Search results

1 – 10 of 342
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 December 2003

Abbas J. Ali, Manton Gibbs and Robert C. Camp

The subject of Jihad has been a fiercly debated topic in the past few decades. Contradictory translations have been adopted by differing religious groups and political camps. In…

931

Abstract

The subject of Jihad has been a fiercly debated topic in the past few decades. Contradictory translations have been adopted by differing religious groups and political camps. In some quarters Jihad has been associated with violence and war. Other quarters perceive the Jihad to mean a striving within oneself and the struggle for self‐improvement. In this paper, the historical and contemporary perspectives of Christianity, Judaism, and Islam regarding Jihad are outlined. The evolution of the meaning of Jihad in each religion is clarified and similarities and dissimilarities among the three religions are highlighted. Various forms of Jihad are presented. The paper, however, argues that true Jihad means an active participation in social improvement and economic development. In addition, the paper provides implications of Jihad for business and organizations.

Details

International Journal of Sociology and Social Policy, vol. 23 no. 12
Type: Research Article
ISSN: 0144-333X

Keywords

Access Restricted. View access options
Article
Publication date: 1 August 1998

Ernest‐Jan Mutsaers, Han van der Zee and Henrik Giertz

The first version of the Nolan Stages Theory appeared in 1973. It explained the dynamics of the increasingly vital production factor called IT. This theory is probably the most…

6613

Abstract

The first version of the Nolan Stages Theory appeared in 1973. It explained the dynamics of the increasingly vital production factor called IT. This theory is probably the most well‐known and most widespread framework of the development of information technology in organisations. It provides many insights in the ways in which IT has evolved and continues to evolve. Moreover, it offers both senior (business) management and IT management the possibility of directing this complex phenomenon, without immediately going into technical details. Since 1973, a number of associated articles have been published by Richard L. Nolan and a number of co‐authors. The theory has continuously been adapted to the current IT environment and has been applied by a huge number of large companies throughout the world. Proceeds with the development of the Stages Theory in order to be able to deal with the business and IT issues of the next five to ten years.

Details

Information Management & Computer Security, vol. 6 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Available. Content available
Article
Publication date: 1 December 2002

Richard Nolan

29

Abstract

Details

info, vol. 4 no. 6
Type: Research Article
ISSN: 1463-6697

Access Restricted. View access options
Article
Publication date: 1 December 1995

Richard L. Nolan

While IT has been widely used to facilitate right‐sizing, the roleof IT in the quality movement has been proven but underutilized.Companies focusing on quality to increase…

508

Abstract

While IT has been widely used to facilitate right‐sizing, the role of IT in the quality movement has been proven but underutilized. Companies focusing on quality to increase revenues have seen dramatic results, improving products and services severalfold, with half the number of employees. IT has helped those organizations design goods that are easier to manufacture, improve new product cycle time through cross‐functional integration of systems, and use electronic networks to speed up communications internally and with suppliers and customers. Yet most IT departments have been reactive rather than proactive, involved only peripherally in their organization′s total quality programmes. Quality improvement is vital to companies trying to thrive in an increasingly competitive environment, and IT must be a partner in an organization′s efforts to institutionalize quality. A business can begin this effort with several basic steps. Briefly explaining the evolution of the quality movement will help put those steps into context.

Details

Information Management & Computer Security, vol. 3 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 1 April 1992

Chun Wei Choo and Andrew Clement

Defines end user computing (EUC). Suggests a dichotomy betweeninformation systems (IS) managers and end users, both of whom wishcontrol computing resources. Reviews literature…

254

Abstract

Defines end user computing (EUC). Suggests a dichotomy between information systems (IS) managers and end users, both of whom wish control computing resources. Reviews literature concerning EUC and the stage growth model. Suggests alternative visions of the role of IS and user managements in the growth of EUC.

Details

Information Technology & People, vol. 6 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Access Restricted. View access options
Article
Publication date: 1 February 1995

Richard Nolan

Fraud, so it seems, never goes out of fashion. The United Bank of Kuwait plc advanced monies to Mr Sahib, and when the monies were not duly repaid, the Bank took proceedings to…

149

Abstract

Fraud, so it seems, never goes out of fashion. The United Bank of Kuwait plc advanced monies to Mr Sahib, and when the monies were not duly repaid, the Bank took proceedings to recover the debt due to it; it obtained judgment against Mr Sahib, and sought to enforce that judgment by obtaining a charging order over Mr Sahib's beneficial interests in two freehold properties in Hampstead. The beneficial interests existed behind statutory trusts for sale, and the trustees for sale of both properties were Mr Sahib and his wife, Mrs Hashim. In due course, charging orders were obtained and then made absolute. At this point, there arose a dispute between the United Bank of Kuwait and the Société Générate Alsacienne de Banque SA (‘Sogenal’). Sogenal claimed that it held an equitable mortgage over the interests which were the subject of the charging order, that its mortgages were created before the charging orders obtained by the United Bank of Kuwait, and that its mortgages consequently ranked in priority to the Bank's charging orders. This dispute as to priorities formed the subject of Chadwick J's decision in United Bank of Kuwait plc v Sahib.

Details

Journal of Financial Crime, vol. 3 no. 1
Type: Research Article
ISSN: 1359-0790

Access Restricted. View access options
Article
Publication date: 1 February 1983

C. Richard Roberts and Louis E. Boone

The business environment for the past quarter‐century has been characterized by increasing competition, decreasing product life cycles, and growth of industrial organizations in…

102

Abstract

The business environment for the past quarter‐century has been characterized by increasing competition, decreasing product life cycles, and growth of industrial organizations in terms of both human and physical assets. Coupled with these challenges are increased societal pressures for greater corporate accountability. In order to survive and eventually achieve myriad diverse objectives, decisionmakers are forced to extend planning horizons, introducing even greater levels of uncertainty. Moreover, the typical decision‐maker is further removed from action points, increasing the communications problem and rendering decisive management more difficult.

Details

Journal of Business Strategy, vol. 3 no. 4
Type: Research Article
ISSN: 0275-6668

Access Restricted. View access options
Article
Publication date: 1 February 1996

Richard Harwood

Enforcement of regulatory controls has traditionally been left to the criminal law. In the last 15 years there has been an increasing interest in using civil remedies for this…

94

Abstract

Enforcement of regulatory controls has traditionally been left to the criminal law. In the last 15 years there has been an increasing interest in using civil remedies for this purpose. Most of the attention has been on financial services, but there have been recent developments in the UK planning system, which provide interesting parallels.

Details

Journal of Financial Crime, vol. 3 no. 4
Type: Research Article
ISSN: 1359-0790

Access Restricted. View access options
Article
Publication date: 1 March 1991

Michael E.D. Koenig and Marianne Broadbent

In order to manage library or information functions you must be able to persuasively communicate with your management. To accomplish this, you must communicate in the language of…

101

Abstract

In order to manage library or information functions you must be able to persuasively communicate with your management. To accomplish this, you must communicate in the language of your management, marshalling trendy and persuasive points on your own behalf With that as a given, there has been a very heartening development over the last few years for library and information managers—a burgeoning management attention to information.

Details

The Bottom Line, vol. 4 no. 3
Type: Research Article
ISSN: 0888-045X

Access Restricted. View access options
Article
Publication date: 1 March 1996

Sandeep Savla

Section 2 of the Criminal Justice Act 1987 abrogates the right to silence since a suspect is required to answer questions in pre‐trial investigations by the SFO, although the…

71

Abstract

Section 2 of the Criminal Justice Act 1987 abrogates the right to silence since a suspect is required to answer questions in pre‐trial investigations by the SFO, although the answers are inadmissible as evidence unless proceedings are brought under s. 2(14) for giving false information or by s. 2(8), where the individual ‘makes a statement inconsistent with it’. In a previous article, the writer has considered the necessity and effectiveness of s. 2 powers. It is also instructive to analyse the conceptual basis of s. 2 powers since this will aid in the interpretation of statutory ambiguities and will allow the courts to have a uniformity of approach when seeking to resolve the statutory ambiguities. The conceptual basis is also important as concerns the resolution of where the line lies between the effective investigation of offences pursuant to s. 2 and the rights of the individual subject to such questioning. A critical examination of the above issues demands steering a careful course between normative rules and theory: in this area above all others it is impossible and undesirable to divorce one from the other.

Details

Journal of Financial Crime, vol. 4 no. 1
Type: Research Article
ISSN: 1359-0790

1 – 10 of 342
Per page
102050