Reviewers are better equipped to detect fraud than editors. [PDF]
Neveu R, Neveu A.
europepmc +1 more source
Abstract This article examines how and to what extent violence has become a pivotal tool for conducting business in places integrated into the global value chain. It also explores the roles stakeholders play in silencing workers' resistance within these places.
Shoaib Ahmed
wiley +1 more source
Sabotage, feeding and collusion after bariatric surgery. And the winner is . . .? A psychodynamic and systemic perspective on sabotage and feeding after bariatric surgery by means of a case series analysis. [PDF]
Stiefel F +4 more
europepmc +1 more source
Desired and Feared Identities and Their Role in Occupational Identity Regulation
Abstract This paper extends theory by showing how occupational identity regulation operates jointly through both desired and feared identities which, in combination, enforce normative control. Taking a narrative identity perspective and drawing on an ethnographic and interview‐based study of veterinarians, we make three principal contributions to our ...
Sarah Page‐Jones, Andrew D. Brown
wiley +1 more source
Fine-Grained Personalized Data Aggregation Scheme with High Quality and Privacy Protection. [PDF]
Xia Z, Murugesan RK.
europepmc +1 more source
Abstract Our study challenges a commonly held assumption in the legitimacy and organizational change literatures: that the legitimacy of a change project is closely tied to, and dependent upon, the legitimacy of the change agent promoting it. Drawing on an in‐depth, three‐and‐a‐half‐year qualitative study of a major transformation within a French ...
Alaric Bourgoin +2 more
wiley +1 more source
Privacy-preserving AUC computation in distributed machine learning with PHT-meDIC. [PDF]
de Arruda Botelho M +4 more
europepmc +1 more source
Organized Crime, Corruption, and Economic Growth
ABSTRACT In this paper, we study the relationship between organized crime, corruption, and economic growth on a data set from Italian regions for the period 1996–2013. Our working hypothesis is that organized crime can embezzle part of the public expenditure aimed at productive uses by threatening and bribing public officers. To assess the consequences
Tamara Fioroni +2 more
wiley +1 more source
An accurate approach to discriminate android colluded malware from single app malware using permissions intelligence. [PDF]
Mawoh RY +4 more
europepmc +1 more source
The effect of leverage manipulation on real estate firms' financial risk: Based on the interest conflicts perspective. [PDF]
Huang L, Yu L, Huang W.
europepmc +1 more source

