1.

Record Nr.

UNINA9910973138103321

Titolo

A game as old as empire : the secret world of economic hit men and the web of global corruption / / edited by Steven Hiatt ; introduction by John Perkins

Pubbl/distr/stampa

San Francisco, : Berrett-Koehler Publishers, Inc.

Berkeley, CA, : Publishers Group West [distributor], c2007

ISBN

9786612299629

9781282299627

128229962X

9781576757987

1576757986

Edizione

[1st ed.]

Descrizione fisica

1 online resource (321 p.)

Collana

A BK currents book

Altri autori (Persone)

HiattSteven <1948->

Disciplina

364.1/323

Soggetti

International business enterprises - Corrupt practices

Political corruption

Structural adjustment (Economic policy)

Dependency

Globalization - Social aspects

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Contents; Introduction: New Confessions and Revelations from the World of Economic Hit Men; 1 Global Empire: The Web of Control; 2 Selling Money—and Dependency: Setting the Debt Trap; 3 Dirty Money: Inside the Secret World of Offshore Banking; 4 BCCI's Double Game: Banking on America, Banking on Jihad; 5 The Human Cost of Cheap Cell Phones; 6 Mercenaries on the Front Lines in the New Scramble for Africa; 7 Hijacking Iraq's Oil Reserves: Economic Hit Men at Work; 8 The World Bank and the 100 Billion Question; 9 The Philippines, the World Bank, and the Race to the Bottom

10 Exporting Destruction11 The Mirage of Debt Relief; 12 Global Uprising: The Web of Resistance; About the Authors; Acknowledgments; Appendix: Resources of Hope; Index;



Sommario/riassunto

Exposes the secrets of a worldwide web of control, corruption, and plunder. This book tells how bigger powers operate to enrich small elite and corporate coffers while often impoverishing masses of people and creating debt and dependency that economically enslave countries for generations.

2.

Record Nr.

UNINA9910811830203321

Autore

Porter Alan L

Titolo

Tech mining : exploiting new technologies for competitive advantage / / Alan L. Porter, Scott W. Cunningham

Pubbl/distr/stampa

Hoboken, N.J., : Wiley, c2005

ISBN

9786610265480

9781280265488

1280265485

9780470357880

0470357886

9780471698456

0471698458

9780471698463

0471698466

Edizione

[1st ed.]

Descrizione fisica

1 online resource (404 p.)

Collana

Wiley series in systems engineering and management

Altri autori (Persone)

CunninghamScott W

Disciplina

005.74

Soggetti

Data mining

Technological innovations - Economic aspects

Research, Industrial

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references (p. 369-376) and index.

Nota di contenuto

TECH MINING; Table of Contents; List of Figures; Preface; Acknowledgments; Acronyms & Shorthands-Glossary; Part I. Understanding Tech Mining; 1. Technological Innovation and the Need for Tech Mining; 1.1. Why Innovation Is Significant; 1.2. Innovation Processes; 1.3. Innovation Institutions and Their Interests; 1.4.



Innovators and Their Interests; 1.5. Technological Innovation in an Information Age; 1.6. Information about Emerging Technologies; Chapter 1 Take-Home Messages; Chapter Resources; 2. How Tech Mining Works; 2.1. What Is Tech Mining?; 2.2. Why Do Tech Mining?

2.3. What Is Tech Mining's Ancestry?2.4. How To Conduct the Tech Mining Process?; 2.5. Who Does Tech Mining?; 2.6. Where Is Tech Mining Most Needed?; Chapter 2 Take-Home Messages; Chapter Resources; 3. What Tech Mining Can Do for You; 3.1. Tech Mining Basics; 3.2. Tech Mining Analyses; 3.3. Putting Tech Mining Information to Good Use; 3.4. Managing and Measuring Tech Mining; Chapter 3 Take-Home Messages; 4. Example Results: Fuel Cells Tech Mining; 4.1. Overview of Fuel Cells; 4.2. Tech Mining Analyses; 4.3. Tech Mining Results; 4.4. Tech Mining Information Processes

4.5. Tech Mining Information Products Chapter 4 Take-Home Messages; Chapter 4 Resources; 5. What to Watch for in Tech Mining; 5.1. Better Basics; 5.2. Research Profiling and Other Perspectives on the Data; 5.3. More Informative Products; 5.4. Knowledge Discovery; 5.5. Knowledge Management; 5.6. New Tech Mining Markets; 5.7. Dangers; Chapter 5 Take-Home Messages; Chapter 5 Resources; Part II. Doing Tech Mining; 6. Finding the Right Sources; 6.1. R&D Activity; 6.2. R&D Output Databases; 6.3. Determining the Best Sources; 6.4. Arranging Access to Databases; Chapter 6 Take-Home Messages

Chapter 6 Resources 7. Forming the Right Query; 7.1. An Iterative Process; 7.2. Queries Based on Substantive Terms; 7.3. Nominal Queries; 7.4. Tactics and Strategies for Query Design; 7.5. Changing the Query; Chapter 7 Take-Home Messages; 8. Getting the Data; 8.1. Accessing Databases; 8.2. Search and Retrieval from a Database; 8.3. What to Do, and Not to Do; Chapter 8 Take-Home Messages; 9. Basic Analyses; 9.1. In the Beginning; 9.2. What You Can Do with the Data; 9.3. Relations Among Documents and Terms Occurring in Their Information Fields; 9.4. Relationships; 9.5. Helpful Basic Analyses

Chapter 9 Take-Home Messages 10. Advanced Analyses; 10.1. Why Perform Advanced Analyses?; 10.2. Data Representation; 10.3. Analytical Families; 10.4 Debrand Trust Advanced Analysis Example; Chapter 10 Take-Home Messages; Chapter 10 Resources; 11. Trend Analyses; 11.1. Perspective; 11.2. An Example Time Series Description and Forecast; 11.3. Multiple Forecasts; 11.4. Research Fronts; 11.5. Novelty; Chapter 11 Take-Home Messages; Chapter 11 Resources; 12. Patent Analyses; 12.1. Basics; 12.2. Why Patent Analyses?; 12.3. Getting Started; 12.4. The "What" and "Why" of Patent Analysis

12.5. Tech Mining Patent Analysis Case Illustration: Fuel Cells

Sommario/riassunto

Tech Mining makes exploitation of text databases meaningful to those who can gain from derived knowledge about emerging technologies. It begins with the premise that we have the information, the tools to exploit it, and the need for the resulting knowledge.The information provided puts new capabilities at the hands of technology managers. Using the material present, these managers can identify and access the most valuable technology information resources (publications, patents, etc.); search, retrieve, and clean the information on topics of interest; and lower the costs and enhance the ben