Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Crowdsourcing: One Step Beyond

Buy

Crowdsourcing is a relatively recent phenomenon that only appeared in 2006, but it continues to grow and diversify (crowdfunding, crowdcontrol, etc.). This book aims to review this concept and show how it leads to the creation of value and new business opportunities.
Chapter 1 is based on four examples: the online-banking sector, an informative television channel, the postal sector and the higher education sector. It shows that in the current context, for a company facing challenges, the crowd remains an untapped resource. The next chapter presents crowdsourcing as a new form of externalization and offers definitions of crowdsourcing. In Chapter 3, the authors attempt to explain how a company can create value by means of a crowdsourcing operation. To do this, authors use a model linking types of value, types of crowd, and the means by which these crowds are accessed.
Chapter 4 examines in detail various forms that crowdsourcing may take, by presenting and discussing ten types of crowdsourcing operation. In Chapter 5, the authors imagine and explore the ways in which the dark side of crowdsourcing might be manifested and Chapter 6 offers some insight into the future of crowdsourcing.

Contents

1. A Turbulent and Paradoxical Environment.
2. Crowdsourcing: A New Form of Externalization.
3. Crowdsourcing and Value Creation.
4. Forms of Crowdsourcing.
5. The Dangers of Crowdsourcing.
6. The Future of Crowdsourcing.

About the Authors

Jean-Fabrice Lebraty is Professor of management sciences at IAE (Business School) at Jean Moulin – Lyon 3 University in France and a member of the research laboratory Magellan EA3713. He specializes in the management of information and communication systems and his research notably concerns decision-making and the links between crowd and information technology.
Katia Lobre-Lebraty is Associate Professor of management sciences at IAE (Business School) at Jean Moulin – Lyon 3 University in France and a member of the research laboratory Magellan EA3713. She specializes in management control and strategic management and her research concerns both the modes of governance of organizations and Open Data

(HTML tags aren't allowed.)

Essential Numerical Computer Methods (Reliable Lab Solutions)
Essential Numerical Computer Methods (Reliable Lab Solutions)

The use of computers and computational methods has become ubiquitous in biological and biomedical research. During the last 2 decades most basic algorithms have not changed, but what has is the huge increase in computer speed and ease of use, along with the corresponding orders of magnitude decrease in cost.

A general perception...

IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data
IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data

Implement an Effective Security Metrics Project or Program

IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the...

Post-Modern Algebra (Pure and Applied Mathematics: A Wiley Series of Texts, Monographs and Tracts)
Post-Modern Algebra (Pure and Applied Mathematics: A Wiley Series of Texts, Monographs and Tracts)

Advanced algebra in the service of contemporary mathematical research-- a unique introduction.

This volume takes an altogether new approach to advanced algebra. Its intriguing title, inspired by the term postmodernism, denotes a departure from van der Waerden's Modern Algebra--a book that has dominated the field for
...


Twitter Marketing For Dummies
Twitter Marketing For Dummies
Greetings, and welcome to Twitter Marketing For Dummies. You have officially entered into the joyous world of marketing on Twitter. If you want to think about the tool in terms of celebrity, Twitter is the Oprah of social-networking sites. Twitter is huge, both in the number of users and excitement.

This
...
Web Audio API
Web Audio API

Go beyond Html5’s Audio tag and boost the audio capabilities of your web application with the Web Audio Api. Packed with lots of code examples, crisp descriptions, and useful illustrations, this concise guide shows you how to use this JavaScript Api to make the sounds and music of your games and interactive applications come...

Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types,...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy