- Table View
- List View
Computer Power Group: Designing Brand Architecture
by Susan Fournier Andrea WojnickiComputer Power Group (CPG), an Australian-based consulting, education, and staffing placement firm in the IT industry, is contemplating a brand architecture capable of structuring its eight branded business units. CEO Peter James is particularly curious about whether a corporate brand is needed to unify the businesses. Extensive consumer research is conducted to inform the branding initiative, providing insight into the meanings of each of the sub-brands in key stakeholders' minds. The architecture solution must consider not only brand meanings and associations, but market performance and brand stewardship concerns as well. A pending merger with U.S.-based Interim Technology further complicates the task.
Computer Science and its Applications: CSA 2012 (Lecture Notes in Electrical Engineering #203)
by Yi Pan Hang Bae Chang Sang-Soo Yeo Yang Sun LeeThe 4th FTRA International Conference on Computer Science and its Applications (CSA-12) will be held in Jeju, Korea on November 22~25, 2012. CSA-12 will be the most comprehensive conference focused on the various aspects of advances in computer science and its applications. CSA-12 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of CSA. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in CSA. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. CSA-12 is the next event in a series of highly successful International Conference on Computer Science and its Applications, previously held as CSA-11 (3rd Edition: Jeju, December, 2011), CSA-09 (2nd Edition: Jeju, December, 2009), and CSA-08 (1st Edition: Australia, October, 2008).
Computer Science Education Research
by Sally Fincher Marian PetreThis book provides an overview of how to approach computer science education research from a pragmatic perspective. It represents the diversity of traditions and approaches inherent in this interdisciplinary area, while also providing a structure within which to make sense of that diversity. It provides multiple 'entry points'- to literature, to me
Computer Security -- ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I (Lecture Notes in Computer Science #9326)
by Günther Pernul Peter Y A Ryan Edgar WeipplThe two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.
Computer Security Handbook, Set
by Eric Whyne Seymour Bosworth Michel E. KabayComputer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded reference maintains timeless lessons and is fully revised and updated with current information on security issues for social networks, cloud computing, virtualization, and more.
Computer-Supported Collaborative Decision-Making (Automation, Collaboration, & E-Services #4)
by Florin Gheorghe Filip Constantin-Bălă Zamfirescu Cristian CiureaThis is a book about how management and control decisions are made by persons who collaborate and possibly use the support of an information system. The decision is the result of human conscious activities aiming at choosing a course of action for attaining a certain objective (or a set of objectives). The act of collaboration implies that several entities who work together and share responsibilities to jointly plan, implement and evaluate a program of activities to achieve the common goals. The book is intended to present a balanced view of the domain to include both well-established concepts and a selection of new results in the domains of methods and key technologies. It is meant to answer several questions, such as: a) "How are evolving the business models towards the ever more collaborative schemes?"; b) "What is the role of the decision-maker in the new context?" c) "What are the basic attributes and trends in the domain of decision-supporting information systems?"; d) "Which are the basic methods to aggregate the individual preferences?" e)"What is the impact of modern information and communication technologies on the design and usage of decision support systems for groups of people?".
Computerised Book-Keeping
by Dr. Peter MarshallThis book is suitable for those preparing for the examinations of ICB, AAT, IAB, OCR, AQA and all other courses in computerised accounting. Learning computerised book-keeping skills is very different from manual accounting. It can seem more like learning computer studies than book-keeping, and it is often difficult to connect it with what may have been previously learned in manual book-keeping. In this book Dr Marshall resolves this problem with the same skill and insight that made his book on manual book-keeping, Mastering Book-keeping, so useful to readers over the years. Deliberately constructing a clear and continuous bridge between the methods so that the student never loses sight of the double entry concept, he presents the material in a way that makes computerised book-keeping clear and easy to understand.
Computerised Book-Keeping: An Accredited Textbook Of The Institute Of Certified Bookkeepers
by Peter MarshallThis book is suitable for those preparing for the examinations of ICB, AAT, IAB, OCR, AQA and all other courses in computerised accounting. Learning computerised book-keeping skills is very different from manual accounting. It can seem more like learning computer studies than book-keeping, and it is often difficult to connect it with what may have been previously learned in manual book-keeping. In this book Dr Marshall resolves this problem with the same skill and insight that made his book on manual book-keeping, Mastering Book-keeping, so useful to readers over the years. Deliberately constructing a clear and continuous bridge between the methods so that the student never loses sight of the double entry concept, he presents the material in a way that makes computerised book-keeping clear and easy to understand.
Computerization in Developing Countries: Model and Reality (Routledge Library Editions: The Economics and Business of Technology #29)
by Per LindOriginally published in 1991, this book looks at the problems of applying Western computer programmes to the developing world, arguing that the difficulties are as much cultural as technological. The author shows that the underlying models for computer applications are made up from interpretations of reality which are closely related to Western scientific, technological and cultural development originating from the Renaissance. The book includes a case study of an Egyptian manufacturing company, which reveals the actual problems encountered in the process of computerization.
Computerized Accounting Using Quickbooks Online: 2022 Update
by Gayle Williams Jennifer JohnsonThis book is primarily intended for use in undergraduate accounting programs, although it could be used in business or computer information programs as well. It is expected that students taking this course have already successfully completed a course in financial accounting and have a firm understanding of the basic principles of accounting.
Computerized Accounting with QuickBooks 2015: 2017-2018 Update
by Gayle WilliamsThis book is primarily intended for use in undergraduate accounting programs, although it could be used in business or computer information programs as well. It is expected that students taking this course have already successfully completed a course in financial accounting and have a firm understanding of the principles as well as the mechanics of accounting.
Computerized Accounting With Quickbooks 2018
by Gayle WilliamsWelcome to Computerized Accounting with QuickBooks 2018. I wrote this book to give students an introduction to QuickBooks that focuses not only on the soft¬ware mechanics, but also on the basic accounting concepts that underlie all ac¬counting systems. This book is not meant to be a user manual. It is meant to teach students how they can work with a computerized accounting system. It is my intention that students will come away from this book with an understanding that it is knowledge of the principles of accounting, not data-entry skills, that is needed to be successful in business.
Computerized Accounting with QuickBooks® 2020
by Gayle WilliamsThis book gives students an introduction to QuickBooks that focuses not only on the software mechanics, but also on the basic accounting concepts that underlie all accounting systems. This book is not meant to be a user manual. It is meant to teach students how they can work with a computerized accounting system. The students will come away from this book with an understanding that it is knowledge of the principles of accounting, not data-entry skills, that is needed to be successful in business. This book is primarily intended for use in undergraduate accounting programs, although it could be used in business or computer information programs as well. It is expected that students taking this course have already successfully completed a course in financial accounting and have a firm understanding of the principles as well as the mechanics of accounting.
Computerized Project Control
by F. DriganiHighlights advantages, disadvantages, and future trends of computerization to project control activity. Stresses identification of when computerization is needed and explores how to convert. Covers fundamentals of project control theory, software technology, and labor and cost analysis. Includes glo
Computerized Provider Order Entry at Emory Healthcare
by Andrew Katz Michael Morgan F. Warren Mcfarlan David Laborde Richard G. Hamermesh Mark KeilThe Computerized Provider Order Entry at Emory Healthcare case presents one hospital system's efforts to implement computerized provider order entry (CPOE) across all of its hospitals and the challenges they faced in doing so. Issues such as standardization of care, how to handle medication reconciliation, and unexpected challenges (e.g., changes to the post-op ordering process, lack of a human gatekeeper to monitor order flow, increase in lab orders). Dr. Bill Bornstein, Chief Quality and Medical Officer of Emory Healthcare in Atlanta is responsible for the smooth implementation of CPOE at Emory Healthcare, which is a vital part of their $50 million electronic medical record initiative. By June 2009, CPOE had gone "live" at Emory University Orthopaedics and Spine Hospital, Emory University Hospital, and Wesley Woods Hospital in a staged rollout. While Dr. Bornstein felt good about how the implementation had gone thus far, as he looked ahead next month to July 13, 2009, the fast approaching go-live date for Emory University Hospital Midtown (EUHM), he was concerned about the challenges and possible perils that lay ahead. He considered what additional actions he should take to prepare for go-live at Midtown, and if Midtown was ready for CPOE at all. One thing was certain; this hospital was different. The Computerized Provider Order Entry at Emory Healthcare case presents one hospital system's efforts to grapple with the challenges of implementing CPOE and the reactions that result. Issues such as how to deal with a workforce that has mixed views about the value of implementing such systems, the pros and cons associated with standardization of care, as well as how to deal with unexpected changes to work processes are brought out in the case. The case also allows for discussion of how to plan a phased implementation with adequate time for organizational learning to occur between the time that various sites "go live."
Computers in Business: K204
by Kelley School of Business FacultyFaculty at Indiana University's world-renowned Kelley School of Business present this essential introductory guide to the role of computers and other information technologies in business. Like the text for its sister course, K201, Computers in Business: K204 highlights include instruction and applied practice in two of the most widely used commercial software packages: Microsoft Access and Microsoft Excel. This volume, however, presents even more challenging applications and projects for honors students. Students learn, via hands-on examples, many of the powerful tools contained in these two platforms, with emphasis on how to analyze real business problems to help make important decisions.
Computers in Business: K201
by Kelley School of Business FacultyFaculty at Indiana University’s world-renowned Kelley School of Business present this essential introductory guide to the role of computers and other information technologies in business. Highlights include instruction and applied practice in two of the most widely used commercial software packages: Microsoft Access and Microsoft Excel. Students learn, via hands-on examples, many of the powerful tools contained in these two platforms, with emphasis on how to analyze real business problems to help make important decisions.
Computers in Company Training (Routledge Library Editions: The Economics and Business of Technology #19)
by David Hawkridge Wendy Newton Carole HallWhen this book was originally published in 1988, this book was the first to include a large number of reports on British and US companies' experience with computers in company training in such areas as banking, finance, insurance, manufacturing, IT, the retail industry, transport, telecommunications and energy. It provided a critical analysis of the situation and discusses company experiences, development, testing and implementation as well as cost-effectiveness and future trends.
Computers in the Delivery of Special Education and Related Services: Developing Collaborative and Individualized Learning Environments
by Louis J KrugerUse computer technology to complement and strengthen your special education program!This book provides practical information, case examples, theory, and a critical summary of applied research about how computer technology can be used to support and improve special education and related services. With Computers in the Delivery of Special Education and Related Services, you'll learn how technology can be used to facilitate an individualized and collaborative approach to learning. Topics of discussion include innovative instruction, consultation, family collaboration, curriculum-based assessment, and professional development.Computers in the Delivery of Special Education and Related Services is a valuable resource in which special services providers can find ways to use computers to enhance individualized instruction and the problem-solving skills of their students, as well as avenues of professional collaboration and support.Computers in the Delivery of Special Education and Related Services presents thoughtful discussions that examine: how computer software can be used in the assessment of students' progress within specific curricula how students can use the Internet to discuss class projects with experts in a process known as "telementoring" how software can help a school-based consultation team through specific aspects of the problem-solving process, including data collection, intervention selection, team decision documentation, and follow-up ways to use the Internet to create new types of learning communities for students and professionals, extending Vygotsky's notion of "zone of proximal development" (ZPD) to the community level the advantages and disadvantages of using email with the intention of complementing and strengthening face-to-face collaboration the aspects of home computer use that address a student's special needs the importance of understanding the family's values, expectations, and cultural background Computers in the Delivery of Special Education and Related Services reflects the editors’hope that creative applications of technology will soon transcend the nagging stereotypes of computers (they isolate students, they're too difficult to use, that they lack the flexibility to treat people as individuals). Then computers will be viewed as partners in the process of special education--machines that enhance current practices and open new vistas for learning and education.
Computers in the Public Service (Routledge Library Editions: The Economics and Business of Technology #26)
by G. M. LambWhen this book was first published in 1973 there had been little study of the relationships between the organizational structures of public bodies and their use of information technology. This volume was therefore one of the first to describe how such strcures determine computer use, and how technology in turn influence the services provided. It also discusses the changes that computerization brought about in staffing structures and in the role of the specialist, analyses the ways in which they have modified human resource policies and practices and surveys signifcant trends in the employment and career development of IT staff.
Computers, Management and Information (Routledge Library Editions: The Economics and Business of Technology #13)
by David FirnbergOriginally published in 1973 this book discusses whether the ordinary manager can exploit the power of computers without being overwhelmed by them, a question which still has enduring relevance today. As well as discussing the massive resources which computers put at our fingertips, the pitfalls are also discussed: the danger of using computers as a scapegoat for human failure, or of sub-contracting managerial decisions to a computer system.
Computerspiele: Nutzung, Wirkung und Bedeutung (Medienwissen kompakt)
by Sven JöckelDieser Band gibt einen Überblick darüber, wie Computerspiele sich zu einem populären Massenmedium entwickeln konnten und welche Mythen über ihre individuellen und gesellschaftlichen Nutzungsweisen und Wirkungen tatsächlich von der Forschung belegt werden können (und welche nicht). Von PacMan, Space Invaders über Super Mario, Tomb Raider bis hin zu den Blockbustern Grand Theft Auto, Call of Duty oder Fortnite, aber auch zu Candy Crush und Roblox haben sich Computerspiele in den letzten gut vierzig Jahren zu einem populären und erfolgreichen Unterhaltungsmedium entwickelt. Sie sind dabei, ähnlich wie Filme oder Musik, mittlerweile zum Kulturgut geworden. Für die zweite Auflage wurde der Band überarbeitet und aktualisiert.
Computerspiele im Diskurs: Aggression, Amokläufe und Sucht
by Tobias C. Breiner Luca D. KolibiusDieses Fachbuch ist eine umfassende Abhandlung zur Debatte um die negativen Auswirkungen von Computerspielen: Aggressionen, Amokläufe und Sucht. Die kontroverse Debatte zur Beziehung zwischen Computerspielen und Aggression wird hier auf Grundlage neuster wissenschaftlicher Erkenntnisse aufgearbeitet. Darüber hinaus inspirierte die Aufnahme in die aktuellste Version des Klassifikationssystems DSM für Internet Gaming Disorder (Computerspielsucht) eine Vielzahl wissenschaftlicher Veröffentlichungen, welche hier übersichtlich zusammengetragen werden. In diesem Buch finden Sie die Antworten auf folgende Fragen: Welche Symptome machen eine Computerspielabhängigkeit aus und welche Therapiemöglichkeiten gibt es?Geht Computerspielsucht mit Veränderungen im Gehirn und der Persönlichkeit einher?Gibt es eine kausale Beziehung zwischen Computerspielen einerseits und Aggressivität und Amokläufen andererseits? Die Autoren kommen dabei nach Sichtung der Studienlage zu überraschenden Erkenntnissen. Dieses Buch unterstützt Psychologen, Psychotherapeuten, Psychiater, Pädagogen, Therapeuten, Lehrkräfte und Eltern die Welt der Computerspiele zu navigieren.
Computervision-Japan (A)
by Rowland T. Moriarty Jr.The CAD/CAM market in Japan is about to take off. Computervision wants its exclusive distributor to dramatically expand its sales and service coverage. The distributor wants a joint venture with Computervision before expanding. Several distribution alternatives (including going direct) are presented.
Computing Intelligence in Capital Market (Studies in Computational Intelligence #1154)
by Asef Yelghi Aref Yelghi Mehmet Apan Shirmohammad TavangariThe book is divided into sections according to the content of the chapters. The first section covers AI concepts with NP and financial issues. The second section covers AI techniques in relation to Fintech issues. The remaining sections are implementation and analysis. As science and technology development and algorithms are widely used in various fields, their influence and development have increased efficiency and productivity. The introduction of algorithms in the financial field has not been an exception to this. In recent years, the growth and development of the financial system have been in sync with the growth of technology. Fintechs were born at the intersection of these two sectors. What happens through the application of computer knowledge in the financial field, or the examination of the efficiency and effectiveness of their use and the interaction and combination of these two fields has been written very infrequently in the majority of books. In Fintech, there are problems that researchers focus on such as customer support, portfolio management, trading algorithms, fraud detection, credit risk assessment, insurance, and wealth management. The mentioned problems are complex and are mapped to NP problems in the field of artificial intelligence. In the last two decades, optimization algorithms, neural networks, and deep learning have been widely applied in many scientific and engineering fields to solve the mentioned problems. The purpose of this book is to provide the reader with the most used artificial intelligence methods for scientific and engineering problems. This book is used by students, scientists, and practitioners in various fields. The chapters are self-explanatory, and the reader can read each one separately. They describe the algorithm used, the chosen problem, and the implementation. In addition, practical examples, comparisons, and experimental results are presented.