Using the theory of management fashions proposed in the 1990s by Eric Abrahamson, Krzysztof Klincewicz analyzes the changing popularity of management concepts accompanied by solutions. Among these are management bestsellers, consulting services, software systems, methodologies, and approaches to organizational change, training courses, professional certifications and even new corporate positions.The book presents the phenomena of management fashions as being the key driver for the development of the management knowledge industry, consisting of consulting companies, computer firms, publishing houses, professional institutes, and other organizations involved in the launching and the promotion of new management techniques. The author supplements the existing body of knowledge by focusing on the supply-side of management fashions, particularly the strategies and marketing techniques of solution vendors, and proposes a model of relations between management ideas and tangible solutions, explaining how bestselling ideas are turned into objects and institutions.The empirical research described in this volume involves multiple methods, including discourse volume analysis and qualitative historical techniques. Included also is a comprehensive overview of the recent relevant developments in sociology, marketing, and organization sciences, in which the author draws on the heritage of praxiology by taking a meta-level perspective on the propositions of management science.
A business development tool for professionals, marketers, sales directors, consultants and strategists seeking to understand and reach middle market American companies. It covers important business sectors, from InfoTech to health care to telecommunications. Profiles of more than 500 leading US middle market companies. Includes business glossary, a listing of business contacts, indexes and database on CD-ROM.
The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapters contributed by a panel of renowned industry professionals, the new edition has increased coverage in both breadth and depth of all ten domains of the Common Body of Knowledge defined by the International Information Systems Security Certification Consortium (ISC). Of the seventy-seven chapters in the fifth edition, twenty-five chapters are completely new, including: 1. Hardware Elements of Security 2. Fundamentals of Cryptography and Steganography 3. Mathematical models of information security 4. Insider threats 5. Social engineering and low-tech attacks 6. Spam, phishing, and Trojans: attacks meant to fool 7. Biometric authentication 8. VPNs and secure remote access 9. Securing Peer2Peer, IM, SMS, and collaboration tools 10. U.S. legal and regulatory security issues, such as GLBA and SOX Whether you are in charge of many computers or just one important one, there are immediate steps you can take to safeguard your computer system and its contents. Computer Security Handbook, Fifth Edition equips you to protect the information and networks that are vital to your organization.
The widespread deployment of millions of current and emerging software applications has placed software economic studies among the most critical of any form of business analysis. Unfortunately, a lack of an integrated suite of metrics makes software economic analysis extremely difficult. The International Function Point Users Group (IFPUG), a nonprofit and member-governed organization, has become the recognized leader in promoting the effective management of application software development and maintenance activities. The IFPUG Guide to IT and Software Measurement brings together 52 leading software measurement experts from 13 different countries who share their insights and expertise. Covering measurement programs, function points in measurement, new technologies, and metrics analysis, this volume: Illustrates software measurement's role in new and emerging technologies Addresses the impact of agile development on software measurement Presents measurement as a powerful tool for auditing and accountability Includes metrics for the CIO Edited by IFPUG's Management and Reporting Committee, the text is useful for IT project managers, process improvement specialists, measurement professionals, and business professionals who need to interact with IT professionals and participate in IT decision-making. It includes coverage of cloud computing, agile development, quantitative project management, process improvement, measurement as a tool in accountability, project ROI measurement, metrics for the CIO, value stream mapping, and benchmarking.
Companies understand that their ability to compete is tied directly to their ability to leverage the very latest technology advances. Fortunately, deploying new technology has never been easier, primarily due to early maturity and cloud delivery. One approach that is helping companies rapidly pilot and affordably deploy new technologies is ready technology, a new category of information technology (IT). This book explains the ready technology adoption process in detail, enabling companies to exploit new technology immediately and effectively. In this book, the author challenges the traditional "requirements-first/technology-second" approach to technology deployment. Espousing a "technology-first/requirements-second" approach, the author explains how business solutions are "discovered" by deploying—not studying—ready technology. The book covers the latest trends and processes in ready technology. It also describes the characteristics of ready companies and recommends ready technology pilots that should be launched by the following industries: higher education, retail, and healthcare.
Provider-Led Population Health Management: Key Healthcare Strategies in the Cognitive Era, Second Edition draws connections among the new care-delivery models, the components of population health management, and the types of health IT that are required to support those components. The key concept that ties all of this together is that PHM requires a high degree of automation to reach everyone in a population, engage those patients in self-care, and maximize the chance that they will receive the proper preventive, chronic, and acute care. While this book is intended for healthcare executives and policy experts, anyone who is interested in health care can learn something from its exploration of the major issues that are stirring health care today. In the end, the momentous changes going on in health care will affect us all.
Radio Frequency Identification (RFID) is an emerging technology in business. But is it a temporary fad or an unstoppable business improvement process? This book looks at this issue and suggests the need to better understand what RFID is all about.