LEADER 03329nam 2200589 450 001 9910459920903321 005 20200520144314.0 010 $a1-60649-972-6 035 $a(CKB)3710000000279079 035 $a(CaPaEBR)ebrary10940903 035 $a(OCoLC)891187327 035 $a(CaBNVSL)swl00404012 035 $a(MiAaPQ)EBC1771353 035 $a(Au-PeEL)EBL1771353 035 $a(CaPaEBR)ebr10940903 035 $a(CaONFJC)MIL824757 035 $a(EXLCZ)993710000000279079 100 $a20140926d2014 fy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aManagerial communication /$fReginald L. Bell and Jeanette S. Martin 205 $aFirst edition. 210 1$aNew York, New York (222 East 46th Street, New York, NY 10017) :$cBusiness Expert Press,$d2014. 215 $a1 online resource (270 p.) 225 1 $aCorporate communication collection,$x2156-8170 300 $aPart of: 2014 digital library. 311 $a1-60649-973-4 320 $aIncludes bibliographical references (pages 233-245) and index. 327 $a1. The nature of managerial communication -- 2. The managerial communication process -- 3. Power, climate, and culture -- 4. Ethical issues in management communication -- 5. Conflict resolution -- 6. Communication technology -- 7. Effective presentation skills -- 8. Impression management -- 9. Employment communication -- 10. Change communication -- 11. Crisis communication -- 12. Communication audits -- About the authors -- References -- Index. 330 3 $aExplores what the communication managers actually do in business across the planning, organizing, leading, and controlling functions. The top, middle, and frontline communications in which managers engage is also discussed. All of the levels of communication (intrapersonal, interpersonal, group, organizational, and intercultural) play a role in managerial communication; therefore, these levels are explained thoroughly in Chapter 2, but are relevant in all chapters. As we expound, for example, on theories of communication we relate them to the theories of management such as crisis management, impression management, equity theory, and effective presentation skills. These are the skills that are invaluable to management; you will begin to appreciate the depth and breadth of the painstaking effort we took to explicate these important topics. Our book, therefore, brings communication to the forefront of management theory because it is our belief that management cannot function without the particular techniques of communication covered in Managerial Communication. 410 0$a2014 digital library. 410 0$aCorporate communication collection.$x2156-8170 606 $aCommunication in management 608 $aElectronic books. 610 $abusiness administration 610 $acommunication 610 $amanagement functions 610 $aprinciples 615 0$aCommunication in management. 676 $a658.45 700 $aBell$b Reginald L.$0908990 702 $aMartin$b Jeanette S. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910459920903321 996 $aManagerial communication$92225839 997 $aUNINA LEADER 03713nam 22008415 450 001 9910483736503321 005 20251226195843.0 010 $a3-642-40779-X 024 7 $a10.1007/978-3-642-40779-6 035 $a(CKB)3710000000019154 035 $a(SSID)ssj0001010857 035 $a(PQKBManifestationID)11594932 035 $a(PQKBTitleCode)TC0001010857 035 $a(PQKBWorkID)11003322 035 $a(PQKB)10094089 035 $a(DE-He213)978-3-642-40779-6 035 $a(MiAaPQ)EBC3093064 035 $a(PPN)172429978 035 $a(EXLCZ)993710000000019154 100 $a20130916d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCommunications and Multimedia Security $e14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings /$fedited by Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XIV, 249 p. 83 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8099 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-40778-1 327 $aBiometrics -- Applied cryptography -- Digital watermarking -- Steganography and forensics.- Social network privacy -- Security and authentication. 330 $aThis book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013. The 5 revised full papers presented together with 11 short papers, 5 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on biometrics; applied cryptography; digital watermarking, steganography and forensics; and social network privacy, security and authentication. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8099 606 $aData protection 606 $aBiometric identification 606 $aComputer networks 606 $aElectronic commerce 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aData and Information Security 606 $aBiometrics 606 $aComputer Communication Networks 606 $ae-Commerce and e-Business 606 $aCryptology 606 $aIT Operations 615 0$aData protection. 615 0$aBiometric identification. 615 0$aComputer networks. 615 0$aElectronic commerce. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing$xManagement. 615 14$aData and Information Security. 615 24$aBiometrics. 615 24$aComputer Communication Networks. 615 24$ae-Commerce and e-Business. 615 24$aCryptology. 615 24$aIT Operations. 676 $a005.8 702 $aDecker$b Bart de$f1958-$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDittmann$b Jana$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKraetzer$b Christian$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVielhauer$b Claus$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483736503321 996 $aCommunications and Multimedia Security$9772291 997 $aUNINA