Literature, Media, Information Systems


Book Description

First Published in 1997. Routledge is an imprint of Taylor & Francis, an informa company.




Literature, Media, Information Systems


Book Description

John Johnston's background combines expertise in modern literature, poststructuralist philosophy, and high technology's production. Like Kittler, he draws on historic fact, anecdote, and literature. From this vantage point he explicates the theoretical and practical consequences of Friedrich Kittler's insights into the social and psychological effects of the processes by which metaphor in one medium is made real by another.




Kittler and the Media


Book Description

With books such as Discourse Networks and Gramophone, Film, Typewriter and the collection Literature, Media, Information Systems, Friedrich Kittler has established himself as one of the world's most influential media theorists. He is also one of the most controversial and misunderstood. Kittler and the Media offers students of media theory an introduction to Kittler's basic ideas. Following an introduction that situates Kittler's work against the tumultuous background of German 20th-century history (from the Second World War and the cultural upheaval of the late 1960s to reunification), the book provides succinct summaries of Kittler's early discourse-analytical work inspired by French post-structuralism, his media-related theorising and his most recent writings on cultural techniques and the notation systems of Ancient Greece. This clear and engaging overview of a fascinating theorist will be welcomed by students and scholars alike of media, communication and cultural studies.




Fundamentals of Information Systems


Book Description

Equipping you with a solid understanding of the core principles of IS and how it is practiced, the brief FUNDAMENTALS OF INFORMATION SYSTEMS, 8E covers the latest developments from the field and their impact on the rapidly changing role of today's IS professional. A concise nine chapters, this streamlined book includes expansive coverage of mobile solutions, energy and environmental concerns, cloud computing, IS careers, virtual communities, global IS work solutions, and social networking. You learn firsthand how information systems can increase profits and reduce costs as you explore new information on e-commerce and enterprise systems, artificial intelligence, virtual reality, green computing, and other issues reshaping the industry. The book also introduces the challenges and risks of computer crimes, hacking, and cyberterrorism. A long-running example illustrates how technology was used in the design, development, and production of this book. No matter where your career path may lead, FUNDAMENTALS OF INFORMATION SYSTEMS, 8E can help you maximize your success as an employee, a decision maker, and a business leader.




Information Systems Theory


Book Description

The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. Specifically, it aims to focus on the following key objectives: To describe the various theories and models applicable to studying IS/IT management issues. To outline and describe, for each of the various theories and models, independent and dependent constructs, reference discipline/originating area, originating author(s), seminal articles, level of analysis (i.e. firm, individual, industry) and links with other theories. To provide a critical review/meta-analysis of IS/IT management articles that have used a particular theory/model. To discuss how a theory can be used to better understand how information systems can be effectively deployed in today’s digital world. This book contributes to our understanding of a number of theories and models. The theoretical contribution of this book is that it analyzes and synthesizes the relevant literature in order to enhance knowledge of IS theories and models from various perspectives. To cater to the information needs of a diverse spectrum of readers, this book is structured into two volumes, with each volume further broken down into two sections. The first section of Volume 1 presents detailed descriptions of a set of theories centered around the IS lifecycle, including the Success Model, Technology Acceptance Model, User Resistance Theories, and four others. The second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, Portfolio Theory, Discrepancy Theory Models, and eleven others. The first section of Volume 2 concerns socio-psychological theories. These include Personal Construct Theory, Psychological Ownership, Transactive Memory, Language-Action Approach, and nine others. The second section of Volume 2 deals with methodological theories, including Critical Realism, Grounded Theory, Narrative Inquiry, Work System Method, and four others. Together, these theories provide a rich tapestry of knowledge around the use of theory in IS research. Since most of these theories are from contributing disciplines, they provide a window into the world of external thought leadership.




Information Systems Theory


Book Description

The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. Specifically, it aims to focus on the following key objectives: To describe the various theories and models applicable to studying IS/IT management issues. To outline and describe, for each of the various theories and models, independent and dependent constructs, reference discipline/originating area, originating author(s), seminal articles, level of analysis (i.e. firm, individual, industry) and links with other theories. To provide a critical review/meta-analysis of IS/IT management articles that have used a particular theory/model. To discuss how a theory can be used to better understand how information systems can be effectively deployed in today’s digital world. This book contributes to our understanding of a number of theories and models. The theoretical contribution of this book is that it analyzes and synthesizes the relevant literature in order to enhance knowledge of IS theories and models from various perspectives. To cater to the information needs of a diverse spectrum of readers, this book is structured into two volumes, with each volume further broken down into two sections. The first section of Volume 1 presents detailed descriptions of a set of theories centered around the IS lifecycle, including the Success Model, Technology Acceptance Model, User Resistance Theories, and four others. The second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, Portfolio Theory, Discrepancy Theory Models, and eleven others. The first section of Volume 2 concerns socio-psychological theories. These include Personal Construct Theory, Psychological Ownership, Transactive Memory, Language-Action Approach, and nine others. The second section of Volume 2 deals with methodological theories, including Critical Realism, Grounded Theory, Narrative Inquiry, Work System Method, and four others. Together, these theories provide a rich tapestry of knowledge around the use of theory in IS research. Since most of these theories are from contributing disciplines, they provide a window into the world of external thought leadership.




Gramophone, Film, Typewriter


Book Description

On history of communication







Privacy in Context


Book Description

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information. Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.




Media Studies


Book Description

Why are some people more capable than others? What are the reasons for someone gaining unusual abilities or special expertise, or being especially creative? What has to happen in order for a young person to become a child prodigy or genius? How can we help today's children to reach high levels of ability, and to shine in the arts or the sciences, in sports or games, or to excel in other fields of expertise? The Psychology of High Abilities explains how, when, and why people acquire such special expertise, and illuminates ways to make it possible for larger numbers of young people to extend their capabilities. Examining how and why people differ in their capabilities, it investigates the actual causes underlying impressive accomplishments and achievements. The volume reveals the kinds of influences that contribute to high abilities and provides practical insights into the most effective ways for extending the abilities of young people and creating higher levels of expertise.