Search results

1 – 10 of 522
Article
Publication date: 1 April 2000

In preparing this report, the compliance sub‐group has set out to (a) summarise the current compliance regime as a matter of law and practice, (b) identify particular problem…

208

Abstract

In preparing this report, the compliance sub‐group has set out to (a) summarise the current compliance regime as a matter of law and practice, (b) identify particular problem areas within that regime concerning public sector officials (PSOs), and (c) suggest recommendations for change. The result may be seen as providing features of a ‘model’ compliance structure designed to cause difficulties for corrupt PSOs seeking to launder the proceeds of their corruption; UK law and practice has formed the springboard for the model, but it should be stressed that in order to be of any utility any suggested changes would have to be adopted (effectively) universally throughout the financial world. Piecemeal adoption by one or a few states would merely be likely to drive the tainted monies elsewhere, and would not serve the desired purpose of reducing the extent/profitability of corruption.

Details

Journal of Money Laundering Control, vol. 4 no. 2
Type: Research Article
ISSN: 1368-5201

Article
Publication date: 1 April 1987

Jon Drabenstott, Wilson M. Stahl, James J. Michael, Rick Richmond, Gene Robinson and James E. Rush

Typically, library building projects are undertaken to accommodate a library's needs for the foreseeable twenty years or more. With major changes in information technologies…

Abstract

Typically, library building projects are undertaken to accommodate a library's needs for the foreseeable twenty years or more. With major changes in information technologies occurring at intervals of less than five years, it should be assumed, within its twenty‐plus years of initial service, that a library building will have to accommodate a series of changes in order to support currently unknown technologies. Issues related to the development of library facilities that will meet current and future needs are discussed by three prominent consultants and representatives of two vendors: Wilson M. Stahl, James J. Michael (Data Research Associates), Rick Richmond, Gene Robinson (CLSI), and James E. Rush.

Details

Library Hi Tech, vol. 5 no. 4
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 June 1996

Rick Mullin

In Michael Hammer's new book, Beyond Reengineering, he sticks with the same definition for reengineering that he and James Champy put forth in their seminal Reengineering the

Abstract

In Michael Hammer's new book, Beyond Reengineering, he sticks with the same definition for reengineering that he and James Champy put forth in their seminal Reengineering the Corporation: “Reengineering is the radical redesign of business processes for dramatic improvement.”

Details

Journal of Business Strategy, vol. 17 no. 6
Type: Research Article
ISSN: 0275-6668

Article
Publication date: 1 March 1996

Richard H. Blum and Michael Ricks

As part of the work of the Symposium a workshop was convened to consider the potential role of, and issues arising from, the expansion of previously political intelligence…

Abstract

As part of the work of the Symposium a workshop was convened to consider the potential role of, and issues arising from, the expansion of previously political intelligence agencies into fighting international, organised economic (entrepreneurial) crime.

Details

Journal of Financial Crime, vol. 4 no. 1
Type: Research Article
ISSN: 1359-0790

Article
Publication date: 30 September 2008

Michael L. Harris and Shanan G. Gibson

This paper aims to examine the entrepreneurial attitudes of undergraduate students enrolled in the Small Business Institute® (SBI) program at multiple universities in the USA…

4921

Abstract

Purpose

This paper aims to examine the entrepreneurial attitudes of undergraduate students enrolled in the Small Business Institute® (SBI) program at multiple universities in the USA. Research has encouraged a continuous study and refinement of the entrepreneurial profile, particularly for young adults. Past studies have linked certain personality constructs and entrepreneurship, and shown a connection between entrepreneurial intentions and past business experience.

Design/methodology/approach

A total of 216 students completed the entrepreneurial attitudes orientation (EAO) survey. The EAO provides a composite score based on four attitude subscales: achievement in business; innovation in business; perceived personal control of business outcomes; and perceived self‐esteem in business. In addition, participants were asked to provide demographic information and past entrepreneurial experience.

Findings

Results indicated that the majority of students possessed entrepreneurial attitudes. Furthermore, both student characteristics and entrepreneurial experience were found to be associated with certain entrepreneurial attitudes. Specifically, male students scored higher on both personal control and innovation, and students with family business experience had more developed entrepreneurial attitudes.

Practical implications

The SBI and other similar training/education programs provide the opportunity for direct entrepreneurial exposure. Their ability to impact attitudes toward entrepreneurship provides a venue for career opportunities. Further discussion centers on the relationship between entrepreneurial attitudes and degree of past experience.

Originality/value

The paper provides an examination of entrepreneurial attitudes that focuses on both demographics and past experiences for a unique educational program that helps promote entrepreneurship as a viable career option.

Details

Education + Training, vol. 50 no. 7
Type: Research Article
ISSN: 0040-0912

Keywords

Content available
Book part
Publication date: 28 February 2007

Anil Gupta and Ann Harding

Abstract

Details

Modelling Our Future: Population Ageing, Health and Aged Care
Type: Book
ISBN: 978-1-84950-808-7

Article
Publication date: 1 February 1989

Magda El‐Sherbini

The conflict between Iran and Iraq is not new; it dates from long before September 1980. In fact, the origins of the current war can be traced to the battle of Qadisiyah in…

Abstract

The conflict between Iran and Iraq is not new; it dates from long before September 1980. In fact, the origins of the current war can be traced to the battle of Qadisiyah in Southern Iraq in 637 A.D., a battle in which the Arab armies of General Sa'd ibn Abi Waqqas decisively defeated the Persian army. In victory, the Arab armies extended Islam east of the Zagros Mountains to Iran. In defeat, the Persian Empire began a steady decline that lasted until the sixteenth century. However, since the beginning of that century, Persia has occupied Iraq three times: 1508–1514, 1529–1543, and 1623–1638. Boundary disputes, specifically over the Shatt al‐Arab Waterway, and old enmities caused the wars. In 1735, belligerent Iranian naval forces entered the Shatt al‐Arab but subsequently withdrew. Twenty years later, Iranians occupied the city of Sulimaniah and threatened to occupy the neighboring countries of Bahrain and Kuwait. In 1847, Iran dominated the eastern bank of the Shatt al‐Arab and occupied Mohamarah in Iraq.

Details

Reference Services Review, vol. 17 no. 2
Type: Research Article
ISSN: 0090-7324

Article
Publication date: 1 July 2006

Yee Kwan Tang

This study aims at providing exploratory insights into the initiative and capabilities of Chinese SMEs to develop and utilize diverse networks to support internationalization…

670

Abstract

This study aims at providing exploratory insights into the initiative and capabilities of Chinese SMEs to develop and utilize diverse networks to support internationalization. Such network development and utilization efforts are fundamental to the analysis and explanation of Chinese firms’ internationalization patterns and outcomes. Extending from the existing network studies in the Chinese context that generally put emphasis on strong‐tie and ethnic‐oriented networks, this paper investigates and explains explicitly the use and effects of both strong‐ and weak‐tie networks in the international development of Chinese SMEs. Indepth case studies on four rapidly internationalized Chinese SMEs are conducted. The case findings demonstrate that weak‐tie networks are essential to the firms’ business development in foreign markets; and were proactively developed and utilized in the course of the firms’ development. The cases also provide alternative perspectives to the beliefs and values underpinning strong‐tie networks presumed in existing literature. The findings draw attention to the changing business values and approaches of the Chinese firms aiming at developing internationally. Managerial implications concerning the significant influence of effective networking on internationalization are pinpointed.

Details

Journal of Asia Business Studies, vol. 1 no. 1
Type: Research Article
ISSN: 1558-7894

Keywords

Article
Publication date: 1 February 1994

Hal W. Hall

The MacNOTIS interface development and test used the Apple Macintosh, HyperCard, and MitemView communications software to develop and test an intuitive interface to NOTIS systems…

Abstract

The MacNOTIS interface development and test used the Apple Macintosh, HyperCard, and MitemView communications software to develop and test an intuitive interface to NOTIS systems. While the concept and design were viewed favorably by the users, technical and speed issues made the interface too slow for widespread use. MacNOTIS pointed the way to several interface enhancements that should be incorporated in future NOTIS user interfaces.

Details

Library Hi Tech, vol. 12 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 January 1996

Simon P. Robert‐Tissott

Gone are the days when a bank could concentrate on providing a reliable service to its customer, and maintain that as part of that service it could guard the confidentiality of…

Abstract

Gone are the days when a bank could concentrate on providing a reliable service to its customer, and maintain that as part of that service it could guard the confidentiality of all information learnt in the course of the customer's banking. Formerly, a customer could be relatively confident that information about his or her business affairs would not be disclosed save in fairly limited circumstances, and the bank would not trouble itself as to how these affairs were conducted. Current legislation and regulation requires a bank to be aware of the commercial background to its clients' dealings and, in certain circumstances, to take steps to report criminal conduct or to account to third parties.

Details

Journal of Financial Crime, vol. 3 no. 3
Type: Research Article
ISSN: 1359-0790

1 – 10 of 522