Bemærk: Kan ikke leveres før jul.
This book addresses the question of how competition authorities assess mergers in... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book details qualitative research focusing on Internet startups, digital entrepreneurship, race and sex discrimination, and the sharing economy.
Bemærk: Kan ikke leveres før jul.
With the widespread transformation of information into digital form - firms and organizations are embracing this development to adopt... Læs mere
Bemærk: Kan ikke leveres før jul.
The computerization of culture appears relentless and unstoppable. In response Anti-Computing deals in dissent. Engaging with critical theory and media... Læs mere
Bemærk: Kan ikke leveres før jul.
This book sets out to provide postgraduate researchers with guidance on selecting and applying socio-technical theories to the study of information systems, including how they can be combined to complement each other.
Bemærk: Kan ikke leveres før jul.
This volume gathers researchers from economics, business studies, organization studies, medicine, social... Læs mere
Bemærk: Kan ikke leveres før jul.
An expert on China's growing digital empire provides an urgent look at the battle to connect and control tomorrow's networks
Bemærk: Kan ikke leveres før jul.
This manual is mainly aimed at instructors who want to offer a practical view of the process of modeling, designing and developing an IT start-up. Additionally, it can be individually used by entrepreneurs who wish to launch their start-up businesses in IT field.
Bemærk: Kan ikke leveres før jul.
This book offers the reader broad evidence on how new information and communication technologies impact women’s economic and social empowerment and hence have an impact on overall welfare creation.
Bemærk: Kan ikke leveres før jul.
This book explores the strategic decisions made by organizations when implementing cybersecurity controls, leveraging economic models and theories from the economics of information security and risk management frameworks.