Working with a Personal Assistant
A truly effective assistant knows their manager's priorities, concerns and responsibilities as well as they do themselves. They know how to make their manager more effective, and how to help them add value. They work alongside their manager as part of a tight-knit, high-functioning team, sharing a single purpose and workload. Of all teams, of all w...
Information ­technology ­project managers' ­competencies
The purpose of this book is to shed light on the performance and personal competencies of information technology (IT) project managers in South Africa. Predictive models are built to determine what project managers consider the crucial competencies they should possess to deliver an IT project successfully. This investigation takes place in the cont...
Responsive Open Learning Environments
This book presents the outcomes of four years of educational research in the EU-supported project called ROLE (Responsive Online Learning Environments). ROLE technology is centered around the concept of self-regulated learning that creates responsible learners, who are capable of critical thinking and able to plan their own learning processes. ROL...
Why Knowing What To Do Is Not Enough
This book sets out to explain the reasons for the gap between "knowing" and "doing" in view of self-reliance, which is more and more often expected of citizens. In today's society, people are expected to take responsibility for their own lives and be self-reliant. This is no easy feat. They must be on constant high alert in area...
Fundamentals of Clinical Data Science
This book comprehensively covers the fundamentals of clinical data science, focusing on data collection, modelling and clinical applications. Topics covered in the first section on data collection include: data sources, data at scale (big data), data stewardship (FAIR data) and related privacy concerns. Aspects of predictive modelling using tec...
Advancing Human Assessment
​This book describes the extensive contributions made toward the advancement of human assessment by scientists from one of the world's leading research institutions, Educational Testing Service. The book's four major sections detail research and development in measurement and statistics, education policy analysis and evaluation, scientific psycho...
Fundamentals of Business
Fundamentals of Business, 2nd Edition is an 372-page open education resource intended to serve as a no-cost, faculty customizable primary text for one-semester undergraduate introductory business courses. It covers the following topics in business: Teamwork; economics; ethics; entrepreneurship; business ownership, management, and leadership; organi...
Motivation and Action
This 3rd edition provides translations of all chapters of the most recent fifth German edition of Motivation and Action, including several entirely new chapters. It provides comprehensive coverage of the history of motivation, and introduces up-to-date theories and new research findings. Early sections provide a broad introduction to, and deep unde...
Free Innovation
Free innovation is already widespread in national economies and is steadily increasing in both scale and scope. Today, tens of millions of consumers are collectively spending tens of billions of dollars annually on innovation development. However, because free innovations are developed during consumers' unpaid, discretionary time and are given away...
Vote Buying in Indonesia
Muhtadi's analysis of vote-buying in post-democratization Indonesia is original, profound, subtle, nuanced, and convincing as well as beautifully organized and well written. Equally important, its imaginative policy prescriptions will be widely read and cited as a significant contribution to the literature of comparative electoral politics. —Wil...
Delusions in Context
'This is an excellent and engaging resource on delusions. The idea that delusions should not be seen as radically different from other beliefs… is an important challenge to much contemporary thinking and practice. It should be of interest to anyone studying delusional beliefs, and to all those who aim to help people who are troubled by them.'Phil...
The Privacy Engineer's Manifesto
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of long...
How Generations Remember
This book provides a profound insight into post-war Mostar, and the memories of three generations of this Bosnian-Herzegovinian city. Drawing on several years of ethnographic fieldwork, it offers a vivid account of how personal and collective memories are utterly intertwined, and how memories across the generations are reimagined and 'rewritten' fo...
Perspectives on Nuclear Medicine for Molecular Diagnosis and Integrated Therapy
This work is devoted to understanding the recent advances in nuclear medicine and molecular imaging technologies along with their application to integrated medical therapy and future drug development. This anthology is based on the international symposium in 2015 entitled "Perspective on Nuclear Medicine for Molecular Diagnosis and Integrated ...
Intertwingled
This engaging volume celebrates the life and work of Theodor Holm "Ted" Nelson, a pioneer and legendary figure from the history of early computing. Presenting contributions from world-renowned computer scientists and figures from the media industry, the book delves into hypertext, the docuverse, Xanadu, and other products of Ted Nelson's ...
Wellbeing Economics
Economists have long sought to maximise economic growth, believing this to be their best contribution to improving human welfare. That approach is not sustainable in the face of ongoing issues such as global climate change, environmental damage, rising inequality and enduring poverty. Alternatives must be found. This book addresses that challenge....
Affect and Mathematics Education
This book, inspired by the ICME 13 topic study group "Affect, beliefs and identity in mathematics education", presents the latest trends in research in the area. Following an introduction and a survey chapter providing a concise overview of the state-of-art in the field of mathematics-related affect, the book is divided into three main se...
Societal Implications of Community-Oriented Policing and Technology
This Brief presents new approaches and innovative challenges to address bringing technology into community-oriented policing efforts. "Community-oriented policing" is an approach that encourages police to develop and maintain personal relationships with citizens and community organizations. By developing these partnerships, the goal is to...
The Ethics of Medical Data Donation
This book presents an ethical approach to utilizing personal medical data. It features essays that combine academic argument with practical application of ethical principles. The contributors are experts in ethics and law. They address the challenges in the re-use of medical data of the deceased on a voluntary basis. This pioneering study looks at ...
Lifestyle in Siberia and the Russian North
Lifestyle in Siberia and the Russian North breaks new ground by exploring the concept of lifestyle from a distinctly anthropological perspective. Showcasing the collective work of ten experienced scholars in the field, the book goes beyond concepts of tradition that have often been the focus of previous research, to explain how political, economic ...
Seeing Ourselves Through Technology: How We Use Selfies, Blogs and Wearable Devices to See and Shape Ourselves
Selfies, blogs and lifelogging devices help us understand ourselves, building on long histories of written, visual and quantitative modes of self-representations. This book uses examples to explore the balance between using technology to see ourselves and allowing our machines to tell us who we are....
Understanding Willing Participants, Volume 2
Horrified by the Holocaust, social psychologist Stanley Milgram wondered if he could recreate the Holocaust in the laboratory setting. Unabated for more than half a century, his (in)famous results have continued to intrigue scholars. Based on unpublished archival data from Milgram's personal collection, volume one of this two-volume set introduces ...
P5 eHealth: An Agenda for the Health Technologies of the Future
This open access volume focuses on the development of a P5 eHealth, or better, a methodological resource for developing the health technologies of the future, based on patients' personal characteristics and needs as the fundamental guidelines for design. It provides practical guidelines and evidence based examples on how to design, implement, use a...
Why Should I Care? Mobile Security for The Rest of Us
I've already accepted the fact that Bring-Your-Own-Device (BYOD) is a business trend that's here to stay. According to one report I recently read, just 23 percent of enterprise employees use company-sanctioned mobile devices only - meaning 77 percent of employees are using their own devices in some capacity to do their job. 1 As the Chief Informati...
Exploring Business
Exploring Business introduces students to business roles and concepts in an exciting way. This text will help you decide whether business is right for you and, if so, what areas of business you'd like to study further. Exploring Business is adapted from a work produced by a publisher who has requested that they and the original author not receiv...
Social Psychology in Action
This timely and applied textbook brings together leading scientists to illustrate how key theories and concepts in social psychology help to predict and explain behavior, and can be successfully applied to benefit social and practical problems. It focuses on robust theories and models known for their successful applications and covers a diverse ran...
The A-Z of the PhD Trajectory
This textbook is a guide to success during the PhD trajectory. The first part of this book takes the reader through all steps of the PhD trajectory, and the second part contains a unique glossary of terms and explanation relevant for PhD candidates. Written in the accessible language of the PhD Talk blogs, the book contains a great deal of practica...
Windows 10 IT Pro Essentials: Support Secrets
That group includes full-time professional trainers, of course, but it also includes IT pros and those brave souls who staff the help desk in corporations. Most of all, it includes the incredibly large population of people who have earned a reputation for being "the person who knows Windows." With that knowledge comes a seemingly endle...
Agency: Moral Identity and Free Will
There is agency in all we do: thinking, doing, or making. We invent a tune, play, or use it to celebrate an occasion. Or we make a conceptual leap and ask more abstract questions about the conditions for agency. They include autonomy and self-appraisal, each contested by arguments immersing us in circumstances we don't control. But can it be true w...
Public Speaking for Geeks Succinctly
Conferences, meet-ups, and user groups are an enormous part of both cultivating a developer community and continuing education in the industry. The stars of such events aren't the free food or the giveaways - they're the speakers, the ones who effectively and efficiently communicate something of value to attendees. In Public Speaking for Geeks Succ...
The DARPA Model for Transformative Technologies
The U.S. Defense Advanced Research Projects Agency (DARPA) has played a remarkable role in the creation new transformative technologies, revolutionizing defense with drones and precision-guided munitions, and transforming civilian life with portable GPS receivers, voice-recognition software, self-driving cars, unmanned aerial vehicles, and, most fa...
Managing Risk and Information Security
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while m...

1 2 3 4