Search results for "Computer network"

showing 10 items of 1634 documents

Assessing the Effect of the Economy for the Common Good System on Business Performance

2023

Extant literature has pointed to organizational hybridity to lever sustainable business transformation. Moreover, some authors hold that there is a possible trade-off between sustainability and performance. However, there is still little empirical evidence on the impact that such sustainability-driven hybridization systems have on performance. Thus, the present study’s main goal is to fill this gap by providing empirical evidence on the impact of the implementation of the Economy for the Common Good, as a sustainability-driven organizational system, on business performance. To do so, the authors relied on a sample of 206 businesses from five European countries. Then, the authors follo…

Information Systems and ManagementComputer Networks and CommunicationsEconomia d'empresacorporate sustainabilityÈtica empresarialsustainable business model innovationControl and Systems EngineeringModeling and Simulationeconomy for the common goodDesenvolupament sosteniblehybridization systemsSoftwareSDGsperformance
researchProduct

A World without Islam

2012

Information Systems and ManagementComputer Networks and CommunicationsHardware and ArchitectureIslamSociologyTheologyReligious studiesSafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Conflictive Touring

2015

Problems to understand social phenomenon associates to our misconceptions, stereotypes and prejudices imposed during our early socialization. This happens not only with tourism which is valorized as a right of all citizens in modern societies, but also with terrorism, judged as the main threat of West. However, what would happen if both would be different sides of the same coin? This essay review explores the roots of tourism and terrorism during the process of unionization in US. What on one hand resulted in a hyper-mobile process that shore up tourism, on another was a desesperate attempt to struggle against terrorism. In this vein, it is safe to say that tourism is terrorism by other mea…

Information Systems and ManagementComputer Networks and CommunicationsHardware and ArchitecturePolitical scienceLawTerrorismCriminologySafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Violencia de Estado, guerra, resistencia. Por una nueva política de la Izquierda

2011

Information Systems and ManagementComputer Networks and CommunicationsHardware and ArchitectureSafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Survival analysis of author keywords: An application to the library and information sciences area

2020

[EN] Our purpose is to adapt a statistical method for the analysis of discrete numerical series to the keywords appearing in scientific articles of a given area. As an example, we apply our methodological approach to the study of the keywords in the Library and Information Sciences (LIS) area. Our objective is to detect the new author keywords that appear in a fixed knowledge area in the period of 1 year in order to quantify the probabilities of survival for 10 years as a function of the impact of the journals where they appeared. Many of the new keywords appearing in the LIS field are ephemeral. Actually, more than half are never used again. In general, the terms most commonly used in the …

Information Systems and ManagementComputer Networks and CommunicationsKaplan-Meier05 social sciencesLibrary scienceBIBLIOTECONOMIA Y DOCUMENTACIONKeywordsThesaurusLibrary and Information SciencesBibliometricsSurvival analysis050905 science studiesInformation scienceBibliometricsSociology0509 other social sciences050904 information & library sciencesMATEMATICA APLICADAInformation Systems
researchProduct

Decoding the XXI Century’s Marketing Shift: An Agency Theory Framework

2016

Since the beginning of the XXI century, marketing theory has moved through a series of epistemological shifts from modern positivism to postmodern constructivism. This has resulted in a series of changes to the main concepts of “traditional” marketing such as: market, product, customer, and value. These shifts can be better viewed under a social cybernetics approach such as agency theory. This is because there is now a view that the linear concept of value creation needs to give way to the more complex process of value cocreation, where value is created collectively. Agency theory is one approach that is able to shed light on how customers and providers are able to recursively create collec…

Information Systems and ManagementComputer Networks and CommunicationsPrincipal–agent problemvalue cocreationlcsh:TA168eigenformValue cocreationConstructivism (philosophy of education)lcsh:Technology (General)0502 economics and businessCyberneticsMarketing theoryagency theoryproductSociologyMarketingmarket05 social sciencesPostmodernismlcsh:Systems engineeringControl and Systems EngineeringcustomerModeling and Simulationlcsh:T1-995050211 marketingvalue cocreation; agency theory; market; customer; product; eigenform; marketing theorySettore SECS-P/08 - Economia E Gestione Delle ImpresePositivismmarketing theory050203 business & managementSoftwareDecoding methodsSystems
researchProduct

Measuring the Change Towards More Sustainable Mobility:MUV Impact Evaluation Approach

2019

Urban areas can be considered the ground for the challenges related to the UN&rsquo

Information Systems and ManagementComputer Networks and CommunicationsProcess (engineering)Impact evaluationimpact evaluation0211 other engineering and technologies02 engineering and technologylcsh:TA16812. Responsible consumptionbehavioral changeimpact indicatorsOrder (exchange)Human settlementlcsh:Technology (General)11. Sustainability0502 economics and businessSettore ICAR/13 - Disegno IndustrialeSociologyEnvironmental planning021106 design practice & managementSustainable developmentimpact assessmentImpact assessmentsustainable mobility05 social sciencesimpact indicatorsustainable development goalsWork (electrical)behavioural changelcsh:Systems engineering13. Climate actionControl and Systems Engineeringurban mobilityModeling and SimulationScalabilitylcsh:T1-995agenda 2030050203 business & managementSoftware
researchProduct

Terrorists Tend to Target Innocent Tourists

2015

Over last decades, policy makers in tourism and hospitality acknowledged that terrorism was the worse threat to tourism and West because of many reasons. Terrorism not only affects seriously economies generating unemployment and stagnation in international demand, but also triggers an escalation of violence where all advertisement efforts are backfired. Nevertheless, this essay review explores the historical roots of modern tourism and worker unions to see the point of connection between both. What beyond the boundaries of society is called terrorist attack, inside is named “strike”. This review reminds that the origin of terrorism has been coined in West, as a result of capitalism expansio…

Information Systems and ManagementComputer Networks and Communicationsbusiness.industrymedia_common.quotation_subjectCapitalismEconomyHardware and ArchitectureHospitalityPolitical sciencePolitical economyTerrorismUnemploymentSafety Risk Reliability and QualitybusinessSafety ResearchSoftwareTourismmedia_commonInternational Journal of Cyber Warfare and Terrorism
researchProduct

Aligning Two Specifications for Controlling Information Security

2014

Assuring information security is a necessity in modern organizations. Many recommendations for information security management exist, which can be used to define a baseline of information security requirements. ISO/ IEC 27001 prescribes a process for an information security management system, and guidance to implement security controls is provided in ISO/IEC 27002. Finnish National Security Auditing Criteria (KATAKRI) has been developed by the national authorities in Finland as a tool to verify maturity of information security practices. KATAKRI defines both security control objectives and security controls to meet an objective. Here the authors compare and align these two specifications in…

Information Systems and ManagementComputer Networks and Communicationsinformation securitysecurity specification alignmentComputer securitycomputer.software_genreSecurity information and event managementInformation security auditKATAKRIsecurity managementSafety Risk Reliability and Qualitysecurity audit criteriaInformation security management systemta113Certified Information Security ManagerInformation securitySecurity controlsISO/IEC 27001ISO/IEC 27002ITIL security managementRisk analysis (engineering)Security servicesecurity cerificationHardware and ArchitectureBusinessSafety ResearchcomputerSoftwaresecurity controls
researchProduct

Using stage theorizing to make anti-phishing recommendations more effective

2018

Purpose This paper aims to review the behavioral phishing literature to understand why anti-phishing recommendations are not very effective and to propose ways of making the recommendations more effective. The paper also examines how the concept of stages from health communication and psychology can be used to make recommendations against phishing more effective. Design/methodology/approach This literature review study focused on the behavioral phishing literature that has relied on human subjects. Studies were excluded for reasons that included lacking practical recommendations and human subjects. Findings The study finds that phishing research does not consider where victims are residing…

Information Systems and ManagementInterviewComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subjectInternet privacystage theories02 engineering and technologyvaiheteoriatuhritManagement Information SystemsOriginality020204 information systemsManagement of Technology and Innovation0502 economics and business0202 electrical engineering electronic engineering information engineeringEmpirical evidenceverkkourkintaHealth communicationmedia_commonbusiness.industry05 social sciencesPhishingStage theoryHealth psychologykohdeviestintäCategorizationbusiness050203 business & managementSoftwareInformation Systems
researchProduct