Results 51 to 60 of about 27,662 (286)

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Mediating exposure in public interactions [PDF]

open access: yes, 2013
Mobile computing and public interactions together open up a new range of challenges in interaction design. To date a very gregarious model of interaction has been assumed.
Calcraft, Paul   +5 more
core   +1 more source

Family Nicknames in Pučišća on the Island of Brač

open access: yesRasprave Instituta za Hrvatski Jezik i Jezikoslovlje, 2010
This paper discusses family nicknames in Pučišća on the island of Brač. Family nicknames, as an additional aspect of identification that developed due to the fact that numerous individuals carried the same family name, are a characteristic of Croatian ...
Domagoj Vidović
doaj  

Individual Nicknames in Kostroma Dialects: A General Motivational Overview

open access: yesВопросы ономастики
Individual nicknames, as a distinct class of onyms, serve not only a nominative function but also a descriptive one. This article explores the motivational principles underlying the attribution of such nicknames, based on data collected by the Ural ...
Elizaveta Olegovna Borisova
doaj   +1 more source

Creation of Internet Relay Chat Nicknames and Their Usage in English Chatroom Discourse [PDF]

open access: yes, 2011
In a chat discourse it is not always clear who is chatting with whom; automatic discourse analysis is especially problematic. It is important to identify the users' nicknames in the written discourse to find out the receivers of the chat messages.
Ecker, Robert
core   +3 more sources

Who gets redeployed? Inventor characteristics and resource redeployment decisions

open access: yesStrategic Management Journal, EarlyView.
Abstract Research Summary While the literature highlights the benefits of internally redeploying resources, there is less empirical guidance on which resources are most likely to be redeployed. We examine the relationship between inventor characteristics and redeployment decisions, motivated by the tension between costs and benefits of keeping a ...
Kyungsoo Kim, Isin Guler, Samina Karim
wiley   +1 more source

Spartan Daily, October 30, 2014 [PDF]

open access: yes, 2012
Volume 143, Issue 28https://scholarworks.sjsu.edu/spartandaily/1527/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core   +4 more sources

Formation of Distance‐Based Orientation: Political Identity through Relational Positioning in Israel

open access: yesSymbolic Interaction, EarlyView.
Distance‐based orientation describes how pejorative labels may serve as anchor points for political identity. Existing research on political labeling has largely emphasized stigmatization, overlooking how labels may acquire durability and orienting capacity without losing pejorative force. Drawing on publicly circulating discourse, we trace positioning
Tammar Friedman, Asaf Saadon
wiley   +1 more source

Mvskoke Personal Names

open access: yesNames, 1995
A description of the traditional structure of Creek and Seminole formal names (appellations) and nicknames illuminates the forms and frequencies of names appearing on historical censuses since the seventeenth century.
John H. Moore
doaj   +1 more source

Late medieval Maltese surnames of Arabic and Greek origin [PDF]

open access: yes, 2015
As a contribution to the historical study of Maltese and Greater Sicilian onomastics, this article is an analysis of fifteenth-century Maltese surnames of low frequency (5 or less occurrences in the militia lists of 1419 and 1480) which are of certain
Hull, Geoffrey
core  

Home - About - Disclaimer - Privacy