Showing 1 - 10 of 66
Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account credentials. Phishing email prediction has drawn a lot of attention from many researchers. According to current anti-phishing...
Persistent link: https://www.econbiz.de/10009484614
this dynamical relationship between economic theory and economic reality "ideational reflexivity," and show that various … special cases of ideational reflexivity. I then argue that ideational reflexivity, pursued to its logical conclusions, raises …
Persistent link: https://www.econbiz.de/10009447870
model of reflexivity capability is a useful way to interpret practices that are undertaken in multi-partner relationships on …
Persistent link: https://www.econbiz.de/10009481556
the performance measurement framework can be used to map capabilities Malaysian construction firms have and Which they …
Persistent link: https://www.econbiz.de/10009483700
intellectual capital. The concept of reflexivity is borrowed from sociology. Reflexivity is reinterpreted as the ‘firm’s’ ability …
Persistent link: https://www.econbiz.de/10009484075
intellectual capital. The concept of reflexivity is borrowed from sociology the philosophers, Bourdieu and Giddens. Reflexivity is …
Persistent link: https://www.econbiz.de/10009484076
model developed from the social sciences theory of individual agent reflexivity was developed to explain the way in which … model of reflexivity capability is a useful way to interpret practices that are undertaken in multi partner relationships on …
Persistent link: https://www.econbiz.de/10009484077
Consumer-generated product reviews have proliferated online, driven bythe notion that consumers’ decision to purchase or not purchase aproduct is based on the positive or negative information about thatproduct they obtain from fellow consumers. Using research on informationprocessing as a...
Persistent link: https://www.econbiz.de/10009435038
In this paper we axiomatically characterize two recursive procedures for defining a social group. The first procedure starts with the set of all individuals who are defined by everyone in the society as group members, while the starting point of the second procedure is the set of all individuals...
Persistent link: https://www.econbiz.de/10009452516
Die vorliegende Arbeit gliedert sich in zwei Teile. Der erste Teil widmet sich der Fragestellung inwiefern formelle Gruppeneigentumsrechte Herkunftsgemeinschaften vor unautorisierten Verwendungen ihrer traditionellen kulturellen Ausdrucksweisen (TKAs) schützen können. Kapitel 2 und 3 führen...
Persistent link: https://www.econbiz.de/10010353224