LEADER 03037nam 2200493 450 001 9910792731303321 005 20170223081042.0 010 $a1-80073-008-X 024 7 $a10.1515/9781785333033 035 $a(CKB)3710000001123495 035 $a(MiAaPQ)EBC4676997 035 $a(DE-B1597)636263 035 $a(DE-B1597)9781785333033 035 $a(EXLCZ)993710000001123495 100 $a20170407h20172017 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aNarratives in the making $ewriting the East German past in the democratic present /$fAnselma Gallinat 210 1$aNew York :$cBerghahn Books,$d2017. 210 4$d©2017 215 $a1 online resource (242 pages) $cillustrations 311 $a1-78533-303-8 311 $a1-78533-302-X 320 $aIncludes bibliographical references and index. 327 $tFrontmatter -- $tContents -- $tIllustrations -- $tAcknowledgments -- $tIntroduction: Questions of Discourse, Narrative, and Memory after Fundamental Regime Change -- $tChapter One. Remembering East Germany in the United Nation: The Second German Dictatorship and Dual History -- $tChapter Two. Institutions That Write Memory: The Working Group Aufarbeitung and the Daily Paper Introduced -- $tChapter Three. Debating the Past at the Daily Paper: The East German Border Regime -- $tChapter Four. Ordering Memory for Government: Everyday Life in East Germany -- $tChapter Five. What Makes an Aufarbeiter and a Journalist? -- $tChapter Six. Democracy in Trouble: Remembering to Safeguard the Future -- $tChapter Seven. Memory for Citizenship: The Trouble with Democracy -- $tConclusion -- $tGlossary -- $tBibliography -- $tIndex 330 $aDespite the three decades that have passed since the fall of the Berlin Wall, the historical narrative of East Germany is hardly fixed in public memory, as German society continues to grapple with the legacies of the Cold War. This fascinating ethnography looks at two very different types of local institutions in one eastern German state that take divergent approaches to those legacies: while publicly funded organizations reliably cast the GDR as a dictatorship, a main regional newspaper offers a more ambivalent perspective colored by the experiences and concerns of its readers. As author Anselma Gallinat shows, such memory work?initially undertaken after fundamental regime change?inevitably shapes citizenship and democracy in the present. 606 $aAnthropology and history$zGermany 606 $aCollective memory$zGermany 607 $aGermany (East)$xHistoriography$xSocial aspects 615 0$aAnthropology and history 615 0$aCollective memory 676 $a943/.1087 686 $aNB 5550$2rvk 700 $aGallinat$b Anselma$01513358 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910792731303321 996 $aNarratives in the making$93747801 997 $aUNINA LEADER 03149nam 2200637Ia 450 001 9910783321503321 005 20230617015950.0 010 $a1-280-26708-9 010 $a9786610267088 010 $a1-4237-1030-4 010 $a1-84642-056-3 035 $a(CKB)1000000000032577 035 $a(EBL)290610 035 $a(OCoLC)171579966 035 $a(SSID)ssj0000121227 035 $a(PQKBManifestationID)11142233 035 $a(PQKBTitleCode)TC0000121227 035 $a(PQKBWorkID)10109871 035 $a(PQKB)10822523 035 $a(MiAaPQ)EBC290610 035 $a(Au-PeEL)EBL290610 035 $a(CaPaEBR)ebr10082302 035 $a(CaONFJC)MIL26708 035 $a(OCoLC)437177489 035 $a(EXLCZ)991000000000032577 100 $a20040722d2005 fy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe child's own story$b[electronic resource] $elife story work with traumatized children /$fRichard Rose and Terry Philpot ; foreword by Mary Walsh 210 $aLondon ;$aPhiladelphia $cJessica Kingsley$d2005 215 $a1 online resource (162 p.) 225 1 $aDelivering recovery 300 $aDescription based upon print version of record. 311 $a1-84985-428-9 311 $a1-84310-287-0 320 $aIncludes bibliographical references (p. 149-150) and indexes. 327 $aCover; The Child's Own Story: Life Story Work with Traumatized Children; Contents; Foreword; Preface; Introduction: No Child is an Island; 1. Who Am I? The Importance of Identity and Meaning; 2. A Tale of Two Children; 3. The Truth and Something Other Than the Truth; 4. Interviewing Art not Science; 5. Safe at Last Providing a Safe and Stable Environment; 6. Internalization Towards an Understanding; 7. Making the Book; 8. But Does It Really Work Like This?; 9. Life After Life Story; Notes; References; The Story of SACCS; The Authors; Subject Index; Author Index; 330 $aHelping traumatized children develop a narrative about their life and the lives of people closest to them, is key to their understanding and acceptance of who they are and their past experiences. The Child's Own Story is an introduction to life story work and how this effective tool can be used to help children and young people recover from abuse and make sense of a disrupted upbringing in multiple homes or families. Explaining the concepts of attachment, separation, loss and identity, the authors use these as a context to describe how to use techniques such as family trees, wallpaper work, ec 410 0$aDelivering recovery. 606 $aChild psychopathology 606 $aPost-traumatic stress disorder in children$xTreatment 615 0$aChild psychopathology. 615 0$aPost-traumatic stress disorder in children$xTreatment. 676 $a618.9'2852106 700 $aRose$b Richard$f1953-$01543424 701 $aPhilpot$b Terry$0878073 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910783321503321 996 $aThe child's own story$93796896 997 $aUNINA LEADER 13226nam 22008055 450 001 9910847079303321 005 20251225200553.0 010 $a3-031-56481-2 024 7 $a10.1007/978-3-031-56481-9 035 $a(CKB)31253139300041 035 $a(MiAaPQ)EBC31233459 035 $a(Au-PeEL)EBL31233459 035 $a(DE-He213)978-3-031-56481-9 035 $a(MiAaPQ)EBC31319662 035 $a(Au-PeEL)EBL31319662 035 $a(EXLCZ)9931253139300041 100 $a20240329d2024 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Systems $e20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, Dubai, United Arab Emirates, December 11-12, 2023, Proceedings, Part II /$fedited by Maria Papadaki, Marinos Themistocleous, Khalid Al Marri, Marwan Al Zarouni 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (347 pages) 225 1 $aLecture Notes in Business Information Processing,$x1865-1356 ;$v502 311 08$a3-031-56480-4 320 $aIncludes bibliographical references and index. 327 $aIntro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Big Data and Analytics -- Data Analytics and Data Science: Unlocking the Open Data Potential of Smart Cities -- 1 Introduction -- 2 Theoretical Assumptions -- 2.1 Open Data Background -- 2.2 Smart Cities Background -- 3 Methodology -- 4 Results -- 4.1 Related and Rising Concepts -- 4.2 Gaps and Challenges of Smart Cities Open Data Approach to Data Analytics -- 5 Conclusion, Limitations, and Future Research -- References -- Data Mesh Adoption: A Multi-case and Multi-method Readiness Approach -- 1 Introduction -- 2 Related Work -- 3 Methodological Approach -- 3.1 The TOE Framework -- 3.2 The Research Design: A Multi-case Study -- 4 Step 1: Data Mesh Survey -- 5 Step 2: Deep Dive Interviews for Data Mesh Adoption -- 6 Conclusions -- References -- Distributed Representational Analysis in Support of Multi-perspective Decision-Making -- 1 Introduction -- 2 Related Work -- 3 Theoretical Perspective -- 4 Method -- 4.1 Single Case Study -- 4.2 Data Collection -- 4.3 Data Analysis -- 5 Findings -- 5.1 User -- 5.2 Distributed Functional Analysis -- 5.3 Distributed Decision Task -- 5.4 Distributed Representational Analysis -- 6 Conclusion -- References -- Digital Services and Social Media -- Mobile Application Diffusion: An Exploration of Trust and Privacy Amongst Rural Enterprises in South Africa -- 1 Introduction -- 2 Literature Review -- 2.1 Trust Concerns Among Rural Enterprises -- 2.2 Privacy Concerns Among Rural Enterprises -- 3 Methodology -- 3.1 Selection -- 3.2 Specification -- 3.3 Summarizing -- 4 Findings -- 4.1 Implications for Rural Entrepreneurs -- 4.2 Implications for Theory -- 5 Conclusion -- References -- How Can Favorite Digital Services Enhance Users' Digital Well-Being? A Qualitative Study -- 1 Introduction -- 2 Digital Services and Digital Well-Being. 327 $a3 Methodology -- 4 Findings -- 4.1 Psychological Level -- 4.2 Social Level -- 4.3 Cognitive Level -- 5 Discussion and Conclusions -- Appendix. Participants' Background Information -- References -- Utilizing Degree Centrality Measures for Product Advertisement in Social Networks -- 1 Introduction -- 2 Related Work -- 3 Centrality Measures in Social Networks -- 3.1 Graph Representation -- 3.2 Degree -- 3.3 Centrality -- 3.4 Degree Centrality -- 3.5 Closeness Centrality -- 3.6 Betweenness Centrality -- 4 Proposed Method -- 4.1 Utilizing Degree Centrality in Social Networks for Product Advertisement: A Practical Approach -- 4.2 Assumption -- 4.3 Logistic Regression -- 5 Results -- 6 Conclusions and Future Work -- References -- Innovative Research Projects -- Business Models for Mobility Data Sharing Platforms: Stakeholders' Perceptions -- 1 Introduction -- 2 Theoretical Background -- 2.1 Mobility Data Sharing -- 2.2 Business Models -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Analysis -- 4 Findings and Discussion -- 4.1 Evaluation Criteria -- 4.2 Ranking of Business Models -- 5 Conclusion -- References -- Innovation Process Integration Challenges and Their Influence on Project Management Performance in Oil and Gas Field- A Conceptual Framework Development -- 1 Introduction -- 2 Theoretical Background -- 2.1 Literature Review Background -- 2.2 Innovation Concept and Process -- 2.3 Innovation Theories and Models -- 2.4 Individual Behavior Acceptance -- 3 Research Framing -- 3.1 Theoretical Framework -- 3.2 Conceptual Framework -- 4 Discussion -- 5 Conclusion -- References -- The Role of Adaptive and Transformational Leadership in the Successful Adoption and Implementation of New Technologies and Innovations in Organizations -- 1 Introduction -- 1.1 Aim of the Research -- 1.2 Research Questions -- 2 Literature Review and Related Theories. 327 $a2.1 Transformational Leadership -- 2.2 Adaptive Leadership -- 2.3 The Unified Theory of Acceptance and Use of Technology (UTAUT) -- 3 Conceptual Model -- 4 Methodology -- 4.1 Limitations and Recommendation for Further Research -- 5 Discussion -- 6 Conclusion -- References -- Managing Information Systems -- Information and Communication Technology Enabled Collaboration: Understanding the Critical Role of Computer Collective-Efficacy -- 1 Introduction -- 2 Theory -- 2.1 Social Cognitive Theory -- 2.2 Self-efficacy -- 3 Collective Efficacy -- 3.1 Collective Efficacy Assessment -- 4 Computer Collective-Efficacy -- 4.1 Computer Collective-Efficacy - Nomological Network -- 4.2 Measuring Computer Collective-Efficacy -- 5 General Discussion -- 6 Theoretical and Practical Implications -- 6.1 Theoretical Implications -- 6.2 Practical Implications -- 7 Conclusion -- Appendix -- References -- Communication is Key: A Systematic Literature Review of Transformation Competencies -- 1 Introduction -- 2 Theoretical Background -- 2.1 Organizational Transformation -- 2.2 The Concept of Competency -- 3 Research Design -- 3.1 Systematic Literature Review -- 3.2 Identification of Transformation Competencies -- 4 Findings -- 4.1 Sample Characteristics -- 4.2 Transformation Competencies -- 5 Discussion -- 5.1 Relevance of the Topic -- 5.2 Research Focus of the Studies -- 5.3 Competency Data Sources -- 5.4 Understanding of Competencies -- 5.5 Understanding of Transformation -- 5.6 Identified Transformation Competencies -- 6 Conclusion, Limitations, and Research Agenda -- References -- Evaluating the Success of Digital Transformation Strategy in Greek SMEs -- 1 Introduction -- 2 Theoretical Background -- 2.1 IS Strategizing and Organizational Issues -- 2.2 The Role of Practice in IS Strategizing -- 2.3 IS Strategizing and Success -- 3 Methodology -- 4 Results -- 5 Discussion. 327 $a6 Conclusions -- References -- Managing IS Adoption Challenges in Emerging Technologies: A Longitudinal Case Study of Financial Management Services Automation in a Medium-Sized Enterprise -- 1 Introduction -- 2 Adopting Robotic Process Automation in Organizations -- 3 Technology Adoption and Resistance to Change -- 4 Data Gathering and Analysis -- 5 Findings -- 5.1 Fear Fades Over Time, and Resistance Becomes More of a Principle -- 5.2 Success Stories Support Positive Attitude Towards Automation -- 5.3 Adopting Several Automation Technologies Supports Overall Rate of Automation but Lowers Adoption Rate of RPA -- 5.4 Dithering with Implementations Caused by Lack of Feasible Business Cases -- 5.5 Main Challenges Culminate in a Lack of Resources -- 6 Conclusion, Recommendations, and Limitations -- Appendix A DCP2 Interviews -- Appendix B Restraints, Challenges and Accelerators of Adoption: Summary of Harmonized Open Coding Within Key-Themes in DCP2 -- References -- Factors Amplifying or Inhibiting Cyber Threat Intelligence Sharing -- 1 Introduction -- 2 Related Work -- 2.1 Overview of Cyber Threat Intelligence Sharing -- 2.2 Cyber Security Frameworks -- 2.3 Cyber Threat Intelligence Sharing Platforms -- 3 Methodology -- 3.1 Research Site -- 3.2 Data Collection -- 3.3 Data Analysis -- 4 Findings -- 4.1 Factors for Enthusiastic Cyber Threat Intelligence Sharing -- 4.2 Factors for Circumstantial Cyber Threat Intelligence Sharing -- 4.3 Factors Preventing Cyber Threat Intelligence Sharing -- 5 Discussion -- 6 Conclusion -- References -- Empirical Investigation of Practitioners' Perceptions of Agile Testing Coordination in Medical Information Systems Development -- 1 Introduction -- 2 Related Work -- 2.1 Overview of Agile Practice -- 2.2 Software Testing in Medical Information Systems Development -- 3 Method -- 3.1 Research Sites -- 3.2 Data Collection. 327 $a3.3 Data Analysis -- 4 Findings -- 4.1 Tailoring Agile Testing in Medical Information Systems Development -- 4.2 Unit Testing in Medical Information Systems Development -- 4.3 Integration Testing in Medical Information Systems Development -- 4.4 Coordination Among Testing Practitioners -- 5 Discussion -- 5.1 Practitioners' Perceptions of Agile Testing Practice in Medical Software Development (RQ1) -- 5.2 Coordination Among Practitioners to Enhance Quality Testing in Agile Software Processes (RQ2) -- 6 Conclusion -- References -- Assessing Main Factors Adopted within the EU Harmonised Online Public Engagement (EU HOPE) -- 1 Introduction -- 2 Methodology -- 3 Europe Closer to Citizens -- 3.1 Bottom-Up Approach (Intersubjective Management) -- 4 The Necessity of Harmonised Online Public Engagement (EU HOPE) -- 4.1 Digital Innovation Factors Within the EU HOPE -- 4.2 Digital Participatory Platforms (DPP) -- 4.3 Intersubjective Agreements of Actors -- 5 Single Digital Gateway, A Harmonised Cross-Border Solution -- 6 Cross-Borders Pilot Studies -- 6.1 Cross-Border Data Flow in The Digital Single Market: Study on Data Location Restrictions -- 6.2 European Experience of Citizens' Participation in Cross-Border Governance -- 6.3 Cross-Border Cooperation (CBC) in Southern Europe-A Case Study. The Eurocity Elvas-Badajoz -- 6.4 Engaging Citizens in Cohesion Policy, DG REGIO and OECD Pilot Project Final Report -- 6.5 Flanders - The Netherlands Citizens' Panel on Addressing Cross-Border Issues and Stimulating Cross- Border Contacts -- 6.6 The 23 Citizen-Based Topics for Future EU Research - Project Names: Fostering Equal Opportunities in the Digital Era -- 7 Discussion -- 8 Conclusion -- References -- How Can Innovation Systems be Sustainable? An Approach for Organizations in Times of Crises, Alongside Economic and Information Technology Issues -- 1 Introduction. 327 $a2 Research Method. 330 $aThis book constitutes selected papers from the 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, which was held in Dubai, UAE, during December 11-12, 2023. EMCIS covers technical, organizational, business, and social issues in the application of information technology and is dedicated to the definition and establishment of Information Systems (IS) as a discipline of high impact for IS professionals and practitioners. It focuses on approaches that facilitate the identification of innovative research of significant relevance to the IS discipline following sound research methodologies that lead to results of measurable impact. The 43 papers presented in this volume were carefully reviewed and selected from a total of 126 submissions. They were organized in topical sections as follows: Part I: Metaverse; blockchain technology and applications; digital governance; healthcare information systems; artificial intelligence; Part II: Big data and analytics; digital services and social media; innovative research projects; managing information systems; smart cities. . 410 0$aLecture Notes in Business Information Processing,$x1865-1356 ;$v502 606 $aApplication software 606 $aBusiness information services 606 $aComputer security 606 $aElectronic data processing$xManagement 606 $aBig data 606 $aSocial media 606 $aComputer and Information Systems Applications 606 $aIT in Business 606 $aPrinciples and Models of Security 606 $aIT Operations 606 $aBig Data 606 $aSocial Media 615 0$aApplication software. 615 0$aBusiness information services. 615 0$aComputer security. 615 0$aElectronic data processing$xManagement. 615 0$aBig data. 615 0$aSocial media. 615 14$aComputer and Information Systems Applications. 615 24$aIT in Business. 615 24$aPrinciples and Models of Security. 615 24$aIT Operations. 615 24$aBig Data. 615 24$aSocial Media. 676 $a005.7 702 $aPapadake?$b Maria 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910847079303321 996 $aInformation systems$9893226 997 $aUNINA