Search results

1 – 10 of 280
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 February 1985

Robert H. Hacker

Japan is an enormous potential market for U.S. exports. Yet many companies fail in their attempts to tap this market. The author examines the reasons for failure and offers some…

230

Abstract

Japan is an enormous potential market for U.S. exports. Yet many companies fail in their attempts to tap this market. The author examines the reasons for failure and offers some solutions.

Details

Journal of Business Strategy, vol. 5 no. 4
Type: Research Article
ISSN: 0275-6668

Access Restricted. View access options
Book part
Publication date: 30 September 2021

J. David Hacker, Michael R. Haines and Matthew Jaremski

The US fertility transition in the nineteenth century is unusual. Not only did it start from a very high fertility level and very early in the nation’s development, but it also…

Abstract

The US fertility transition in the nineteenth century is unusual. Not only did it start from a very high fertility level and very early in the nation’s development, but it also took place long before the nation’s mortality transition, industrialization, and urbanization. This paper assembles new county-level, household-level, and individual-level data, including new complete-count IPUMS microdata databases of the 1830–1880 censuses, to evaluate different theories for the nineteenth-century American fertility transition. We construct cross-sectional models of net fertility for currently-married white couples in census years 1830–1880 and test the results with a subset of couples linked between the 1850–1860, 1860–1870, and 1870–1880 censuses. We find evidence of marital fertility control consistent with hypotheses as early as 1830. The results indicate support for several different but complementary theories of the early US fertility decline, including the land availability, conventional structuralist, ideational, child demand/quality-quantity tradeoff, and life cycle savings theories.

Access Restricted. View access options
Article
Publication date: 1 November 2000

W.S Hopwood, D. Sinason and R.R Tucker

Emphasizes that although electronic commerce continues to grow, with it come many problems including the worry of security over the Internet. Presents a systematic approach to…

1450

Abstract

Emphasizes that although electronic commerce continues to grow, with it come many problems including the worry of security over the Internet. Presents a systematic approach to developing and continuously improving Web security systems — allowing for enterprise‐wide controls regarding security risks. Goes into much detail regarding systems, security and design.

Details

Managerial Finance, vol. 26 no. 11
Type: Research Article
ISSN: 0307-4358

Keywords

Access Restricted. View access options
Article
Publication date: 1 April 2002

R.E. Bell

Criminals have always exploited technological advances and therefore the advent of the gun, the telephone and the car created new opportunities for crime. Similarly, the…

1663

Abstract

Criminals have always exploited technological advances and therefore the advent of the gun, the telephone and the car created new opportunities for crime. Similarly, the increasingly widespread use of computers in society has led to computer‐related crime.

Details

Journal of Financial Crime, vol. 9 no. 4
Type: Research Article
ISSN: 1359-0790

Access Restricted. View access options
Article
Publication date: 1 October 2002

Alan D. Smith and William T. Rupp

It is commonplace to say that the 11 September attacks have changed everything. A global revolution is changing business, and business is changing the world. With unsettling…

11774

Abstract

It is commonplace to say that the 11 September attacks have changed everything. A global revolution is changing business, and business is changing the world. With unsettling speed, two forces are converging; a new generation of business leaders is rewriting the rules of business, and a new breed of fast companies is challenging the corporate status quo. The Internet is an information superhighway, touching almost every aspect of the economy from government agencies, financial institutions, businesses, and professional organizations. With the year 2002 and its increasing number of court cases on Internet‐related issues, the courts are obviously still struggling with the question of intellectual property rights in an open source code environment supporting e‐commerce. By modeling and classifying the risks associated with cybersecurity issues, firms and specific individuals should not become a casualty of this cyberwar, nor become paranoid about the risks ‐‐ be informed and follow common business sense practices, policies, and procedures.

Details

Information Management & Computer Security, vol. 10 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 1 March 1991

John Price‐Wilkin

Libraries must actively support humanities text files, but we must remember that to focus exclusively on texts tied to specific systems is to put ourselves in opposition to the…

77

Abstract

Libraries must actively support humanities text files, but we must remember that to focus exclusively on texts tied to specific systems is to put ourselves in opposition to the needs of the researchers we intend to serve. A working model of the sort of system and resource provision that is appropriate is described. The system, one put in place at the University of Michigan, is the result of several years of discussions and investigation. While by no means the only model upon which to base such a service, it incorporates several features that are essential to the support of these materials: standardized, generalized data; the reliance on standards for the delivery of information; and remote use. Sidebars discuss ARTFL, a textual database; the Oxford Text Archive; InteLex; the Open Text Corporation; the Text Encoding Initiative (TEI); the machine‐readable version of the Oxford English Dictionary, 2d edition; and the Center for Electronic Texts in the Humanities.

Details

Library Hi Tech, vol. 9 no. 3
Type: Research Article
ISSN: 0737-8831

Access Restricted. View access options
Article
Publication date: 1 January 2000

Robert Willison

This paper examines the concept of criminal opportunity. More precisely, it focuses on the nature of such opportunities that are to be found within an IS context, and the threat…

535

Abstract

This paper examines the concept of criminal opportunity. More precisely, it focuses on the nature of such opportunities that are to be found within an IS context, and the threat posed by dishonest staff who may act on them. Although hackers and their activities may be given ample column space in the lay press, the potential threat posed by dishonest staff should not be underestimated. The 1998 NCC Business Information Survey reports that the greatest risk of security breaches arose from the activities of personnel within organisations, accounting for nearly 52 per cent of all (physical and logistical) security breaches detected. Similarly, the 1998 CSI/FBI Survey found that the largest single source of financial loss (almost 37 per cent) was attributable to unauthorised insider access. These facts are not lost on security practitioners who, as a rule of thumb, work on the principle that 25 per cent of people are dishonest whenever possible, 25 per cent are always honest and 50 per cent can be either, depending on the nature of security controls and personal motivation.

Details

Journal of Financial Crime, vol. 7 no. 3
Type: Research Article
ISSN: 1359-0790

Access Restricted. View access options
Article
Publication date: 1 February 1976

William K. Beatty

The term “medical” will be interpreted broadly to include both basic and clinical sciences, related health fields, and some “medical” elements of biology and chemistry. A…

121

Abstract

The term “medical” will be interpreted broadly to include both basic and clinical sciences, related health fields, and some “medical” elements of biology and chemistry. A reference book is here defined as any book that is likely to be consulted for factual information more frequently than it will be picked up and read through in sequential order. Medical reference books have a place in public, school, college, and other non‐medical libraries as well as in the wide variety of medical libraries. All of these libraries will be considered in this column. A basic starting collection of medical material for a public library is outlined and described in an article by William and Virginia Beatty that appeared in the May, 1974, issue of American Libraries.

Details

Reference Services Review, vol. 4 no. 2
Type: Research Article
ISSN: 0090-7324

Access Restricted. View access options
Book part
Publication date: 6 September 2021

Eileen M. Decker, Matthew Morin and Eric M. Rosner

Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a…

Abstract

Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a constant stream of cyberattacks through varied methods by actors with myriad motivations. These threats are not expected to diminish in the near future. As a result, homeland security and national security professionals at all levels of government must understand the unique motivations and capabilities of malicious cyber actors in order to better protect against and respond to cyberattacks. This chapter outlines the most common cyberattacks; explains the motivations behind these attacks; and describes the federal, state, and local efforts to address these threats.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

Available. Content available
Book part
Publication date: 8 September 2022

Stephen Turner

Free Access. Free Access

Abstract

Details

Mad Hazard
Type: Book
ISBN: 978-1-80382-670-7

1 – 10 of 280
Per page
102050