Skip to main content

Books in Social sciences and humanities

    • Handbook of Evaluation Methods for Health Informatics

      • 1st Edition
      • December 7, 2005
      • Jytte Brender McNair
      • English
      • Paperback
        9 7 8 0 1 2 3 7 0 4 6 4 1
      • eBook
        9 7 8 0 0 8 0 5 3 3 4 5 2
      The Handbook of Evaluation Methods for Health Informatics provides a complete compendium of methods for evaluation of IT-based systems and solutions within healthcare. Emphasis is entirely on assessment of the IT-system within its organizational environment. The author provides a coherent and complete assessment of methods addressing interactions with and effects of technology at the organizational, psychological, and social levels. It offers an explanation of the terminology and theoretical foundations underlying the methodological analysis presented here. The author carefully guides the reader through the process of identifying relevant methods corresponding to specific information needs and conditions for carrying out the evaluation study. The Handbook takes a critical view by focusing on assumptions for application, tacit built-in perspectives of the methods as well as their perils and pitfalls.
    • Multidisciplinary Approaches to Theory in Medicine

      • 1st Edition
      • Volume 3
      • December 6, 2005
      • English
      • Hardback
        9 7 8 0 4 4 4 5 1 8 0 6 4
      • Paperback
        9 7 8 0 4 4 4 5 5 0 4 1 5
      • eBook
        9 7 8 0 0 8 0 4 5 9 7 2 1
      This volume will be a collection of chapters from authors with wide experience in their research field. The purpose is to produce a coherent book that reflects the common theme of theory in medical thinking and multidisciplinary research practice. In this context "theory" relates to frameworks of concepts, facts, models etc that help to inform practitioners (clinicians, scientists and engineers) both within their own fields and as they seek to share dialogue with colleagues from other fields. Multidisciplinary Approaches to Theory in Medicine will therefore be integrative across a broad spectrum of fields within medicine. To achieve this the chapters will be associated with others in a number of meaningful ways. Each chapter will share a number of points of contact that will include at least two of the following: Similar biomedical area (e.g., immunity, neuroscience, endocrinology, pathology, oncology, haematology, …) Similar multidisciplinary theoretical contexts (e.g., modelling, analysis, description, visualization, complex systems, …) Similar multidisciplinary medical issues and questions (e.g., clinical practice, decision making, informatics, …)
    • Procurement and Financing of Motorways in Europe

      • 1st Edition
      • Volume 15
      • December 2, 2005
      • Giorgio Ragazzi + 1 more
      • English
      • Hardback
        9 7 8 0 7 6 2 3 1 2 3 2 0
      • eBook
        9 7 8 0 0 8 0 4 6 0 6 9 7
      This volume raises many challenging and controversial issues surrounding motorway procurement and finance in Europe. A somewhat surprising outcome is that a general appraisal bias can be identified in the following sense: Experts from countries which have introduced concession schemes for managing and financing of their motorways are very critical of these schemes, stressing their shortcomings and caveats. Some even conclude that public management under a regime of welfare maximisation would be desirable as a sustainable option. Experts from countries which have been sticking to public procurement and tax finance of motorways strongly attack the inefficiency of public planning regimes and the general tendency to allocate the revenues from special transport related taxes to the public budget, eventually spending them on other purposes rather than transport. A typical feature of the latter regime seems to be the chronic lack of funds for infrastructure investment. Although a single ideal country concept for motorway procurement and finance obviously cannot be identified, every paper gives some insights into possible future improvements. Therefore, beyond the rich documentation of national solutions it is the perspective on workable future concepts which makes the book a valuable guide through the jungle of manifold options for public/private partnerships.This book is a selection of papers presented to the international conference "Highways: Costs and Regulation in Europe", held in Bergamo on the 26th - 27th of November 2004. The Conference was organised by the University of Bergamo, and sponsored by the European Investment Bank.
    • Initial Public Offerings (IPO)

      • 1st Edition
      • December 2, 2005
      • Greg N. Gregoriou
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 3 2 0 5
      • Hardback
        9 7 8 0 7 5 0 6 7 9 7 5 6
      • eBook
        9 7 8 0 0 8 0 4 6 1 6 7 0
      After the cooling off of IPOs since the dot com bubble, Google has rekindled the fire for IPOs. This IPO reader contains new articles exclusive to this reader by leading academics from around the world dealing with quantitative and qualitative analyses of this increasingly popular and important area of finance. Articles address new methods of IPO performance, international IPOs, IPO evaluation, IPO underwriting, evaluation and bookbuilding. Although numerous articles are technical in nature, with econometric and statistical models, particular attention has been directed towards the understanding and the applicability of the results as well as theoretical development in this area. This reader will assist researchers, academics, and graduate students to further understand the latest research on IPOs.
    • Security Metrics Management

      • 1st Edition
      • November 30, 2005
      • Gerald L. Kovacich
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 3 1 5 1
      • Hardback
        9 7 8 0 7 5 0 6 7 8 9 9 5
      • eBook
        9 7 8 0 0 8 0 4 9 2 2 6 1
      Security metrics is the application of quantitative, statistical, and/or mathematical analyses to measuring security functional trends and workload. In other words, tracking what each function is doing in terms of level of effort (LOE), costs, and productivity. Security metrics management is the managing of an assets protection program and related security functions through the use of metrics. It can be used where managerial tasks must be supported for such purposes as supporting the security professional’s position on budget matters, justifying the cost-effectiveness of decisions, determining the impact of downsizing on service and support to customers, etc. Security Metrics Management is designed to provide basic guidance to security professionals so that they can measure the costs of their assets protection program - their security program - as well as its successes and failures. It includes a discussion of how to use the metrics to brief management, justify budget and use trend analyses to develop a more efficient and effective assets protection program.
    • Digital Libraries and the Challenges of Digital Humanities

      • 1st Edition
      • November 30, 2005
      • Jeffrey Rydberg-Cox
      • English
      • Hardback
        9 7 8 1 8 4 3 3 4 1 6 4 2
      • Paperback
        9 7 8 1 8 4 3 3 4 1 3 4 5
      • eBook
        9 7 8 1 7 8 0 6 3 0 8 1 6
      One of the major challenges facing librarians and curators of digital repositories are the innovative ‘born digital’ documents created by scholars in the humanities. These documents range from the parsed corpora created by linguists to traditional reference information presented in electronic databases, to rich, multi-media hypertexts combining audio, still and moving video and text, and many other sorts of material. Too often, librarians think of electronic resources solely as providing access to subscription databases. This book encourages librarians to think holistically of the life cycle of electronic resources from new items being created at their institution, to end-user access, to long term preservation of digital resources.
    • Hedge Fund Investment Management

      • 1st Edition
      • November 25, 2005
      • Izzy Nelken
      • English
      • Hardback
        9 7 8 0 7 5 0 6 6 0 0 7 5
      • Paperback
        9 7 8 0 0 8 0 9 7 3 9 8 2
      • eBook
        9 7 8 0 0 8 0 4 5 5 1 3 6
      There has been a tremendous growth in the Hedge Fund industry in recent years. It is estimated that there are more than 8000 Hedge Funds in the US alone. They have grown in popularity since the bear market of the early 2000s which convinced many people that they cannot just own stocks outright or inside mutual funds. Most investors understand mutual funds. They understand that the manager selects stocks and buys them. They also understand why they made (or lost) money in their mutual fund investments. The same thing cannot be said about Hedge Funds which come in a variety of flavors. Even savvy investors are often hard pressed to explain the sources of return on their Hedge Funds. This book should be read by anyone who has invested in, or is considering an investment in, a Hedge Fund and also by anyone who is considering starting one. The book explains the different types of funds as well as covering the key issues in every type of Hedge Fund. This book covers the entire gamut of the Hedge Fund industry. The authors explain the different styles of Hedge Funds (e.g. market neutral, convertible bond arbitrage, fixed income arbitrage and many more) and include a summary for each style of fund. The book also explains what a “fund of funds” is, and covers the recently introduced capital guarantees and describes the capital preservation concerns that are faced by investors.
    • Encyclopedia of Language and Linguistics

      • 2nd Edition
      • November 24, 2005
      • Keith Brown
      • English
      • eBook
        9 7 8 0 0 8 0 5 4 7 8 4 8
      • eBook
        9 7 8 0 0 8 0 4 4 8 5 4 1
      The first edition of ELL (1993, Ron Asher, Editor) was hailed as "the field's standard reference work for a generation". Now the all-new second edition matches ELL's comprehensiveness and high quality, expanded for a new generation, while being the first encyclopedia to really exploit the multimedia potential of linguistics.* The most authoritative, up-to-date, comprehensive, and international reference source in its field* An entirely new work, with new editors, new authors, new topics and newly commissioned articles with a handful of classic articles* The first Encyclopedia to exploit the multimedia potential of linguistics through the online edition* Ground-breaking and International in scope and approach* Alphabetically arranged with extensive cross-referencing* Available in print and online, priced separately. The online version will include updates as subjects developELL2 includes:* c. 7,500,000 words* c. 11,000 pages* c. 3,000 articles* c. 1,500 figures: 130 halftones and 150 colour* Supplementary audio, video and text files online* c. 3,500 glossary definitions* c. 39,000 references* Extensive list of commonly used abbreviations * List of languages of the world (including information on no. of speakers, languagefamily, etc.)* Approximately 700 biographical entries (now includes contemporary linguists)* 200 language maps in print and onlineAlso available online via ScienceDirect – featuring extensive browsing, searching, and internal cross-referencing between articles in the work, plus dynamic linking to journal articles and abstract databases, making navigation flexible and easy. For more information, pricing options and availability visit www.info.sciencedire...
    • Clinician's Handbook of Child Behavioral Assessment

      • 1st Edition
      • November 21, 2005
      • Michel Hersen
      • English
      • Paperback
        9 7 8 0 1 2 3 4 3 0 1 4 4
      • eBook
        9 7 8 0 0 8 0 4 9 0 6 7 0
      Given the vast amount of research related to behavioral assessment, it is difficult for clinicians to keep abreast of new developments. In recent years, there have been advances in assessment, case conceptualization, treatment planning, treatment strategies for specific disorders, and considerations of new ethical and legal issues. Keeping track of advances requires monitoring diverse resources limited to specific disorders, many of which give short shrift to child assessment, overlooking developmental considerations. Much of the existing literature is either theoretical/research in focus or clinical in nature. Nowhere are the various aspects of child behavioral assessment placed in a comprehensive research/clinical context, nor is there much integration as to conceptualization and treatment planning. The Clinician’s Handbook of Child Behavioral Assessment was created to fill this gap, summarizing critical information for child behavioral assessment in a single source. The Clinician’s Handbook of Child Behavioral Assessment provides a single source for understanding new developments in this field, cutting across strategies, techniques, and disorders. Assessment strategies are presented in context with the research behind those strategies, along with discussions of clinical utility, and how assessment and conceptualization fit in with treatment planning. The volume is organized in three sections, beginning with general issues, followed by evaluations of specific disorders and problems, and closing with special issues. To ensure cross chapter consistency in the coverage of disorders, these chapters are formatted to contain an introduction, assessment strategies, research basis, clinical utility, conceptualization and treatment planning, a case study, and summary. Special issue coverage includes child abuse assessment, classroom assessment, behavioral neuropsychology, academic skills problems, and ethical-legal issues. Suitable for beginning and established clinicians in practice, this handbook will provide a ready reference toward effective child behavioral assessment.
    • Phishing Exposed

      • 1st Edition
      • November 21, 2005
      • Dave Jevans + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 3 0 6
      • eBook
        9 7 8 0 0 8 0 4 8 9 5 3 7
      Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers.