Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeDegree TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceGranting InstitutionTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
264,392
result(s) for
"Information economics"
Sort by:
Agent-based models of the economy : from theories to applications
\"Agent-Based Models Of The Economy uses agent-based models for understanding a broad spectrum of economic phenomena. This book aim is twofold. First, it introduces the reader to the methodology and to the technicalities and the tools necessary to master the creation of agent-based models. Second, it presents several examples of applications to different economic phenomena where agent-based models are crucial in answering the research question and in solving practical problems emerged in business and policy domains (e.g., financial markets, cooperation dynamics, public policy evaluation). With this book, readers learn what agent-based models are and the advantages they can provide. Further, readers learn how to develop from scratch and with scientific rigor their own agent-based models for studying economic phenomena. Finally, readers find in the book several applications that can represent examples to be imitated and to be kept as reference. \"-- Provided by publisher.
Africa's Information Revolution
by
Murphy, James T
in
Economic aspects
,
Economic development -- South Africa
,
Economic development -- Tanzania
2015
Africa's Information Revolution was recently announced as the 2016 prizewinner of the Royal Academy for Overseas Sciences - congratulations to the authors James T. Murphy and Padraig Carmody!
Africa's Information Revolution presents an in-depth examination of the development and economic geographies accompanying the rapid diffusion of new ICTs in Sub-Saharan Africa.
* Represents the first book-length comparative case study ICT diffusion in Africa of its kind
* Confronts current information and communication technologies for development (ICT4D) discourse by providing a counter to largely optimistic mainstream perspectives on Africa's prospects for m- and e-development
* Features comparative research based on more than 200 interviews with firms from a manufacturing and service industry in Tanzania and South Africa
* Raises key insights regarding the structural challenges facing Africa even in the context of the continent's recent economic growth spurt
* Combines perspectives from economic and development geography and science and technology studies to demonstrate the power of integrated conceptual-theoretical frameworks
* Include maps, photos, diagrams and tables to highlight the concepts, field research settings, and key findings
Application management : challenges -- service creation -- strategies
A number of eminent authors take a look at aspects of application management from a range of practical and theoretical perspectives and present possible solutions for current challenges, demonstrating the close links between service creation and service management. Contents Cloud Computing Service Creation and Quality Management Resource and Competency Management Strategic Management Knowledge Management Target groups Application Management chiefly targets practitioners, users and decision-makers in the IT management sector. To lecturers and students of information management, business studies and related disciplines it is also of interest.
Monitoring Movements in Development Aid
by
Brit Ross Winthereik
,
Casper Bruun Jensen
in
Economic aspects
,
Economic assistance
,
Economic assistance -- Information technology
2013
InMonitoring Movements in Development Aid, Casper Jensen and Brit Winthereik consider the processes, social practices, and infrastructures that are emerging to monitor development aid, discussing both empirical phenomena and their methodological and analytical challenges. Jensen and Winthereik focus on efforts by aid organizations to make better use of information technology; they analyze a range ofdevelopment aid information infrastructurescreated to increase accountability and effectiveness. They find that constructing these infrastructures is not simply a matter of designing and implementing technology but entails forging new platforms for action that are simultaneously imaginative and practical, conceptual and technical. After presenting an analytical platform that draws on science and technology studies and the anthropology of development, Jensen and Winthereik present an ethnography- based analysis of the mutually defining relationship between aid partnerships and infrastructures; the crucial role of users (both actual and envisioned) in aid information infrastructures; efforts to make aid information dynamic and accessible; existing monitoring activities of an environmental NGO; and national-level performance audits, which encompass concerns of both external control and organizational learning.Jensen and Winthereik argue that central to the emerging movement to monitor development aid is the blurring of means and ends: aid information infrastructures are both technological platforms for knowledge about aid and forms of aid and empowerment in their own right.
Business-driven IT-wide agile (scrum) and Kanban (lean) implementation : an action guide for business and it leaders
\"This book explains how to successfully deploy Agile and Kanban on a large scale in order to increase IT delivery capabilities. It factors in change, communication, a sense of urgency, clear and measurable goals, political realities, and infrastructure needs, all of which are critical ingredients for success. Through real world examples, the authors explain how IT-wide Agile and Kanban can be implemented to the entire enterprise and IT department. The text also includes many templates for use as an on-the-job guide for business and IT leaders and their teams. \"-- Provided by publisher.
Efficient Use of Information and Social Value of Information
by
Pavan, Alessandro
,
Angeletos, George-Marios
in
Allocative efficiency
,
amplification
,
Applications
2007
This paper analyzes equilibrium and welfare for a tractable class of economies (games) that have externalities, strategic complementarity or substitutability, and heterogeneous information. First, we characterize the equilibrium use of information: complementarity heightens the sensitivity of equilibrium actions to public information, raising aggregate volatility, whereas substitutability heightens the sensitivity to private information, raising cross-sectional dispersion. Next, we define and characterize an efficiency benchmark designed to address whether the equilibrium use of information is optimal from a social perspective; the efficient use of information reflects the social value of aligning choices across agents. Finally, we examine the comparative statics of equilibrium welfare with respect to the information structure; the social value of information is best understood by classifying economies according to the inefficiency, if any, in the equilibrium use of information. We conclude with a few applications, including production externalities, beauty contests, business cycles, and large Cournot and Bertrand games.
Journal Article
The FAP model and its application in the appraisal of ICT projects
\"Various formal techniques are used for the analysis of capital projects, but are often limited by their scope and by the difficulty of interpreting the significance of the results they produce. Many perceived benefit factors are left out of existing appraisal processes because they lack precise financial quantification. Significantly revised and rewritten, based on the 2005 publication The Financial Appraisal Profile Model; this book discusses how the FAP model can present an integrated process for the appraisal of financial and strategic benefits and the assessment of risk in ICT (Information Communication Technology) project proposals. It presents a pragmatic solution to resolve many of the problems faced by organisations considering investment, not only in ICT but in all medium to large scale projects. The book demonstrates how the FAP model progresses the literature and practice of corporate finance by profiling the financial, risk and strategic elements of an investment decision. Including a review of other existing financial risk and strategic appraisal models, this book explores the perception that ICT projects have different requirements to others, and highlights important issues regarding ICT globalisation, project champions, post audits and appraisal teams. This comprehensive case-study, based on research in applying the FAP model to an ICT capital project, addresses issues such as 'groupthink' and the influence of a 'project champion' on the evaluation of capital projects. \"-- Provided by publisher.
A Review of the it Outsourcing Empirical Literature and Future Research Directions
by
Lacity, Mary C
,
Khan, Shaji
,
Yan, Aihua
in
Attributes
,
Business and Management
,
Business Information Systems
2010
An enormous amount of information has been produced about the IT outsourcing phenomenon over the last 20 years, but one has to look to the academic literature for consistent, objective, and reliable research approaches and analyses. Our review finds that, In practice, the academic literature on IT outsourcing has very much honored both rigor and relevance In the ways In which research has been conducted. Our central purpose In the review was to answer two research questions: What has the empirical academic literature found about information technology outsourcing (ITO) decisions and outcomes? What are the gaps In knowledge to consider In future ITO research? To answer these questions, we examined 164 empirical ITO articles published between 1992 and 2010 In 50 journals. Adapting a method used by Jeyaraj et al. (2006), we encapsulated this vast empirical literature on ITO In a way that was concise, meaningful, and helpful to researchers. We coded 36 dependent variables, 138 independent variables, and 741 relationships between Independent and dependent variables. By extracting the best evidence, we developed two models of outsourcing: one model addressed ITO decisions and one model addressed ITO outcomes. The model of ITO decisions includes Independent variables associated with motives to outsource, transaction attributes, client firm characteristics, and influence sources. The model of ITO outcomes includes Independent variables associated with client and supplier capabilities, relationship characteristics, contractual governance, decision characteristics, and transaction attributes. We also examined the interactions among broad categories of variables and the learning curve effects resulting from feedback loops. Overall, ITO researchers have a broad and deep understanding of ITO. However, the field continues to evolve as clients and suppliers on every inhabited continent participate actively in the global sourcing community. There is still much research yet to be done. We reviewed recent studies that have identified gaps in current knowledge and proposed future paths of research pertaining to strategic motivations, environmental influences, dynamic interactions, configurational and portfolio approaches, global destinations, emerging models, reference theory extension, and grounded theory development.
Journal Article
The art of consultative selling in IT : taking blue ocean strategy a step further
\"Companies can succeed not by battling competitors, but rather by creating \"blue oceans\" of uncontested market space. These strategic moves create a leap in value for the company, its buyers, and its employees, while unlocking new demand and making the competition irrelevant. This book defines an approach on how one can create Blue Oceans and be recognized as a 'Consultative Seller'\"-- Provided by publisher.
Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach
2007
The advent of the Internet has made the transmission of personally identifiable information more common and often unintended by the user. As personal information becomes more accessible, individuals worry that businesses misuse the information that is collected while they are online. Organizations have tried to mitigate this concern in two ways: (1) by offering privacy policies regarding the handling and use of personal information and (2) by offering benefits such as financial gains or convenience. In this paper, we interpret these actions in the context of the information-processing theory of motivation. Information-processing theories, also known as expectancy theories in the context of motivated behavior, are built on the premise that people process information about behavior-outcome relationships. By doing so, they are forming expectations and making decisions about what behavior to choose. Using an experimental setting, we empirically validate predictions that the means to mitigate privacy concerns are associated with positive valences resulting in an increase in motivational score. In a conjoint analysis exercise, 268 participants from the United States and Singapore face trade-off situations, where an organization may only offer incomplete privacy protection or some benefits. While privacy protections (against secondary use, improper access, and error) are associated with positive valences, we also find that financial gains and convenience can significantly increase individuals' motivational score of registering with a Web site. We find that benefits-monetary reward and future convenience-significantly affect individuals' preferences over Web sites with differing privacy policies. We also quantify the value of Web site privacy protection. Among U.S. subjects, protection against errors, improper access, and secondary use of personal information is worth $30.49-$44.62. Finally, our approach also allows us to identify three distinct segments of Internet users-privacy guardians, information sellers, and convenience seekers.
Journal Article