Part Two: Unifying Continuous Performance Management and Insider Threat Prevention Cyber Security More Books Like This

Beyond Interpretivism? New Encounters with Technology and Organization Beyond Interpretivism? New Encounters with Technology and Organization
2016
For the Love of Cybernetics For the Love of Cybernetics
2020
Heteromation, and Other Stories of Computing and Capitalism Heteromation, and Other Stories of Computing and Capitalism
2017
Culture and Computing. Design Thinking and Cultural Computing Culture and Computing. Design Thinking and Cultural Computing
2021
Subversion, Conversion, Development Subversion, Conversion, Development
2014
The Gospel of Technology The Gospel of Technology
2020
Blurring the Boundaries Through Digital Innovation Blurring the Boundaries Through Digital Innovation
2016
Future Information Society, The: Social And Technological Problems Future Information Society, The: Social And Technological Problems
2017
(Re)Searching the Digital Bauhaus (Re)Searching the Digital Bauhaus
2008
How Well Do Executives Trust Their Intuition How Well Do Executives Trust Their Intuition
2018
Personality Capture and Emulation Personality Capture and Emulation
2013
Digital Transformation and Human Behavior Digital Transformation and Human Behavior
2020
Designing Socially Embedded Technologies in the Real-World Designing Socially Embedded Technologies in the Real-World
2015
This Changes Everything – ICT and Climate Change: What Can We Do? This Changes Everything – ICT and Climate Change: What Can We Do?
2018
Deconstructing Ethnography Deconstructing Ethnography
2015