Showing 1 - 10 of 16,774
1. Attacks on IT systems: categories of motives / Georg Disterer -- 2. Wireless security / Faisal Kaleem and Kang K. Yen -- 3. Analysis, development and deployment of statistical anomaly detection techniques for real e-mail traffic / Gianluca Papaleo ... [et al.] -- 4. Forensics challenges for...
Persistent link: https://www.econbiz.de/10011727254
Persistent link: https://www.econbiz.de/10012643671
Persistent link: https://www.econbiz.de/10012289636
Persistent link: https://www.econbiz.de/10011516545
"We argue that a firm's aggregate risk is a key determinant of whether it manages its future liquidity needs through cash reserves or bank lines of credit. Banks create liquidity for firms by pooling their idiosyncratic risks. As a result, firms with high aggregate risk find it costly to get...
Persistent link: https://www.econbiz.de/10003983591
Persistent link: https://www.econbiz.de/10009526530
Persistent link: https://www.econbiz.de/10009789480
Persistent link: https://www.econbiz.de/10013373240
Success in human resource management (HRM) depends on the question of whether applied practices of HRM meet specific contingency factors and are appropriately configured. Using this argument, the present article examines HRM in professional service firms (PSFs) in pursuit of three objectives....
Persistent link: https://www.econbiz.de/10011297681
Service organizations try to control the service behavior of employees using formal guidelines, training and instructions. However, the specific actions that are performed during the service encounters are predominantly under the discretion of the individual frontline employee. Therefore, the...
Persistent link: https://www.econbiz.de/10011298188