Download Free Strategic Uses Of Social Technology Book in PDF and EPUB Free Download. You can read online Strategic Uses Of Social Technology and write the review.

On an everyday basis, we communicate with one another using various technological media, such as text messaging, social networking tools, and electronic mail, in work, educational, and personal settings. As a consequence of the increasing frequency of use and importance of computer-supported interaction, social scientists in particular have heeded the call to understand the social processes involved in such interactions. In this volume, the editors explore how aspects of a situation interact with characteristics of a person to help explain our technologically supported social interactions. The person-by-situation interaction perspective recognizes the powerful role of the situation and social forces on behavior, thought, and emotion, but also acknowledges the importance of person variables in explaining social interaction, including power and gender, social influence, truth and deception, ostracism, and leadership. This important study is of great relevance to modern readers, who are more and more frequently using technology to communicate with one another.
This book examines issues and implications of digital and social media marketing for emerging markets. These markets necessitate substantial adaptations of developed theories and approaches employed in the Western world. The book investigates problems specific to emerging markets, while identifying new theoretical constructs and practical applications of digital marketing. It addresses topics such as electronic word of mouth (eWOM), demographic differences in digital marketing, mobile marketing, search engine advertising, among others. A radical increase in both temporal and geographical reach is empowering consumers to exert influence on brands, products, and services. Information and Communication Technologies (ICTs) and digital media are having a significant impact on the way people communicate and fulfil their socio-economic, emotional and material needs. These technologies are also being harnessed by businesses for various purposes including distribution and selling of goods, retailing of consumer services, customer relationship management, and influencing consumer behaviour by employing digital marketing practices. This book considers this, as it examines the practice and research related to digital and social media marketing.
To date, a plethora of companies and organizations are investing vast amounts of money on the latest technologies. Information technology can be used to improve market share, profits, sales, competitive advantage, and customer/employee satisfaction. Unfortunately, the individuals meant to use these technologies are not well equipped on how to effectively and efficiently use these tools for competitive advantage and decision making. The Handbook of Research on IT Applications for Strategic Competitive Advantage and Decision Making is a collection of innovative research relevant to the methodologies, theoretical frameworks, and latest empirical research findings in information technology applications, strategic competitive advantage, and decision making. While highlighting topics including agility, knowledge management, and business intelligence, this book is ideally designed for information technology professionals, academics, researchers, managers, executives, and government officials interested in using information technology for strategic competitive advantage and better decision making.
Social networking venues have increased significantly in popularity in recent years. When utilized properly, these networks can offer many advantages within business contexts. Strategic Uses of Social Media for Improved Customer Retention is a pivotal reference source for the latest scholarly research on the implementation of online social networks in modern businesses and examines how such networks allow for a better understanding of clients and customers. Highlighting theoretical concepts, empirical case studies, and critical analyses, this book is ideally designed for researchers, practitioners, professionals, and upper-level students interested in improving and maintaining customer relationships.
"This book provides valuable insights into the role of the CIO, his interaction within the organization and external relationships with vendors and suppliers. It emphasizes the need for balance between management and technology in the role of CIO, and focuses on this role as an expert on information technology, and a leader in the appropriate application of IT"--Provided by publisher.
The 2008 presidential election, perhaps more so than the typical quadrennial race, will undoubtedly spawn an abundance of scholarly inquiry. The confluence of historic and peculiar features associated with the 2008 contest distinguishes it from modern campaign cycles in significant ways that provide researchers a rare opportunity to reflect on a plethora of topics. These studies are certain to provide detailed knowledge about the 2008 election in particular, and, more generally, to inform our understanding of contemporary electoral politics. The selections in this volume probe specific facets of the 2008 contest to provide in-depth analyses of key developments with respect to strategy, money and technology in the election cycle. The contributors are keen analysts of American elections and campaigns. The insights they provide grapple with key questions about the 2008 election and help to demystify aspects of the historic race. This book was published as a special issue of the Journal of Political Marketing.
This book identifies the major factors responsible for effective transfer of information and human expertise from an advanced country or a multinational corporation to the developing world.
This publication contains the policy and technical papers and the presentations made concerning valuable country experiences as well as the ministerial policy statements delivered at the special plenary session on the occasion of the WIPO High-Level Forum for Least Developed Countries (LDCs), held in Geneva on July 23 and 24, 2009. Presentations of national experiences in the successful use of intellectual property for economic growth and development in LDCs, included that of Ethiopia, in using trademarks to promote its major export commodity, coffee; of Malaysia, in using patent information for national technological capacity-building; and of South Africa, in using traditional knowledge for the generation of employment and wealth creation.
This book was written to help social work educators make pedagogically sound, rational, practical, and ethical decisions about integrating technology into their social work programs and across the curriculum. It covers a range of essential topics, from understanding digital literacy skills to ethical implications for technology in social work practice; from technology in the traditional classroom to fully online teaching environments. Case studies, real-world examples, and technology tips are part of each chapter, and checklists show how technology is integrated with the Council on Social Work Education's EPAS competencies, the NASW's Code of Ethics, and other social work practice standards and guidelines. Appendices provide a wealth of practical materials.
This book is a timely and significant examination of the role of counter-messaging via social media as a potential means of preventing or countering radicalization to violent extremism. In recent years, extremist groups have developed increasingly sophisticated online communication strategies to spread their propaganda and promote their cause, enabling messages to be spread more rapidly and effectively. Counter-messaging has been promoted as one of the most important measures to neutralize online radicalizing influences and is intended to undermine the appeal of messages disseminated by violent extremist groups. While many such initiatives have been launched by Western governments, civil society actors, and private companies, there are many questions regarding their efficacy. Focusing predominantly on efforts countering Salafi-Jihadi extremism, this book examines how feasible it is to prevent or counter radicalization and violent extremism with counter-messaging efforts. It investigates important principles to consider when devising such a program. The authors provide both a comprehensive theoretical overview and a review of the available literature, as well as policy recommendations for governments and the role they can play in counter-narrative efforts. As this is the first book to critically examine the possibilities and pitfalls of using counter-messaging to prevent radicalization or stimulate de-radicalization, it is essential reading for policy makers and professionals dealing with this issue, as well as researchers in the field.