The technologies of the Internet have exerted an enormous influence on the way we live and work. This volume in the "Advances in Management Information Systems" series presents cutting-edge research on the transformation of the workplace by the use of these information technologies. The book focuses first on the deleterious transformations (such as "cyberloafing"), then the promising ones (such as the emergence of virtual teams), and then the ways the troubling transformations can be redeemed for organizational benefit. The editors overlay IT topics with insights from organizational behavior, human resource management, organizational justice, and global culture.
Describes the changes brought on by computers, detailing the ways in which workplaces in various industries have been affected and the new skills that employees must now acquire as a result of ever-evolving technology.
Consumer Management in the Internet Age: How Customers Became Managers in the Modern Workplace analyzes online consumer management, a practice in which customers monitor, report on, and—sometimes unwittingly—discipline workers through writing and posting online reviews. Based on case studies of the websites Yelp and Rate My Professors (RMP), Joshua Sperber analyzes how online reviewing, a popular contemporary hobby, tells us much about the collapse of the barriers separating work and leisure as well as our need for collective purpose and community wherever we can find it. This book explores the economic implications of online reviews, as reviews provide both valuable free content for websites and surveillance of, respectively, restaurant servers and college instructors.
"This book offers a complete look into the field of cyber behavior, surveying case studies, research, frameworks, techniques, technologies, and future developments relating to the way people interact and behave online"--Provided by publisher.
"Covering the impact of domestic and international Internet abuse on individuals, groups, organizations, and societies, this research-based book focuses on the phenomenon of Internet abuse and its consequences for an increasingly technology-driven world. Online shopping, Internet gambling, telecommuting, and e-business practices are discussed with emphases on workplace behaviors and abuses. Web management techniques and legal risks are addressed to provide solutions and policing strategies."
The transformational technologies of the Internet-Web compound continue to exert a vast and readily apparent influence on the way we live and work. In recent times, internet penetration is now very high in most parts of the world, impacting the context and content of the workplace and the boundary between work and private life is even more porous. Not only has the reach increased, but the technologies to access the Internet-Web have further evolved towards increasing portability. The hardware evolution from desktops to laptops to mobile technologies (phones, tablets, watches, eyeglasses) marches forward. The increasing mobility and 24/7 accessibility offers the opportune time to revisit the transformations occurring. Today the Internet consists of billions of digital devices, people, services and other physical objects with the potential to seamlessly connect, interact and exchange information about themselves and their environment. Organizations now use these digital devices and physical objects to produce and consume Internet-based services. This new Internet ecosystem is commonly referred to as the Internet of People, Things and Services (IoPTS). In this follow-up to their 2006 volume, Simmers & Anandarajan examine how The Internet of People, Things and Services (IoPTS) transforms our workplaces. Information and communications technology (ICT) expansion from desktops to laptops to ubiquitous smart objects that sense and communicate directly over the internet – the IoPTS - offers us the opportune time to revisit how the Internet transforms our workplaces.
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
Readings in Virtual Research Ethics: Issues and Controversies provides an in-depth look at the emerging field of online research and the corresponding ethical dilemmas associated with it. Issues related to traditional research ethics such as autonomy or respect for persons, justice, and beneficence are extended into the virtual realm and such areas as subject selection and recruitment, informed consent, privacy, ownership of data, and research with minors, among many others are explored in the media and contexts of email surveys and interviews, synchronous chat, virtual ethnography, asynchronous discussion lists, and newsgroups.