Uncovering Covert Innovation

Uncovering Covert Innovation PDF Author: Stephan Eicher
Publisher: Springer Nature
ISBN: 3658316209
Category : Business & Economics
Languages : en
Pages : 225

Get Book Here

Book Description
It is of central importance for companies to be innovative. To maximize their innovation potential, companies often rely on formal systems and processes for innovation management. It has been shown that such attempts have the side effect of inhibiting a number of valuable innovations. Some employees proceed informally and smuggle their innovations past formal barriers. Stephan Eicher analyses the interaction between bootleggers and their management. Using both qualitative and quantitative methods, he answers three primary research questions. What is the current state of research on bootlegging in R&D? How do bootleggers overcome illegitimacy upon disclosing their covert projects to decision-makers? How do different management styles and approaches affect the incidence of bootlegging? The results of this research paint a vivid picture of the relationship between covert innovation projects and the official management world of companies.

Uncovering Covert Innovation

Uncovering Covert Innovation PDF Author: Stephan Eicher
Publisher: Springer Nature
ISBN: 3658316209
Category : Business & Economics
Languages : en
Pages : 225

Get Book Here

Book Description
It is of central importance for companies to be innovative. To maximize their innovation potential, companies often rely on formal systems and processes for innovation management. It has been shown that such attempts have the side effect of inhibiting a number of valuable innovations. Some employees proceed informally and smuggle their innovations past formal barriers. Stephan Eicher analyses the interaction between bootleggers and their management. Using both qualitative and quantitative methods, he answers three primary research questions. What is the current state of research on bootlegging in R&D? How do bootleggers overcome illegitimacy upon disclosing their covert projects to decision-makers? How do different management styles and approaches affect the incidence of bootlegging? The results of this research paint a vivid picture of the relationship between covert innovation projects and the official management world of companies.

Corporate Underground: Bootleg Innovation And Constructive Deviance

Corporate Underground: Bootleg Innovation And Constructive Deviance PDF Author: Peter Augsdorfer
Publisher: World Scientific
ISBN: 1800612273
Category : Business & Economics
Languages : en
Pages : 359

Get Book Here

Book Description
In the corporate underground, creative intrapreneurs produce ideas autonomously and without the consent of management. Such informal activity frequently 'corrects' and compensates for the weaknesses of formal organizational systems. The corporate underground is an adjusting element for a number of organizational paradoxes. This imposes a certain legitimacy on covert activities such as bootlegging and constructive deviance. It reflects a basic axiom of the evolutionary perspective: change and creativity are reliant upon elements of redundancy, waste and inefficiency.With contributions from 16 leading experts in this field, the book offers a comprehensive picture of the nature of covert creativity for theory, research and practice. The chapters cover a wide range of facets of underground activity, including basic information, the sensitive transition from underground to formal disclosure at an organization, and psychological factors. This book is a valuable compendium for academics and practitioners interested in R&D and innovation. Management seeking to better manage their innovative capabilities in their companies will also benefit from this book.

Covert Operations Unveiling Organized Crime

Covert Operations Unveiling Organized Crime PDF Author: Daniel M. Rudofossi
Publisher: Taylor & Francis
ISBN: 1000799018
Category : Biography & Autobiography
Languages : en
Pages : 332

Get Book Here

Book Description
New York Police Department "cop doc" Dr. Dan Rudofossi delves into what it meant to live as a deep-cover operative through narratives with Joe Pistone, the FBI agent who spent six years living as Donnie Brasco as a member of the Bonanno crime family. When Operation Donnie Brasco abruptly closed, it was the longest and most successful infiltration of a Mafia family. Dr. Rudofossi underscores Pistone’s genius to survive daily challenges of infiltration by using innovations in the ecological niches of Mafia violence. Donnie Brasco’s "mental toughness," resilience, and ingenuity are understood through Rudofossi’s signature Eco-Ethological Existential Analysis. Mapping out why and how trauma shaped functional dissociation as unconscious adaptation, the author’s experience as a police psychologist—that is, a "cop doc"—helps decode the bigger picture of conflict, resolution, and compromise in the disparate worlds of policing and organized crime. This unique look at the costs and successes of tracking, infiltrating, arresting, and convicting those involved in organized crime is a groundbreaking read for law enforcement personnel, criminal justice, homeland security, law students, police psychologists, as well as anyone fascinated by the world of organized crime.

Uncovering Ways of War

Uncovering Ways of War PDF Author: Thomas G. Mahnken
Publisher: Cornell University Press
ISBN: 9780801439865
Category : History
Languages : en
Pages : 220

Get Book Here

Book Description
Thomas G. Mahnken sheds light on the shadowy world of U.S. intelligence-gathering, tracing how America learned of military developments in Japan, Germany, and Great Britain in the period between the two world wars.

Open Innovation: Unveiling The Power Of The Human Element

Open Innovation: Unveiling The Power Of The Human Element PDF Author: Anne-laure Mention
Publisher: World Scientific
ISBN: 9813140860
Category : Business & Economics
Languages : en
Pages : 388

Get Book Here

Book Description
What is the profile to excel and lead in an open innovation environment, within and across organizational boundaries? What are the organizational ingredients and ways contributing to the creation of the right corporate open innovation environment and culture, within and across organizational boundaries? What is the role of organizational culture as a catalyst for adopting open innovation practices? What kinds of educational and training curricula for open innovation need to be developed and put in place? By unveiling the peculiarities of the dynamic interplay between the individual and organizational spectrums, this volume, seeks to provide relevant answers to these questions, among others. Readers are invited to embark on a fascinating and challenging journey towards one of the darkest of sides and mysteries of open innovation: the human element.Open Innovation: Unveiling the Power of the Human Element brings together the latest thinking from members of the academic community, industry leaders and practitioners, along with, policy-makers. By adopting a variety of research methods, this volume provides relevant up-to-speed but at the same time down-to-earth invaluable insights, foresights and solutions in relation to the role and the positioning of the human element within the participatory and connection-driven DNA of the open innovation paradigm.

Nurses Making Policy

Nurses Making Policy PDF Author: Rebecca Patton
Publisher: Springer Publishing Company
ISBN: 0826198910
Category : Business & Economics
Languages : en
Pages : 567

Get Book Here

Book Description
Print+CourseSmart

Innovations and Advances in Computer, Information, Systems Sciences, and Engineering

Innovations and Advances in Computer, Information, Systems Sciences, and Engineering PDF Author: Khaled Elleithy
Publisher: Springer Science & Business Media
ISBN: 1461435358
Category : Technology & Engineering
Languages : en
Pages : 1204

Get Book Here

Book Description
Innovations and Advances in Computer, Information, Systems Sciences, and Engineering includes the proceedings of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2011). The contents of this book are a set of rigorously reviewed, world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Industrial Electronics, Technology and Automation, Telecommunications and Networking, Systems, Computing Sciences and Software Engineering, Engineering Education, Instructional Technology, Assessment, and E-learning.

Handbook of Research Methods in Migration

Handbook of Research Methods in Migration PDF Author: William L. Allen
Publisher: Edward Elgar Publishing
ISBN: 1800378033
Category : Social Science
Languages : en
Pages : 395

Get Book Here

Book Description
In this thoroughly revised and updated second edition, William Allen and Carlos Vargas-Silva bring together a diverse range of experts to explore the latest research methods in migration studies, taking stock of major changes that have been salient for migration research—as well as the social sciences more broadly—in the last decade. Spanning a variety of different methodologies, this second edition of the Handbook of Research Methods in Migration provides practical guidance on designing, completing, and communicating migration research, considering diverse audiences including migrants themselves. This title contains one or more Open Access chapters.

Handbook of Political Islam in Europe

Handbook of Political Islam in Europe PDF Author: Thomas Jäger
Publisher: Springer Nature
ISBN: 3031461738
Category :
Languages : en
Pages : 648

Get Book Here

Book Description


Hiding Behind the Keyboard

Hiding Behind the Keyboard PDF Author: Brett Shavers
Publisher: Syngress
ISBN: 0128033525
Category : Computers
Languages : en
Pages : 256

Get Book Here

Book Description
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals. Covers high-level strategies, what they can achieve, and how to implement them Shows discovery and mitigation methods using examples, court cases, and more Explores how social media sites and gaming technologies can be used for illicit communications activities Explores the currently in-use technologies such as TAILS and TOR that help with keeping anonymous online