Results 51 to 60 of about 503,340 (350)
Tax evasion and exchange equity: a reference-dependent approach [PDF]
The standard portfolio model of tax evasion with a public good produces the perverse conclusion that when taxpayers perceive the public good to be under-/overprovided, an increase in the tax rate increases/decreases evasion.
Alm, James +14 more
core +2 more sources
ABSTRACT Background Despite their increased risk for functional impairment resulting from cancer and its treatments, few adolescents and young adults (AYAs) with a hematological malignancy receive the recommended or therapeutic dose of exercise per week during inpatient hospitalizations.
Jennifer A. Kelleher +8 more
wiley +1 more source
The paper focuses on analyzing the factors affected by the execution of WTO Valuation Agreement that impact on tax compliance behavior of import and export enterprises in Vietnam by using the quantitative and qualitative methods.
Lê Thị Ánh Tuyết
doaj
ABSTRACT Bone tumours present significant challenges for affected patients, as multimodal therapy often leads to prolonged physical limitations. This is particularly critical during childhood and adolescence, as it can negatively impact physiological development and psychosocial resilience.
Jennifer Queisser +5 more
wiley +1 more source
Employee Attributions of the Why of HR Practices: Their Effects on Employee Attitudes and Behaviors, and Customer Satisfaction [PDF]
The construct of Human Resource (HR) Attributions is introduced. We argue that the attributions that employees make about the reasons why management adopts the HR practices that it does have consequences for their attitudes and behaviors, and ultimately,
Antaki +114 more
core +4 more sources
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts +8 more
wiley +1 more source
Suspicious minds: Psychological techniques correlated with online phishing attacks
Phishing remains a pervasive threat to information security, leveraging human psychology to manipulate individuals into disclosing sensitive information or performing actions against their best interests.
Ioannis Stylianou +3 more
doaj +1 more source
Protection of Whistleblowers: Experiences and Perspectives
The text provides an introduction to the issue of articles on whistle-blower protection. The articles included in the separate substantive part of the issue Studies in Grammar, Logic and Rhetoric focus on the idea of whistle-blowing, as well as on the ...
Ożóg Michał
doaj +1 more source
A descriptive review and classification of organizational information security awareness research [PDF]
Information security awareness (ISA) is a vital component of information security in organizations. The purpose of this research is to descriptively review and classify the current body of knowledge on ISA.
Hutchinson, Gershon, Ophoff, Jacques
core +2 more sources
Monitoring circulating tumor DNA (ctDNA) in patients with operable breast cancer can reveal disease relapse earlier than radiology in a subset of patients. The failure to detect ctDNA in some patients with recurrent disease suggests that ctDNA could serve as a supplement to other monitoring approaches.
Kristin Løge Aanestad +35 more
wiley +1 more source

