![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 24 of 24 matches in All Departments
How did German composers brand their music as Venetian? How did the Other fare in other languages, when Cabeza’s Relación of colonial Americas appeared in translations? How did Altdorf emblems travel to colonial America and Sweden? What does Virtue look like in a library collection? And what was Boccaccio’s Decameron doing in the Ethica section? From representations of Sophie Charlotte, the first queen in Prussia, to the Ottoman Turks, from German wedding music to Till Eulenspiegel, from the translation of Horatian Odes and encyclopedias of heraldry, these essays by leading scholars explore the transmission, translation, and organization of knowledge in early modern Germany, contributing sophisticated insights to the history of the early modern book and its contents.
"Gender Matters" opens the debate concerning violence in literature and the arts beyond a single national tradition and engages with multivalent aspects of both female and male gender constructs, mapping them onto depictions of violence. By defining a tight thematic focus and yet offering a broad disciplinary scope for inquiry, the present volume brings together a wide range of scholarly papers investigating a cohesive topic-gendered violence-from the perspectives of French, German, Italian, Spanish, English, and Japanese literature, history, musicology, art history, and cultural studies. It interrogates the intersection of gender and violence in the early modern period, cutting across national traditions, genres, media, and disciplines. By engaging several levels of discourse, the volume advances a holistic approach to understanding gendered violence in the early modern world. The convergence of discourses concerning literature, the arts, emerging print technologies, social and legal norms, and textual and visual practices leverages a more complex understanding of gender in this period. Through the unifying lens of gender and violence the contributions to this volume comprehensively address a wide scope of diverse issues, approaches, and geographies from late medieval Japan to the European Enlightenment. While the majority of essays focus on early modern Europe, they are broadly contextualized and informed by integrated critical approaches pertaining to issues of violence and gender.
The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. Specifically, it aims to focus on the following key objectives: To describe the various theories and models applicable to studying IS/IT management issues. To outline and describe, for each of the various theories and models, independent and dependent constructs, reference discipline/originating area, originating author(s), seminal articles, level of analysis (i.e. firm, individual, industry) and links with other theories. To provide a critical review/meta-analysis of IS/IT management articles that have used a particular theory/model.To discuss how a theory can be used to better understand how information systems can be effectively deployed in today's digital world. This book contributes to our understanding of a number of theories and models. The theoretical contribution of this book is that it analyzes and synthesizes the relevant literature in order to enhance knowledge of IS theories and models from various perspectives. To cater to the information needs of a diverse spectrum of readers, this book is structured into two volumes, with each volume further broken down into two sections. The first section of Volume 1 presents detailed descriptions of a set of theories centered around the IS lifecycle, including the Success Model, Technology Acceptance Model, User Resistance Theories, and four others. The second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, Portfolio Theory, Discrepancy Theory Models, and eleven others. The first section of Volume 2 concerns socio-psychological theories. These include Personal Construct Theory, Psychological Ownership, Transactive Memory, Language-Action Approach, and nine others. The second section of Volume 2 deals with methodological theories, including Critical Realism, Grounded Theory, Narrative Inquiry, Work System Method, and four others. Together, these theories provide a rich tapestry of knowledge around the use of theory in IS research. Since most of these theories are from contributing disciplines, they provide a window into the world of external thought leadership."
The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. Specifically, it aims to focus on the following key objectives: To describe the various theories and models applicable to studying IS/IT management issues. To outline and describe, for each of the various theories and models, independent and dependent constructs, reference discipline/originating area, originating author(s), seminal articles, level of analysis (i.e. firm, individual, industry) and links with other theories. To provide a critical review/meta-analysis of IS/IT management articles that have used a particular theory/model.To discuss how a theory can be used to better understand how information systems can be effectively deployed in today's digital world. This book contributes to our understanding of a number of theories and models. The theoretical contribution of this book is that it analyzes and synthesizes the relevant literature in order to enhance knowledge of IS theories and models from various perspectives. To cater to the information needs of a diverse spectrum of readers, this book is structured into two volumes, with each volume further broken down into two sections. The first section of Volume 1 presents detailed descriptions of a set of theories centered around the IS lifecycle, including the Success Model, Technology Acceptance Model, User Resistance Theories, and four others. The second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, Portfolio Theory, Discrepancy Theory Models, and eleven others. The first section of Volume 2 concerns socio-psychological theories. These include Personal Construct Theory, Psychological Ownership, Transactive Memory, Language-Action Approach, and nine others. The second section of Volume 2 deals with methodological theories, including Critical Realism, Grounded Theory, Narrative Inquiry, Work System Method, and four others. Together, these theories provide a rich tapestry of knowledge around the use of theory in IS research. Since most of these theories are from contributing disciplines, they provide a window into the world of external thought leadership."
The second volume of the two volumes book is dedicated to various extensions and generalizations of Dyadic (Walsh) analysis and related applications. Considered are dyadic derivatives on Vilenkin groups and various other Abelian and finite non-Abelian groups. Since some important results were developed in former Soviet Union and China, we provide overviews of former work in these countries. Further, we present translations of three papers that were initially published in Chinese. The presentation continues with chapters written by experts in the area presenting discussions of applications of these results in specific tasks in the area of signal processing and system theory. Efficient computing of related differential operators on contemporary hardware, including graphics processing units, is also considered, which makes the methods and techniques of dyadic analysis and generalizations computationally feasible. The volume 2 of the book ends with a chapter presenting open problems pointed out by several experts in the area.
Dyadic (Walsh) analysis emerged as a new research area in applied mathematics and engineering in early seventies within attempts to provide answers to demands from practice related to application of spectral analysis of different classes of signals, including audio, video, sonar, and radar signals. In the meantime, it evolved in a mature mathematical discipline with fundamental results and important features providing basis for various applications. The book will provide fundamentals of the area through reprinting carefully selected earlier publications followed by overview of recent results concerning particular subjects in the area written by experts, most of them being founders of the field, and some of their followers. In this way, this first volume of the two volume book offers a rather complete coverage of the development of dyadic Walsh analysis, and provides a deep insight into its mathematical foundations necessary for consideration of generalizations and applications that are the subject of the second volume. The presented theory is quite sufficient to be a basis for further research in the subject area as well as to be applied in solving certain new problems or improving existing solutions for tasks in the areas which motivated development of the dyadic analysis.
This timely and insightful analysis of Conservative economic policymaking over the past half century covers the period from Ted Heath's assumption of the leadership through the Heath, Thatcher and Major governments and up to the early years of the coalition. As well as a offering a detailed commentary on the Conservative Party's macroeconomic and microeconomic policymaking for the past 50 years it also establishes a context for the controversial austerity measures implemented by the Conservative-led Coalition that established in the wake of Britain's inconclusive general election of 2010. This is a fascinating insight into policymaking within the Conservative Party as well as an indicator of the extent to which competing conservative philosophies have impacted on the policies pursued. At a time when the Conservative Party and economic policymaking loom large on the political landscape, this book is an invaluable contribution to present debates.
The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. Specifically, it aims to focus on the following key objectives: To describe the various theories and models applicable to studying IS/IT management issues. To outline and describe, for each of the various theories and models, independent and dependent constructs, reference discipline/originating area, originating author(s), seminal articles, level of analysis (i.e. firm, individual, industry) and links with other theories. To provide a critical review/meta-analysis of IS/IT management articles that have used a particular theory/model.To discuss how a theory can be used to better understand how information systems can be effectively deployed in today's digital world. This book contributes to our understanding of a number of theories and models. The theoretical contribution of this book is that it analyzes and synthesizes the relevant literature in order to enhance knowledge of IS theories and models from various perspectives. To cater to the information needs of a diverse spectrum of readers, this book is structured into two volumes, with each volume further broken down into two sections. The first section of Volume 1 presents detailed descriptions of a set of theories centered around the IS lifecycle, including the Success Model, Technology Acceptance Model, User Resistance Theories, and four others. The second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, Portfolio Theory, Discrepancy Theory Models, and eleven others. The first section of Volume 2 concerns socio-psychological theories. These include Personal Construct Theory, Psychological Ownership, Transactive Memory, Language-Action Approach, and nine others. The second section of Volume 2 deals with methodological theories, including Critical Realism, Grounded Theory, Narrative Inquiry, Work System Method, and four others. Together, these theories provide a rich tapestry of knowledge around the use of theory in IS research. Since most of these theories are from contributing disciplines, they provide a window into the world of external thought leadership."
Covering the period from Ted Heath's assumption of the leadership of the Conservative Party through to the early years of the Coalition, this volume provides a detailed analysis of the Tory Party's Macroeconomic and Microeconomic Policy-Making over the past 50 years providing an historical context for the political and economic events of today.
The People's Republic of China (PRC) continues to pursue a long-term, comprehensive military modernisation program designed to improve its armed forces' capacity to fight short-duration, high-intensity regional conflicts. China's military modernisation has the potential to reduce core U.S. military technological advantages. China is investing in capabilities designed to defeat adversary power projection and counter third-party -- including U.S. -- intervention during a crisis or conflict. This book examines the military and security developments involving the PRC. Moreover, it provides and discusses the highlights from China's new defense white paper, "China's Military Strategy".
|
You may like...
Into A Raging Sea - Great South African…
Tony Weaver, Andrew Ingram
Paperback
(2)R330 Discovery Miles 3 300
Township Economy - People, Spaces And…
Andrew Charman, Leif Petersen, …
Paperback
(1)
Ordinary Cities, Extraordinary…
John R. Bryson, Ronald V. Kalafsky, …
Hardcover
R3,410
Discovery Miles 34 100
The Death Of Democracy - Hitler's Rise…
Benjamin Carter Hett
Paperback
(1)
Blockchain for Smart Cities
Saravanan Krishnan, Valentina E. Balas, …
Paperback
R2,535
Discovery Miles 25 350
|