What are the best practices for leading a workforce in which human employees have merged cognitively and physically with electronic information systems and work alongside social robots, artificial life-forms, and self-aware networks that are 'colleagues' rather than simply 'tools'? How does one manage organizational structures that span actual and virtual worlds? How are the forces of technological posthumanization transforming the theory and practice of management? This volume explores the reality that an organization's workers, managers, customers, and other stakeholders increasingly...
What are the best practices for leading a workforce in which human employees have merged cognitively and physically with electronic information system...
This volume explores the design and analysis of 'neuroprosthetic supersystems, ' or organizations whose human members have been neuroprosthetically augmented. Individual chapters present ontologies of the neuroprosthesis as a computing device and instrument of 'cyborgization'; factors affecting the deployment of posthumanizing neuroprostheses by military organizations and other early adopters; an introduction to enterprise architecture in the context of technological posthumanization; an exploration of neuroprosthetic augmentation's implications for enterprise architecture; and considerations...
This volume explores the design and analysis of 'neuroprosthetic supersystems, ' or organizations whose human members have been neuroprosthetically au...
How does one ensure information security for a computer that is entangled with the structures and processes of a human brain - and for the human mind that is interconnected with it? The need to provide information security for neuroprostheses grows as more people utilize cochlear implants, retinal prostheses, robotic prosthetic limbs, and deep brain stimulation devices. Moreover, emerging technologies for human enhancement are expected to transform users' sensory, motor, and cognitive capacities in ways that generate new 'posthumanized' sociotechnological realities. This volume investigates...
How does one ensure information security for a computer that is entangled with the structures and processes of a human brain - and for the human mind ...