Search results1 – 10 of over 5000
The “community” of computers commonly referred to as the Internet contains vast amounts of information useful to librarians, scholars, networkers, businesspeople…
The “community” of computers commonly referred to as the Internet contains vast amounts of information useful to librarians, scholars, networkers, businesspeople, professionals, and the general public. This information comprises online public‐access catalogs, full‐text databases, campuswide information systems, bulletin boards, and other types of knowledge bases. Until recently, discovering what is available has been a painful chore for the user. Paper directories exist, but they are out of date as soon as they are published, and they are cumbersome to update. The HYTELNET software, which gives a user the login addresses and passwords to every known remote site on the Internet, has made the process of finding sources easier. HYTELNET guides a user, with hypertext jumps, through the maze of information sources. This article explains how the program operates, what it comprises, and how it can be updated.
Summarizes the goals of the e‐tlas conference and goes on the examine the recommendations of the various working groups. Suggests that information obtained at the conference could be implemented in libraries and museums.
Identifies key activities that network users can perform in order to use the network effectively. Offers recommended reading, from beginner to expert user status. Explains some commonly used terms (e.g. Turbo Gopher with Veronica!). Lists useful Internet resources.
Negotiating effectively in multicultural contexts or others is not only a very important skill for all organizational elements but also crucial to inter-organizational…
Negotiating effectively in multicultural contexts or others is not only a very important skill for all organizational elements but also crucial to inter-organizational relations (Adler, 2008). If defined as a process that occurs when one party feels adversely affected by another (De Dreu, 1997). Conflict management styles can be analyzed as a function of personality variables. In this respect, cultural intelligence and self-monitoring appear to be relevant variables, as they are characterized by the demonstration of flexibility and interest in elements that are present in conflict management styles. This study aimed to evaluate the extent to which variables such as cultural intelligence and self-monitoring can positively influence the ability to solve interpersonal conflicts more effectively.
This study, with a sample of 399 individuals, aimed to test a model that explores how cultural intelligence and self-monitoring are related as predictor variables in the styles of conflict resolution.
It was observed that cultural intelligence presents itself as a reasonable predictor of conflict management styles, whereas self-monitoring appeared as a dispositional and controversial measure in relation to those styles. Self-monitoring exhibited itself as an important predictor of conflict management, but on the other hand, it had an influence on the choice of the dominating style in conflict situations.
Understanding the predictors of conflict management style and, in particular, realizing the extent to which cultural intelligence promotes a more effective conflict management style can help in the development of selection processes and skill training programs. The development of these multicultural skills will contribute to individual, social and organizational well-being.
This study contributes to the literature of individual differences and conflict management, demonstrating that some individual differences that predict the styles of conflict management can lead to a certain ambiguity in understanding the behaviour that an individual may adopt in situations of conflict.
This chapter discusses the implications of New Public Management (NPM) and of alternative theories on the higher education sector. Three clusters of alternative concepts…
This chapter discusses the implications of New Public Management (NPM) and of alternative theories on the higher education sector. Three clusters of alternative concepts and theories are identified, positioned in relation to NPM, and discussed. The chapter concludes that the different theoretical approaches: (1) cannot always be distinguished easily, (2) entail a risk of normativity due to the position of higher education in society, and (3) demonstrate that higher education policy and research are in need of a multi-theoretical approach that is able to put higher education back into its social, political, and economic context. By formulating research questions on the role of higher education and on the impact of former reforms, it is suggested that policy and research look further than the current concepts and theoretical approaches to build a new agenda for future.
Explains that servant‐leadership is a leadership term and philosophy which was originated by Robert K. Greenleaf, and which puts serving the greater needs of others as the…
Explains that servant‐leadership is a leadership term and philosophy which was originated by Robert K. Greenleaf, and which puts serving the greater needs of others as the primary goal of leadership. In a ground‐breaking 1970 essay, entitled The Servant as Leader, Robert Greenleaf suggested how caring for our many institutions, and each other, can occur through the practice of servant‐leadership. In the 1980s and 1990s servant‐leadership has become a major focus and goal in leadership and management writings, and in organizational practice.
Reports on a project to: first, provide an empirical analysis oftextual information on the Internet; second, to test the suitability ofcataloguing rules and record formats…
Reports on a project to: first, provide an empirical analysis of textual information on the Internet; second, to test the suitability of cataloguing rules and record formats governing the creation of machine‐readable cataloguing records; and third, develop recommendations that would assist the efforts of standards bodies and others interested in systematically cataloguing or otherwise describing and providing access to electronic information objects available through remote network access. Provides summary tables regarding the growth of the Internet and its traffic, together with file types. Concludes: first, that machine readable cataloguing records should be created; second, the effectiveness of records created for providing description and access information should be monitored; and third, cataloguing rules and formats should be extended to include interactive network systems and services.
THE IFLA Conference—or to be more precise—the 34th Session of the General Council of IFLA—met at Frankfurt am Main from the 18th to the 24th of August, 1968. Note the dates, for they include the 21st of August, the day when the delegates heard, as did the rest of the world, of the invasion of Czechoslovakia. Until then the Conference had been proceeding happily, and with the smoothness inborn of German organisation. During and after that date, a blight was cast over the proceedings, and although the Conference carried out its formal and informal programmes as planned, concentrations were disturbed as delegates sometimes gathered round transistor radios, their thoughts on Eastern Europe.
The conflict between Iran and Iraq is not new; it dates from long before September 1980. In fact, the origins of the current war can be traced to the battle of Qadisiyah…
The conflict between Iran and Iraq is not new; it dates from long before September 1980. In fact, the origins of the current war can be traced to the battle of Qadisiyah in Southern Iraq in 637 A.D., a battle in which the Arab armies of General Sa'd ibn Abi Waqqas decisively defeated the Persian army. In victory, the Arab armies extended Islam east of the Zagros Mountains to Iran. In defeat, the Persian Empire began a steady decline that lasted until the sixteenth century. However, since the beginning of that century, Persia has occupied Iraq three times: 1508–1514, 1529–1543, and 1623–1638. Boundary disputes, specifically over the Shatt al‐Arab Waterway, and old enmities caused the wars. In 1735, belligerent Iranian naval forces entered the Shatt al‐Arab but subsequently withdrew. Twenty years later, Iranians occupied the city of Sulimaniah and threatened to occupy the neighboring countries of Bahrain and Kuwait. In 1847, Iran dominated the eastern bank of the Shatt al‐Arab and occupied Mohamarah in Iraq.