) gain traction? Bringing together media studies, internet studies, and design theory, Dot-com Design traces the shifts in, and struggles over, the web's production, aesthetics, and design to provide a comprehensive look at the evolution of the web industry and into the vast internet we browse today.
This new volume, edited by industrial and organizational psychologists, will look at the important topic of cyber security work in the US and around the world. With contributions from experts in the fields of industrial and organizational psychology, human factors, computer science, economics, and applied anthropology, the book takes the position that employees in cyber security professions must maintain attention over long periods of time, must make decisions with imperfect information with the potential to exceed their cognitive capacity, may often need to contend with stress and fatigue, and must frequently interact with others in team settings and multiteam systems. Consequently, psychosocial dynamics become a critical driver of cyber security effectiveness. Chapters in the book reflect a multilevel perspective (individuals, teams, multiteam systems) and describe cognitive, affective and behavioral inputs, processes and outcomes that operate at each level. The book chapters also include contributions from both research scientists and cyber security policy-makers/professionals to promote a strong scientist-practitioner dynamic. The intent of the book editors is to inform both theory and practice regarding the psychosocial dynamics of cyber security work.
In February 2015, the Federal Communications Commission (FCC) adopted an order that will impose rules governing the management of Internet traffic as it passes over broadband Internet access services (BIAS), whether those services are fixed or wireless. The rules are commonly known as "net neutrality" rules. The order was released in March 2015. According to the order, the rules ban the blocking of legal content, forbid paid prioritisation of affiliated or proprietary content, and prohibit the throttling of legal content by broadband Internet access service providers (BIAS providers). The rules are subject to reasonable network management, as that term is defined by the FCC. This book discusses selected legal issues raised by FCC's 2015 open internet order, and examines the net neutrality debate.
What is the impact of surveillance capitalism on our right to free speech? The Internet once promised to be a place of extraordinary freedom beyond the control of money or politics, but today corporations and platforms exercise more control over our ability to access information and share knowledge to a greater extent than any state. From the online calls to arms in the thick of the Arab Spring to the contemporary front line of misinformation, Jillian York charts the war over our digital rights. She looks at both how the big corporations have become unaccountable censors, and the devastating impact it has had on those who have been censored. In Silicon Values, leading campaigner Jillian York, looks at how our rights have become increasingly undermined by the major corporations desire to harvest our personal data and turn it into profit. She also looks at how governments have used the same technology to monitor citizens and threatened our ability to communicate. As a result our daily lives, and private thoughts, are being policed in an unprecedented manner. Who decides the difference between political debate and hate speech? How does this impact on our identity, our ability to create communities and to protest? Who regulates the censors? In response to this threat to our democracy, York proposes a user-powered movement against the platforms that demands change and a new form of ownership over our own data.
Aereo and FilmOn X stream television programming over the Internet for a monthly subscription fee. Aereo and FilmOn's technology permits subscribers to watch both live broadcast television in addition to already-aired programming. Their use of this development in technology has triggered multiple lawsuits from broadcasting companies alleging copyright violations. These cases reveal not only multiple interpretations of copyright law and its application to new and developing technologies but also a possible "loophole" in the law, which some have accused Aereo and FilmOn of exploiting. This book discusses internet television streaming and copyright laws. It then discusses remote-storage digital video recorders and the copyright laws that go along with it.
"An adulating biography of Apple's left-brained wunderkind, whose
work continues to revolutionize modern technology." --"Kirkus
Reviews"
This book provides research on the state-of-the-art methods for data management in the fourth industrial revolution, with particular focus on cloud.based data analytics for digital manufacturing infrastructures. Innovative techniques and methods for secure, flexible and profi table cloud manufacturing will be gathered to present advanced and specialized research in the selected area.
**A Financial Times Best Summer Book 2023** Out now: a gripping look at the rise of the microchip and the British tech company behind the blueprint to it all. 'A gripping and inspiring read.' Sir James Dyson 'A revealing and insightful biography of the company whose blueprints define the digital world.' Chris Miller, author of CHIP WAR: The Fight for the World's Most Critical Technology '[A] sparkly corporate biography.' Financial Times __________ One tiny device lies at the heart of the world's relentless technological advance: the microchip. Today, these slivers of silicon are essential to running just about any machine, from household devices and factory production lines to smartphones and cutting-edge weaponry. At the centre of billions of these chips is a blueprint created and nurtured by a single company: Arm. Founded in Cambridge in 1990, Arm's designs have been used an astonishing 250 billion times and counting. The UK's high-tech crown jewel is an indispensable part of a global supply chain driven by American brains and Asian manufacturing brawn that has become the source of rising geopolitical tension. With exclusive interviews and exhaustive research, The Everything Blueprint tells the story of Arm, from humble beginnings to its pivotal role in the mobile phone revolution and now supplying data centres, cars and the supercomputers that harness artificial intelligence. It explores the company's enduring relationship with Apple and numerous other tech titans, plus its multi-billion-pound sale to the one-time richest man in the world, Japan's Masayoshi Son. The Everything Blueprint details the titanic power struggle for control of the microchip, through the eyes of a unique British enterprise that has found itself in the middle of that battle. __________
Beginning in the 1950s, a group of academics, businesspeople, and politicians set out on an ambitious project to remake North Carolina's low-wage economy. They pitched the universities of Raleigh, Durham, and Chapel Hill as the kernel of a tech hub, Research Triangle Park, which would lure a new class of highly educated workers. In the process, they created a blueprint for what would become known as the knowledge economy: a future built on intellectual labor and the production of intellectual property. In Brain Magnet, Alex Sayf Cummings reveals the significance of Research Triangle Park to the emergence of the high-tech economy in a postindustrial United States. She analyzes the use of ideas of culture and creativity to fuel economic development, how workers experienced life in the Triangle, and the role of the federal government in bringing the modern technology industry into being. As Raleigh, Durham, and Chapel Hill were transformed by high-tech development, the old South gave way to a distinctly new one, which welded the intellectual power of universities to a vision of the suburban good life. Cummings pinpoints how the story of the Research Triangle sheds new light on the origins of today's urban landscape, in which innovation, as exemplified by the tech industry, is lauded as the engine of economic growth against a backdrop of gentrification and inequality. Placing the knowledge economy in a broader cultural and intellectual context, Brain Magnet offers vital insight into how tech-driven development occurs and the people and places left in its wake.
Turn cyber intelligence into meaningful business decisions and reduce losses from cyber events Cyber Intelligence-Driven Risk provides a solution to one of the most pressing issues that executives and risk managers face: How can we weave information security into our business decisions to minimize overall business risk? In today's complex digital landscape, business decisions and cyber event responses have implications for information security that high-level actors may be unable to foresee. What we need is a cybersecurity command center capable of delivering, not just data, but concise, meaningful interpretations that allow us to make informed decisions. Building, buying, or outsourcing a CI-DR(TM) program is the answer. In his work with executives at leading financial organizations and with the U.S. military, author Richard O. Moore III has tested and proven this next-level approach to Intelligence and Risk. This book is a guide to: Building, buying, or outsourcing a cyber intelligence-driven risk program Understanding the functional capabilities needed to sustain the program Using cyber intelligence to support Enterprise Risk Management Reducing loss from cyber events by building new organizational capacities Supporting mergers and acquisitions with predictive analytics Each function of a well-designed cyber intelligence-driven risk program can support informed business decisions in the era of increased complexity and emergent cyber threats.
The digital world offers a wonderful way to communicate and
socialize with others. Yet, it is also rife with the dangers of
being victimized emotionally, physically, and financially.
As more and more purchases are made over the Internet, states are looking for new ways to collect taxes on these sales. While there is a common misperception that states cannot tax Internet sales, the reality is that they may impose sales and use taxes on such transactions, even when the retailer is outside of the state. However, if the seller does not have a constitutionally sufficient connection ("nexus") to the state, then the seller is under no enforceable obligation to collect a use tax. While the purchaser is still generally responsible for paying the use tax, the rate of compliance is low. Recent laws, often called "Amazon" laws in reference to the large Internet retailer, represent fresh attempts by the states to capture taxes on Internet sales. This book provides a constitutional analysis of "Amazon" laws and taxation of Internet sales; state taxation of Internet transactions; and testimony on the hearing on the constitutional limitations on states' authority to collect sales taxes in E-commerce.
This book presents a new methodology, known as Knowledge Driven Development, for managing project knowledge in an exhaustive and structured manner. The text highlights the importance of efficient project delivery methodology in the overall software development life cycle. Important topics such as requirement analysis, solution design, application design, and test design are discussed in depth. It establishes a connection between enterprise knowledge and project knowledge for continuous improvement and accelerated project delivery. Separate chapters on end-to-end project delivery, compliance and protocols and interface with existing methodologies makes it useful for the readers. Several case studies and examples are interspersed throughout the text for better understanding.
Although there are numerous advertising texts available to the advertising student today, few focus solely on account planning and even fewer still view the digital landscape as permeating every aspect of advertising. Advertising Account Planning in the Digital Media Landscape seeks to bridge that gap by providing a strategic understanding of what the account planner does, a thorough explanation of the kinds of research needed for the account planning process to be successful, and all explained within a digital media mindset. Written in an engaging manner, Advertising Account Planning offers tools and information for effective account planning. Rather than simply adding a digital approach to the traditional understanding of account planning, this book recognizes that advertising in the digital landscape is no longer "new": rather, it's fundamental to understanding how advertising functions. This core text incorporates insights from current forward-thinking advertising professionals as well as suggestions for assignments, discussions and additional readings.
The Internet of Things (IoT) is the notion that nearly everything we use, from gym shorts to streetlights, will soon be connected to the Internet; the Internet of Everything (IoE) encompasses not just objects, but the social connections, data, and processes that the IoT makes possible. Industry and financial analysts have predicted that the number of Internet-enabled devices will increase from 11 billion to upwards of 75 billion by 2020. Regardless of the number, the end result looks to be a mind-boggling explosion in Internet connected stuff. Yet, there has been relatively little attention paid to how we should go about regulating smart devices, and still less about how cybersecurity should be enhanced. Similarly, now that everything from refrigerators to stock exchanges can be connected to a ubiquitous Internet, how can we better safeguard privacy across networks and borders? Will security scale along with this increasingly crowded field? Or, will a combination of perverse incentives, increasing complexity, and new problems derail progress and exacerbate cyber insecurity? For all the press that such questions have received, the Internet of Everything remains a topic little understood or appreciated by the public. This volume demystifies our increasingly "smart" world, and unpacks many of the outstanding security, privacy, ethical, and policy challenges and opportunities represented by the IoE. Scott J. Shackelford provides real-world examples and straightforward discussion about how the IoE is impacting our lives, companies, and nations, and explain how it is increasingly shaping the international community in the twenty-first century. Are there any downsides of your phone being able to unlock your front door, start your car, and control your thermostat? Is your smart speaker always listening? How are other countries dealing with these issues? This book answers these questions, and more, along with offering practical guidance for how you can join the effort to help build an Internet of Everything that is as secure, private, efficient, and fun as possible.
Computer processing and internet communication has changed the way we learn, work, play and associate with each other. In the case of China, the introduction of the computer and mass availability of the internet has boosted economic growth, sped up social progress, transformed the political landscape and changed the lifestyle of the Chinese people in profound ways. This book discusses the influence that advances in computers and increased use and dependence on the internet has had on China, with a particular focus on cyberspace governance to students, economic theorists, empirical social scientists, policy makers and the informed general reader.
Cyberspace provides a platform for innovation and prosperity and the means to improve general welfare around the globe. However, with the broad reach of a loose and lightly regulated digital infrastructure, great risks threaten nations, private enterprises and individual rights. The government has a responsibility to address these strategic vulnerabilities to ensure that the United States and its citizens, together with the larger community of nations, can realize the full potential of the information technology revolution. This book explores the national strategies for cyberspace policy review and trusted identities in cyberspace striving to enhance online choice, efficiency, security and privacy.
As software R&D investment increases, the benefits from short feedback cycles using technologies such as continuous deployment, experimentation-based development, and multidisciplinary teams require a fundamentally different strategy and process. This book will cover the three overall challenges that companies are grappling with: speed, data and ecosystems. Speed deals with shortening the cycle time in R&D. Data deals with increasing the use of and benefit from the massive amounts of data that companies collect. Ecosystems address the transition of companies from being internally focused to being ecosystem oriented by analyzing what the company is uniquely good at and where it adds value.
Orthogonal frequency-division multiplexing (OFDM) has existed for many years, but it has recently acquired a huge momentum as an emerging technology for high data rates. This technology has quickly moved from books and lectures to be a key technique within almost all wireless commercial broadband technologies. OFDM stands as a low complexity and high efficiency way to deal with the channel frequency selectivity by dividing the channel into a large set of sub-channels, each one of them showing flat fading characteristics. Therefore, OFDM is a multi-carrier transmission technique that makes the communication to be robust against large delay spreads by keeping the orthogonality in the frequency domain. This book presents current research on the advantages and disadvantages of OFDM. |
![]() ![]() You may like...
|