Search results
1 – 10 of 522
In preparing this report, the compliance sub‐group has set out to (a) summarise the current compliance regime as a matter of law and practice, (b) identify particular problem…
Abstract
In preparing this report, the compliance sub‐group has set out to (a) summarise the current compliance regime as a matter of law and practice, (b) identify particular problem areas within that regime concerning public sector officials (PSOs), and (c) suggest recommendations for change. The result may be seen as providing features of a ‘model’ compliance structure designed to cause difficulties for corrupt PSOs seeking to launder the proceeds of their corruption; UK law and practice has formed the springboard for the model, but it should be stressed that in order to be of any utility any suggested changes would have to be adopted (effectively) universally throughout the financial world. Piecemeal adoption by one or a few states would merely be likely to drive the tainted monies elsewhere, and would not serve the desired purpose of reducing the extent/profitability of corruption.
Jon Drabenstott, Wilson M. Stahl, James J. Michael, Rick Richmond, Gene Robinson and James E. Rush
Typically, library building projects are undertaken to accommodate a library's needs for the foreseeable twenty years or more. With major changes in information technologies…
Abstract
Typically, library building projects are undertaken to accommodate a library's needs for the foreseeable twenty years or more. With major changes in information technologies occurring at intervals of less than five years, it should be assumed, within its twenty‐plus years of initial service, that a library building will have to accommodate a series of changes in order to support currently unknown technologies. Issues related to the development of library facilities that will meet current and future needs are discussed by three prominent consultants and representatives of two vendors: Wilson M. Stahl, James J. Michael (Data Research Associates), Rick Richmond, Gene Robinson (CLSI), and James E. Rush.
In Michael Hammer's new book, Beyond Reengineering, he sticks with the same definition for reengineering that he and James Champy put forth in their seminal Reengineering the…
Abstract
In Michael Hammer's new book, Beyond Reengineering, he sticks with the same definition for reengineering that he and James Champy put forth in their seminal Reengineering the Corporation: “Reengineering is the radical redesign of business processes for dramatic improvement.”
Richard H. Blum and Michael Ricks
As part of the work of the Symposium a workshop was convened to consider the potential role of, and issues arising from, the expansion of previously political intelligence…
Abstract
As part of the work of the Symposium a workshop was convened to consider the potential role of, and issues arising from, the expansion of previously political intelligence agencies into fighting international, organised economic (entrepreneurial) crime.
Michael L. Harris and Shanan G. Gibson
This paper aims to examine the entrepreneurial attitudes of undergraduate students enrolled in the Small Business Institute® (SBI) program at multiple universities in the USA…
Abstract
Purpose
This paper aims to examine the entrepreneurial attitudes of undergraduate students enrolled in the Small Business Institute® (SBI) program at multiple universities in the USA. Research has encouraged a continuous study and refinement of the entrepreneurial profile, particularly for young adults. Past studies have linked certain personality constructs and entrepreneurship, and shown a connection between entrepreneurial intentions and past business experience.
Design/methodology/approach
A total of 216 students completed the entrepreneurial attitudes orientation (EAO) survey. The EAO provides a composite score based on four attitude subscales: achievement in business; innovation in business; perceived personal control of business outcomes; and perceived self‐esteem in business. In addition, participants were asked to provide demographic information and past entrepreneurial experience.
Findings
Results indicated that the majority of students possessed entrepreneurial attitudes. Furthermore, both student characteristics and entrepreneurial experience were found to be associated with certain entrepreneurial attitudes. Specifically, male students scored higher on both personal control and innovation, and students with family business experience had more developed entrepreneurial attitudes.
Practical implications
The SBI and other similar training/education programs provide the opportunity for direct entrepreneurial exposure. Their ability to impact attitudes toward entrepreneurship provides a venue for career opportunities. Further discussion centers on the relationship between entrepreneurial attitudes and degree of past experience.
Originality/value
The paper provides an examination of entrepreneurial attitudes that focuses on both demographics and past experiences for a unique educational program that helps promote entrepreneurship as a viable career option.
Details
Keywords
The conflict between Iran and Iraq is not new; it dates from long before September 1980. In fact, the origins of the current war can be traced to the battle of Qadisiyah in…
Abstract
The conflict between Iran and Iraq is not new; it dates from long before September 1980. In fact, the origins of the current war can be traced to the battle of Qadisiyah in Southern Iraq in 637 A.D., a battle in which the Arab armies of General Sa'd ibn Abi Waqqas decisively defeated the Persian army. In victory, the Arab armies extended Islam east of the Zagros Mountains to Iran. In defeat, the Persian Empire began a steady decline that lasted until the sixteenth century. However, since the beginning of that century, Persia has occupied Iraq three times: 1508–1514, 1529–1543, and 1623–1638. Boundary disputes, specifically over the Shatt al‐Arab Waterway, and old enmities caused the wars. In 1735, belligerent Iranian naval forces entered the Shatt al‐Arab but subsequently withdrew. Twenty years later, Iranians occupied the city of Sulimaniah and threatened to occupy the neighboring countries of Bahrain and Kuwait. In 1847, Iran dominated the eastern bank of the Shatt al‐Arab and occupied Mohamarah in Iraq.
This study aims at providing exploratory insights into the initiative and capabilities of Chinese SMEs to develop and utilize diverse networks to support internationalization…
Abstract
This study aims at providing exploratory insights into the initiative and capabilities of Chinese SMEs to develop and utilize diverse networks to support internationalization. Such network development and utilization efforts are fundamental to the analysis and explanation of Chinese firms’ internationalization patterns and outcomes. Extending from the existing network studies in the Chinese context that generally put emphasis on strong‐tie and ethnic‐oriented networks, this paper investigates and explains explicitly the use and effects of both strong‐ and weak‐tie networks in the international development of Chinese SMEs. Indepth case studies on four rapidly internationalized Chinese SMEs are conducted. The case findings demonstrate that weak‐tie networks are essential to the firms’ business development in foreign markets; and were proactively developed and utilized in the course of the firms’ development. The cases also provide alternative perspectives to the beliefs and values underpinning strong‐tie networks presumed in existing literature. The findings draw attention to the changing business values and approaches of the Chinese firms aiming at developing internationally. Managerial implications concerning the significant influence of effective networking on internationalization are pinpointed.
Details
Keywords
The MacNOTIS interface development and test used the Apple Macintosh, HyperCard, and MitemView communications software to develop and test an intuitive interface to NOTIS systems…
Abstract
The MacNOTIS interface development and test used the Apple Macintosh, HyperCard, and MitemView communications software to develop and test an intuitive interface to NOTIS systems. While the concept and design were viewed favorably by the users, technical and speed issues made the interface too slow for widespread use. MacNOTIS pointed the way to several interface enhancements that should be incorporated in future NOTIS user interfaces.
Gone are the days when a bank could concentrate on providing a reliable service to its customer, and maintain that as part of that service it could guard the confidentiality of…
Abstract
Gone are the days when a bank could concentrate on providing a reliable service to its customer, and maintain that as part of that service it could guard the confidentiality of all information learnt in the course of the customer's banking. Formerly, a customer could be relatively confident that information about his or her business affairs would not be disclosed save in fairly limited circumstances, and the bank would not trouble itself as to how these affairs were conducted. Current legislation and regulation requires a bank to be aware of the commercial background to its clients' dealings and, in certain circumstances, to take steps to report criminal conduct or to account to third parties.