Results 51 to 60 of about 27,662 (286)
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
Mediating exposure in public interactions [PDF]
Mobile computing and public interactions together open up a new range of challenges in interaction design. To date a very gregarious model of interaction has been assumed.
Calcraft, Paul +5 more
core +1 more source
Family Nicknames in Pučišća on the Island of Brač
This paper discusses family nicknames in Pučišća on the island of Brač. Family nicknames, as an additional aspect of identification that developed due to the fact that numerous individuals carried the same family name, are a characteristic of Croatian ...
Domagoj Vidović
doaj
Individual Nicknames in Kostroma Dialects: A General Motivational Overview
Individual nicknames, as a distinct class of onyms, serve not only a nominative function but also a descriptive one. This article explores the motivational principles underlying the attribution of such nicknames, based on data collected by the Ural ...
Elizaveta Olegovna Borisova
doaj +1 more source
Creation of Internet Relay Chat Nicknames and Their Usage in English Chatroom Discourse [PDF]
In a chat discourse it is not always clear who is chatting with whom; automatic discourse analysis is especially problematic. It is important to identify the users' nicknames in the written discourse to find out the receivers of the chat messages.
Ecker, Robert
core +3 more sources
Who gets redeployed? Inventor characteristics and resource redeployment decisions
Abstract Research Summary While the literature highlights the benefits of internally redeploying resources, there is less empirical guidance on which resources are most likely to be redeployed. We examine the relationship between inventor characteristics and redeployment decisions, motivated by the tension between costs and benefits of keeping a ...
Kyungsoo Kim, Isin Guler, Samina Karim
wiley +1 more source
Spartan Daily, October 30, 2014 [PDF]
Volume 143, Issue 28https://scholarworks.sjsu.edu/spartandaily/1527/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core +4 more sources
Formation of Distance‐Based Orientation: Political Identity through Relational Positioning in Israel
Distance‐based orientation describes how pejorative labels may serve as anchor points for political identity. Existing research on political labeling has largely emphasized stigmatization, overlooking how labels may acquire durability and orienting capacity without losing pejorative force. Drawing on publicly circulating discourse, we trace positioning
Tammar Friedman, Asaf Saadon
wiley +1 more source
A description of the traditional structure of Creek and Seminole formal names (appellations) and nicknames illuminates the forms and frequencies of names appearing on historical censuses since the seventeenth century.
John H. Moore
doaj +1 more source
Late medieval Maltese surnames of Arabic and Greek origin [PDF]
As a contribution to the historical study of Maltese and Greater Sicilian onomastics, this article is an analysis of fifteenth-century Maltese surnames of low frequency (5 or less occurrences in the militia lists of 1419 and 1480) which are of certain
Hull, Geoffrey
core

