Asymmetric Alliances and Information Systems

Asymmetric Alliances and Information Systems PDF Author: Karim Said
Publisher: John Wiley & Sons
ISBN: 1786300974
Category : Computers
Languages : en
Pages : 164

Get Book Here

Book Description
This book explores the impact of information systems on the management of North–South asymmetric strategic alliances through a series of in-depth case studies which analyze different types of partnerships. Positioned at the heart of the value creation process, the choice of information system seems to be becoming a strategic issue which should be centered not only on the organizational decisions related to the type of alliance but also the management systems of each of the partners. The authors provide an understanding of the nature of this relationship between the organizational structure and the method of information system integration in asymmetric alliances. The in-depth analysis of strategic alliance case-studies illustrates the different methods of information system integration, which are themselves linked to the organisational and structural choices of the alliance. These methods are characterized by information-sharing and coordination mechanisms as well as the balance of control over shared activities developed by the distinct partners.

Asymmetric Alliances and Information Systems

Asymmetric Alliances and Information Systems PDF Author: Karim Said
Publisher: John Wiley & Sons
ISBN: 1786300974
Category : Computers
Languages : en
Pages : 164

Get Book Here

Book Description
This book explores the impact of information systems on the management of North–South asymmetric strategic alliances through a series of in-depth case studies which analyze different types of partnerships. Positioned at the heart of the value creation process, the choice of information system seems to be becoming a strategic issue which should be centered not only on the organizational decisions related to the type of alliance but also the management systems of each of the partners. The authors provide an understanding of the nature of this relationship between the organizational structure and the method of information system integration in asymmetric alliances. The in-depth analysis of strategic alliance case-studies illustrates the different methods of information system integration, which are themselves linked to the organisational and structural choices of the alliance. These methods are characterized by information-sharing and coordination mechanisms as well as the balance of control over shared activities developed by the distinct partners.

Digital Humanities

Digital Humanities PDF Author: Olivier Le Deuff
Publisher: John Wiley & Sons
ISBN: 111930816X
Category : Computers
Languages : en
Pages : 180

Get Book Here

Book Description
Where do the digital humanities really come from? Are they really news? What are the theoretical and technical influences that participate in this scientific field that arouses interest and questions? This book tries to show and explain the main theories and methods that have allowed their current constitution. The aim of the book is to propose a new way to understand the history of digital humanities in a broader perspective than the classic history with the project of Robert Busa. The short digital humanities perspective neglects lots of actors and disciplines. The book tries to show the importance of other fields than humanities computing like scientometry, infometry, econometry, mathematical linguistics, geography and documentation.

Blockchain

Blockchain PDF Author: Matthieu Quiniou
Publisher: John Wiley & Sons
ISBN: 1119629551
Category : Business & Economics
Languages : en
Pages : 168

Get Book Here

Book Description
The dominance of trusted intermediaries could be weakened by blockchain, a distributed ledger technology, one of the functions of which is to constitute timestamped proofs by replacing inter-individual trust with algorithmic trust. Blockchain self-executing smart contracts allow us to rethink the practice in the domain of e-commerce, interbank communication, fundraising (and ICOs), justice (timestamping evidence, acts authenticated by blockchain) and businesses in numerous sectors (entertainment, AI, health, real estate, tourism, transport, etc.) which attempt to propose new services by benefiting from blockchains. This book aims to put into perspective the technical innovations and the uses brought about by blockchain, by identifying that which has a medium- or long-term impact, all while taking into account the social, economic, judicial and administrative resistances that are likely to develop.

Epidemiology and Geography

Epidemiology and Geography PDF Author: Marc Souris
Publisher: John Wiley & Sons
ISBN: 1119597439
Category : Science
Languages : en
Pages : 265

Get Book Here

Book Description
Localization is involved everywhere in epidemiology: health phenomena often involve spatial relationships among individuals and risk factors related to geography and environment. Therefore, the use of localization in the analysis and comprehension of health phenomena is essential. This book describes the objectives, principles, methods and tools of spatial analysis and geographic information systems applied to the field of health, and more specifically to the study of the spatial distribution of disease and health–environment relationships. It is a practical introduction to spatial and spatio-temporal analysis for epidemiology and health geography, and takes an educational approach illustrated with real-world examples. Epidemiology and Geography presents a complete and straightforward overview of the use of spatial analysis in epidemiology for students, public health professionals, epidemiologists, health geographers and specialists in health–environment studies.

Digital Organizations Manufacturing

Digital Organizations Manufacturing PDF Author: Maryse Carmès
Publisher: John Wiley & Sons
ISBN: 111952766X
Category : Computers
Languages : en
Pages : 185

Get Book Here

Book Description
In what sort of assemblages, the strategies and digital policies in organization are made? Beyond digital mantras and management slogans/fictions, what is the concrete factory of information management system? What are the parts of the human and no human actors? Is it possible to create a new approach to understand how work change (or not), to explore the potential for a social and cognitive innovation way, considering simultaneously the increase of Data Management and the organizational analytics?

Geographic Data Imperfection 1

Geographic Data Imperfection 1 PDF Author: Mireille Batton-Hubert
Publisher: John Wiley & Sons
ISBN: 1786302977
Category : Computers
Languages : en
Pages : 216

Get Book Here

Book Description
Geomatics is a field of science that has been intimately intertwined with our daily lives for almost 30 years, to the point where we often forget all the challenges it entails. Who does not have a navigation application on their phone or regularly engage with geolocated data? What is more, in the coming decades, the accumulation of geo-referenced data is expected to increase significantly. This book focuses on the notion of the imperfection of geographic data, an important topic in geomatics. It is essential to be able to define and represent the imperfections that are encountered in geographical data. Ignoring these imperfections can lead to many risks, for example in the use of maps which may be rendered inaccurate. It is, therefore, essential to know how to model and treat the different categories of imperfection. A better awareness of these imperfections will improve the analysis and the use of this type of data.

Digital Communications 2

Digital Communications 2 PDF Author: Safwan El Assad
Publisher: John Wiley & Sons
ISBN: 1119788250
Category : Technology & Engineering
Languages : en
Pages : 335

Get Book Here

Book Description
It is a complete training in digital communications in the same book with all the aspects involved in such training: courses, tutorials with many typical problems targeted with detailed solutions, practical work concretely illustrating various aspects of technical implementation implemented. It breaks down into three parts. The Theory of information itself, which concerns both the sources of information and the channels of its transmission, taking into account the errors they introduce in the transmission of information and the means of protect by the use of appropriate coding methods. Then for the technical aspects of transmission, first the baseband transmission is presented with the important concept and fundamental technique of equalization. The performance evaluation in terms of probability of errors is systematically developed and detailed as well as the online codes used. Finally, the third part presents the Transmissions with digital modulation of carriers used in radio transmissions but also on electric cables. A second important aspect in learning a learner's knowledge and skills is this book. It concerns the "Directed Work" aspect of a training. This is an ordered set of 33 typical problems with detailed solutions covering the different parts of the course with practical work. Finally, the last aspect concerns the practical aspects in the proper sense of the term, an essential complement to training going as far as know-how. We propose here a set of 5 practical works.

Challenges of the Internet of Things

Challenges of the Internet of Things PDF Author: Imad Saleh
Publisher: John Wiley & Sons
ISBN: 1786303612
Category : Computers
Languages : en
Pages : 274

Get Book Here

Book Description
This book will examine the issues of IoT according to three complementary axes: technique, use, ethics. The techniques used to produce artefacts (physical objects, infrastructures), programs (algorithms, software) and data (Big data, linked data, metadata, ontologies) are the subject of many innovations as the field of IoT is rich and stimulating. Along with this technological boom, IoT uses colonize new fields of application in the fields of transport, administration, housing, maintenance, health, sports, well-being. ... Privileged interface with digital ecosystems now at the heart of social exchanges, the IoT develops a power to act whose consequences both good and bad make it difficult to assess a fair business.

Modeling and Use of Context in Action

Modeling and Use of Context in Action PDF Author: Patrick Brézillon
Publisher: John Wiley & Sons
ISBN: 1786308290
Category : Mathematics
Languages : en
Pages : 324

Get Book Here

Book Description
This book brings together current research and adopts a pragmatic approach to modeling and using context to solve real-world problems. The editors were instrumental in creating - and continue to be involved in - the interdisciplinary research community, centered around the biennial CONTEXT (International and Interdisciplinary Conference on Modeling and Using Context) conference series, focused on studying context and its implications for artificial intelligence, software applications, psychology, philosophy, linguistics, neuroscience, as well as other fields. The first three chapters lay the foundations, looking at the lessons learned over the past 25 years and arguing for a continued shift toward more pragmatic approaches. The remaining chapters contain contributions to pragmatic context-based research from a wide range of domains, including technological problems - such as subway incident management and autonomous underwater vehicle control - identifying emotions from speech without understanding the words, anonymization in a world where privacy is increasingly threatened, teaching in context and improving management teaching in a business school.

Cybersecurity and Decision Makers

Cybersecurity and Decision Makers PDF Author: Marie De Fréminville
Publisher: John Wiley & Sons
ISBN: 1119720354
Category : Computers
Languages : en
Pages : 226

Get Book Here

Book Description
Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.