Results 121 to 130 of about 555,615 (301)

How Do Investors React to Supplier Exploitation? Event Study and Experimental Evidence

open access: yesJournal of Operations Management, EarlyView.
ABSTRACT Supplier exploitation, including financial squeezing, payment delays, and non‐contractual demands, is a pervasive form of corporate misconduct. This multi‐method study examines how investors interpret supplier exploitation amid competing ethical and financial considerations.
Seongtae Kim, Sangho Chae, Han Kyul Oh
wiley   +1 more source

Mobile phone and e-government in Turkey: practices and technological choices at the cross-road [PDF]

open access: yes, 2008
Enhanced data services through mobile phones are expected to be soon fully transactional and embedded within future mobile consumption practices. While private services will surely continue to take the lead, others such as government and NGOs will become
Aykac, D. Selcen O.   +4 more
core  

Fritz Scheffer Under National Socialism: Assessing His Political Involvement

open access: yesJournal of Plant Nutrition and Soil Science, EarlyView.
ABSTRACT Aims This article examines the role of soil scientist Fritz Scheffer (1899–1979) under National Socialism and offers a critical assessment of his scientific, institutional, and political positioning between 1933 and 1945. It asks how Scheffer shaped his career within the tension between disciplinary specialization, political expectations, and ...
Jan Arend
wiley   +1 more source

Landscapes of violence: women surviving family violence in regional and rural Victoria [PDF]

open access: yes, 2014
In this research, family violence survivors have identified issues and barriers they have encountered, and have provided suggestions in regards to how both the criminal justice system and the broader Victorian community might assist survivors and help ...
Amanda George, Bridget Harris
core   +1 more source

Potentially morally injurious events and posttraumatic stress symptom change across the military‐to‐civilian transition: A prospective study

open access: yesJournal of Traumatic Stress, EarlyView.
Abstract This prospective study examined whether exposure to potentially morally injurious events (PMIEs), specifically self‐attributed transgressions, other‐attributed transgressions, and experiences of betrayal, predicted change in posttraumatic stress symptoms (PTSS) and reintegration difficulty during the military‐to‐civilian transition (MCT). U.S.
Walter J. Sowden   +2 more
wiley   +1 more source

DO PRIVATE SECURITY OFFICERS NEED ADDITIONAL LEGAL POWERS TO HELP POLICE REDUCE CRIME IN GAUTENG, SOUTH AFRICA?

open access: yesSouth African Crime Quarterly, 2017
There is a need for different stakeholders to work together to help the police combat crime in Gauteng, South Africa. Private security officers are usually well positioned to help combat crime because they can witness crime in areas where they are posted or are patrolling as response officers. Private security officers protect organisations (public and
openaire   +2 more sources

Fighting Cybercrime After \u3cem\u3eUnited States v. Jones\u3c/em\u3e [PDF]

open access: yes, 2013
In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no ...
Citron, Danielle Keats   +2 more
core   +1 more source

Data‐Driven Marketing Processes: A Roadmap for Big Data Analytics Adoption in a Brazilian SaaS SME

open access: yesKnowledge and Process Management, EarlyView.
ABSTRACT Small and medium‐sized enterprises (SMEs) often face unique challenges in integrating advanced digital technologies due to limited resources and organizational constraints. While much attention has been given to large firms' adoption of big data analytics (BDA) and artificial intelligence (AI), less is known about how SMEs can leverage these ...
Fabricio Venancio   +2 more
wiley   +1 more source

Disentangling public perceptions of private security: Analysing the role of legitimacy in citizens' intentions to cooperate with private security officers

open access: yes
In this exploratory presentation, a concise overview of the doctoral project will be outlined in three steps. First, a brief analysis of current research gaps will be introduced; next, a preliminary research question will be defined; and, finally, the global project outline will be presented.
openaire   +2 more sources

Home - About - Disclaimer - Privacy