Search results for "Computer network"
showing 10 items of 1634 documents
Assessing the Effect of the Economy for the Common Good System on Business Performance
2023
Extant literature has pointed to organizational hybridity to lever sustainable business transformation. Moreover, some authors hold that there is a possible trade-off between sustainability and performance. However, there is still little empirical evidence on the impact that such sustainability-driven hybridization systems have on performance. Thus, the present study’s main goal is to fill this gap by providing empirical evidence on the impact of the implementation of the Economy for the Common Good, as a sustainability-driven organizational system, on business performance. To do so, the authors relied on a sample of 206 businesses from five European countries. Then, the authors follo…
A World without Islam
2012
Conflictive Touring
2015
Problems to understand social phenomenon associates to our misconceptions, stereotypes and prejudices imposed during our early socialization. This happens not only with tourism which is valorized as a right of all citizens in modern societies, but also with terrorism, judged as the main threat of West. However, what would happen if both would be different sides of the same coin? This essay review explores the roots of tourism and terrorism during the process of unionization in US. What on one hand resulted in a hyper-mobile process that shore up tourism, on another was a desesperate attempt to struggle against terrorism. In this vein, it is safe to say that tourism is terrorism by other mea…
Violencia de Estado, guerra, resistencia. Por una nueva política de la Izquierda
2011
Survival analysis of author keywords: An application to the library and information sciences area
2020
[EN] Our purpose is to adapt a statistical method for the analysis of discrete numerical series to the keywords appearing in scientific articles of a given area. As an example, we apply our methodological approach to the study of the keywords in the Library and Information Sciences (LIS) area. Our objective is to detect the new author keywords that appear in a fixed knowledge area in the period of 1 year in order to quantify the probabilities of survival for 10 years as a function of the impact of the journals where they appeared. Many of the new keywords appearing in the LIS field are ephemeral. Actually, more than half are never used again. In general, the terms most commonly used in the …
Decoding the XXI Century’s Marketing Shift: An Agency Theory Framework
2016
Since the beginning of the XXI century, marketing theory has moved through a series of epistemological shifts from modern positivism to postmodern constructivism. This has resulted in a series of changes to the main concepts of “traditional” marketing such as: market, product, customer, and value. These shifts can be better viewed under a social cybernetics approach such as agency theory. This is because there is now a view that the linear concept of value creation needs to give way to the more complex process of value cocreation, where value is created collectively. Agency theory is one approach that is able to shed light on how customers and providers are able to recursively create collec…
Measuring the Change Towards More Sustainable Mobility:MUV Impact Evaluation Approach
2019
Urban areas can be considered the ground for the challenges related to the UN&rsquo
Terrorists Tend to Target Innocent Tourists
2015
Over last decades, policy makers in tourism and hospitality acknowledged that terrorism was the worse threat to tourism and West because of many reasons. Terrorism not only affects seriously economies generating unemployment and stagnation in international demand, but also triggers an escalation of violence where all advertisement efforts are backfired. Nevertheless, this essay review explores the historical roots of modern tourism and worker unions to see the point of connection between both. What beyond the boundaries of society is called terrorist attack, inside is named “strike”. This review reminds that the origin of terrorism has been coined in West, as a result of capitalism expansio…
Aligning Two Specifications for Controlling Information Security
2014
Assuring information security is a necessity in modern organizations. Many recommendations for information security management exist, which can be used to define a baseline of information security requirements. ISO/ IEC 27001 prescribes a process for an information security management system, and guidance to implement security controls is provided in ISO/IEC 27002. Finnish National Security Auditing Criteria (KATAKRI) has been developed by the national authorities in Finland as a tool to verify maturity of information security practices. KATAKRI defines both security control objectives and security controls to meet an objective. Here the authors compare and align these two specifications in…
Using stage theorizing to make anti-phishing recommendations more effective
2018
Purpose This paper aims to review the behavioral phishing literature to understand why anti-phishing recommendations are not very effective and to propose ways of making the recommendations more effective. The paper also examines how the concept of stages from health communication and psychology can be used to make recommendations against phishing more effective. Design/methodology/approach This literature review study focused on the behavioral phishing literature that has relied on human subjects. Studies were excluded for reasons that included lacking practical recommendations and human subjects. Findings The study finds that phishing research does not consider where victims are residing…