Search results
1 – 10 of over 1000Bridget Penhale, Alison Brammer, Pete Morgan, Paul Kingston and Michael Preston-Shoot
Abstract
Details
Keywords
This chapter provides an introduction to the world of family companies and family constitutions from a legal perspective. It first studies the legal types of business…
Abstract
This chapter provides an introduction to the world of family companies and family constitutions from a legal perspective. It first studies the legal types of business organizations that family firms have chosen across time and jurisdictions. It then illustrates how early predecessors of family constitutions evolved in the late Middle Ages and what modern family constitutions look like in different countries today. Further considerations are devoted to the governance framework of family firms. The chapter concludes by exploring the potential legal effects of family constitutions under German company and contract law.
Details
Keywords
Social networks (SNs) have recently evolved from a means of connecting people to becoming a tool for social engineering, radicalization, dissemination of propaganda and…
Abstract
Purpose
Social networks (SNs) have recently evolved from a means of connecting people to becoming a tool for social engineering, radicalization, dissemination of propaganda and recruitment of terrorists. It is no secret that the majority of the Islamic State in Iraq and Syria (ISIS) members are Arabic speakers, and even the non-Arabs adopt Arabic nicknames. However, the majority of the literature researching the subject deals with non-Arabic languages. Moreover, the features involved in identifying radical Islamic content are shallow and the search or classification terms are common in daily chatter among people of the region. The authors aim at distinguishing normal conversation, influenced by the role religion plays in daily life, from terror-related content.
Design/methodology/approach
This article presents the authors' experience and the results of collecting, analyzing and classifying Twitter data from affiliated members of ISIS, as well as sympathizers. The authors used artificial intelligence (AI) and machine learning classification algorithms to categorize the tweets, as terror-related, generic religious, and unrelated.
Findings
The authors report the classification accuracy of the K-nearest neighbor (KNN), Bernoulli Naive Bayes (BNN) and support vector machine (SVM) [one-against-all (OAA) and all-against-all (AAA)] algorithms. The authors achieved a high classification F1 score of 83\%. The work in this paper will hopefully aid more accurate classification of radical content.
Originality/value
In this paper, the authors have collected and analyzed thousands of tweets advocating and promoting ISIS. The authors have identified many common markers and keywords characteristic of ISIS rhetoric. Moreover, the authors have applied text processing and AI machine learning techniques to classify the tweets into one of three categories: terror-related, non-terror political chatter and news and unrelated data-polluting tweets.
Details
Keywords
Many entrepreneurs want to reach high to the heavens to achieve unlimited success. These hardworking, often underappreciated, venturers often crave fame and fortune as they strive…
Abstract
Many entrepreneurs want to reach high to the heavens to achieve unlimited success. These hardworking, often underappreciated, venturers often crave fame and fortune as they strive to create their personal business legacy. One strategic path many have wandered down is that of the Initial Public Offering (IPO), whereby shares of the company are sold to the public. The IPO has many strong attractions. Large amounts of capital can be brought into the company.The company's stock can be used as currency to acquire other companies. Early investors realize a good ROI. Employees can perceive real value in their stock options. Customers, banks, vendors, and other stakeholders pay more respect to the company. Is this truly the entrepreneurʼs nirvana? Or is it a case of “Be careful of what you wish for because it may really come true?” Read on.
Alka Gupta, Christoph Streb, Vishal K. Gupta and Erik Markin
Acting entrepreneurially in nascent industries is a complex endeavor characterized by uncertainty and ambiguity. Nevertheless, entirely new industries do emerge, often as a direct…
Abstract
Acting entrepreneurially in nascent industries is a complex endeavor characterized by uncertainty and ambiguity. Nevertheless, entirely new industries do emerge, often as a direct result of entrepreneurial behavior. We extend and apply discovery and creation approaches to study entrepreneurial behavior during industry emergence by means of qualitative analysis of a film about the personal computer (PC) industry℉s formative years. We find that discovery and creation behavior are fundamentally interrelated and share a common element: bricolage. Moreover, ideological activism is a major component of entrepreneurial behavior in a new industry℉s formative years during both creation and discovery processes. Implications for research and practice are discussed.
Details
Keywords
Abstract
Details