Book description
Social Software Engineering examines the field through the spectrum of social activities that now compose it. Supplying an up-to-date look at this ever-evolving field, coverage includes security, legal, and privacy issues in addition to workflow and people issues. Jessica Keyes, former managing director of R&D for the New York Stock Exchange, details the methodology needed to bring mission-critical software projects to successful conclusions. She provides readers with the understanding and tools required to develop infrastructures capable of supporting the collaborative applications that today's users require.
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents
- Preface
- Author
- Chapter 1: Why Social Networking? (1/3)
- Chapter 1: Why Social Networking? (2/3)
- Chapter 1: Why Social Networking? (3/3)
- Chapter 2: Social Networking Tools at Work (1/4)
- Chapter 2: Social Networking Tools at Work (2/4)
- Chapter 2: Social Networking Tools at Work (3/4)
- Chapter 2: Social Networking Tools at Work (4/4)
- Chapter 3: Preparing Team to Collaborate (1/5)
- Chapter 3: Preparing Team to Collaborate (2/5)
- Chapter 3: Preparing Team to Collaborate (3/5)
- Chapter 3: Preparing Team to Collaborate (4/5)
- Chapter 3: Preparing Team to Collaborate (5/5)
- Chapter 4: Knowledge Sharing and Software Engineering Teams: A Study (1/7)
- Chapter 4: Knowledge Sharing and Software Engineering Teams: A Study (2/7)
- Chapter 4: Knowledge Sharing and Software Engineering Teams: A Study (3/7)
- Chapter 4: Knowledge Sharing and Software Engineering Teams: A Study (4/7)
- Chapter 4: Knowledge Sharing and Software Engineering Teams: A Study (5/7)
- Chapter 4: Knowledge Sharing and Software Engineering Teams: A Study (6/7)
- Chapter 4: Knowledge Sharing and Software Engineering Teams: A Study (7/7)
- Chapter 5: Action Learning Teams (1/2)
- Chapter 5: Action Learning Teams (2/2)
- Chapter 6: Knowledge across Social Networks (1/3)
- Chapter 6: Knowledge across Social Networks (2/3)
- Chapter 6: Knowledge across Social Networks (3/3)
- Chapter 7: Measuring Social Software Engineering (1/5)
- Chapter 7: Measuring Social Software Engineering (2/5)
- Chapter 7: Measuring Social Software Engineering (3/5)
- Chapter 7: Measuring Social Software Engineering (4/5)
- Chapter 7: Measuring Social Software Engineering (5/5)
- Chapter 8: Social Engineering Paradigm Remixed (1/3)
- Chapter 8: Social Engineering Paradigm Remixed (2/3)
- Chapter 8: Social Engineering Paradigm Remixed (3/3)
- Chapter 9: Mobile Social Software Engineering (1/2)
- Chapter 9: Mobile Social Software Engineering (2/2)
- Chapter 10: Legal, Privacy, and Security Issues (1/3)
- Chapter 10: Legal, Privacy, and Security Issues (2/3)
- Chapter 10: Legal, Privacy, and Security Issues (3/3)
- Appendix A: Social Software Engineering Tools (1/4)
- Appendix A: Social Software Engineering Tools (2/4)
- Appendix A: Social Software Engineering Tools (3/4)
- Appendix A: Social Software Engineering Tools (4/4)
- Appendix B: Community of Practice Practitioner’s Guide (1/14)
- Appendix B: Community of Practice Practitioner’s Guide (2/14)
- Appendix B: Community of Practice Practitioner’s Guide (3/14)
- Appendix B: Community of Practice Practitioner’s Guide (4/14)
- Appendix B: Community of Practice Practitioner’s Guide (5/14)
- Appendix B: Community of Practice Practitioner’s Guide (6/14)
- Appendix B: Community of Practice Practitioner’s Guide (7/14)
- Appendix B: Community of Practice Practitioner’s Guide (8/14)
- Appendix B: Community of Practice Practitioner’s Guide (9/14)
- Appendix B: Community of Practice Practitioner’s Guide (10/14)
- Appendix B: Community of Practice Practitioner’s Guide (11/14)
- Appendix B: Community of Practice Practitioner’s Guide (12/14)
- Appendix B: Community of Practice Practitioner’s Guide (13/14)
- Appendix B: Community of Practice Practitioner’s Guide (14/14)
- Appendix C: Knowledge Discovery Techniques (1/4)
- Appendix C: Knowledge Discovery Techniques (2/4)
- Appendix C: Knowledge Discovery Techniques (3/4)
- Appendix C: Knowledge Discovery Techniques (4/4)
- Appendix D: Staff Competency Survey (1/2)
- Appendix D: Staff Competency Survey (2/2)
- Appendix E: Behavioral Competencies (1/2)
- Appendix E: Behavioral Competencies (2/2)
- Appendix F: Balanced Scorecard Metrics (1/2)
- Appendix F: Balanced Scorecard Metrics (2/2)
- Appendix G: Glossary (1/2)
- Appendix G: Glossary (2/2)
- Appendix H: Brief EMML Reference (1/2)
- Appendix H: Brief EMML Reference (2/2)
- Appendix I: Computer Use Policy
- Appendix J: Best Practices Security Checklist (1/17)
- Appendix J: Best Practices Security Checklist (2/17)
- Appendix J: Best Practices Security Checklist (3/17)
- Appendix J: Best Practices Security Checklist (4/17)
- Appendix J: Best Practices Security Checklist (5/17)
- Appendix J: Best Practices Security Checklist (6/17)
- Appendix J: Best Practices Security Checklist (7/17)
- Appendix J: Best Practices Security Checklist (8/17)
- Appendix J: Best Practices Security Checklist (9/17)
- Appendix J: Best Practices Security Checklist (10/17)
- Appendix J: Best Practices Security Checklist (11/17)
- Appendix J: Best Practices Security Checklist (12/17)
- Appendix J: Best Practices Security Checklist (13/17)
- Appendix J: Best Practices Security Checklist (14/17)
- Appendix J: Best Practices Security Checklist (15/17)
- Appendix J: Best Practices Security Checklist (16/17)
- Appendix J: Best Practices Security Checklist (17/17)
- Appendix K: User Interface Design Guide (1/13)
- Appendix K: User Interface Design Guide (2/13)
- Appendix K: User Interface Design Guide (3/13)
- Appendix K: User Interface Design Guide (4/13)
- Appendix K: User Interface Design Guide (5/13)
- Appendix K: User Interface Design Guide (6/13)
- Appendix K: User Interface Design Guide (7/13)
- Appendix K: User Interface Design Guide (8/13)
- Appendix K: User Interface Design Guide (9/13)
- Appendix K: User Interface Design Guide (10/13)
- Appendix K: User Interface Design Guide (11/13)
- Appendix K: User Interface Design Guide (12/13)
- Appendix K: User Interface Design Guide (13/13)
- Back Cover
Product information
- Title: Social Software Engineering
- Author(s):
- Release date: April 2016
- Publisher(s): Auerbach Publications
- ISBN: 9781439853764
You might also like
book
Rethinking Productivity in Software Engineering
Get the most out of this foundational reference and improve the productivity of your software teams. …
book
JOEL ON SOFTWARE: And on Diverse and Occasionally Related Matters That Will Prove of Interest to Software Developers, Designers, and Managers, and to Those Who, Whether by Good Fortune or Ill Luck, Work with Them in Some Capacity
Joel Spolsky began his legendary web log, http://www.joelonsoftware.com, in March 2000, in order to offer insights …
book
The Wiley Blackwell Handbook of the Psychology of Training, Development, and Performance Improvement
The latest Wiley Blackwell Handbook of Organizational Psychology uses a psychological perspective, and a uniquely global …
book
Unmasking the Social Engineer: The Human Element of Security
Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element …