Search results

1 – 10 of over 2000
To view the access options for this content please click here
Book part
Publication date: 9 September 2020

Stephen Chicoine

Purpose – Research on terrorism has demonstrated the importance of state violence as a factor in the adoption of terrorism. This chapter seeks to clarify this previous…

Abstract

Purpose – Research on terrorism has demonstrated the importance of state violence as a factor in the adoption of terrorism. This chapter seeks to clarify this previous research by examining the process through which state violence contributes to violence through groups’ narratives and appeals for action.

Methodology – To study how state violence contributes to terrorism this chapter uses qualitative methods that are ideal for clarifying social processes across cases. This chapter uses a mixed-methods approach, first using a comparative-historical analysis of groups involved in the anarchist, anti-colonial, and New Left waves of terrorism. Examining this diverse set of groups highlights the common role and process through which state violence contributes to terrorism. This study is combined with an in-depth analysis of Islamic State of Iraq and Syria’s online propaganda, which provides a detailed picture of how state violence is featured in terrorist texts.

Findings – This chapter reaffirms the previous research on the role of state violence as a grievance and indication that alternative methods are unavailable. In addition to this, this chapter demonstrates the symbolic importance of state violence, which provides a moral justification for terrorism and martyrs to aspire to and avenge.

Value – This chapter clarifies the role of state violence in the development of terrorism by describing how it is integrated in the narratives of terrorist groups to justify and inspire violence.

Details

Radicalization and Counter-Radicalization
Type: Book
ISBN: 978-1-83982-988-8

Keywords

To view the access options for this content please click here
Article
Publication date: 1 March 1975

Tom Schultheiss and Linda Mark

The following classified, annotated list of titles is intended to provide reference librarians with a current checklist of new reference books, and is designed to…

Abstract

The following classified, annotated list of titles is intended to provide reference librarians with a current checklist of new reference books, and is designed to supplement the RSR review column, “Recent Reference Books,” by Frances Neel Cheney. “Reference Books in Print” includes all additional books received prior to the inclusion deadline established for this issue. Appearance in this column does not preclude a later review in RSR. Publishers are urged to send a copy of all new reference books directly to RSR as soon as published, for immediate listing in “Reference Books in Print.” Reference books with imprints older than two years will not be included (with the exception of current reprints or older books newly acquired for distribution by another publisher). The column shall also occasionally include library science or other library related publications of other than a reference character.

Details

Reference Services Review, vol. 3 no. 3
Type: Research Article
ISSN: 0090-7324

To view the access options for this content please click here
Article
Publication date: 20 November 2009

Abstract

Details

Journal of Children's Services, vol. 4 no. 3
Type: Research Article
ISSN: 1746-6660

To view the access options for this content please click here

Abstract

Details

Advances in Librarianship
Type: Book
ISBN: 978-0-12024-618-2

To view the access options for this content please click here
Article
Publication date: 28 December 2020

Zongda Wu, Shigen Shen, Chenglang Lu, Huxiong Li and Xinning Su

In this paper, the authors propose an effective mechanism for the protection of digital library readers' lending privacy under a cloud environment.

Abstract

Purpose

In this paper, the authors propose an effective mechanism for the protection of digital library readers' lending privacy under a cloud environment.

Design/methodology/approach

The basic idea of the method is that for each literature circulation record, before being submitted to the untrusted cloud database of a digital library for storage, its reader number has to be encrypted strictly at a client, so as to make it unable for an attacker at the cloud to know the specific reader associated with each circulation record and thus protect readers' lending privacy. Moreover, the authors design an effective method for querying the encrypted literature circulation records, so as to ensure the accuracy and efficiency of each kind of database queries related to the encrypted reader number field of literature circulation records.

Findings

Finally, both theoretical analysis and experimental evaluation demonstrate the effectiveness of the proposed methods.

Originality/value

This paper presents the first study attempt to the privacy protection of readers' literature circulations, which can improve the security of readers' lending privacy in the untrusted cloud, without compromising the accuracy and efficiency of each kind of database queries in the digital library. It is of positive significance to construct a privacy-preserving digital library platform.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

To view the access options for this content please click here
Article
Publication date: 14 March 2019

Mohammed Z. Salem, Samir Baidoun and Grace Walsh

The purpose of this paper is to examine factors that affect Palestinian customers’ use of online banking services.

Abstract

Purpose

The purpose of this paper is to examine factors that affect Palestinian customers’ use of online banking services.

Design/methodology/approach

An empirical study was conducted using a questionnaire in order to test the hypotheses. The questionnaire was distributed to 500 respondents selected by the participating banks. A total of 369 complete questionnaires were returned. The study’s independent variables include technology adoption propensity, customers’ value for online personalization, customers’ privacy concern, e-trust, technological leadership and loyalty. Palestinian customers’ usage of online banking services is the dependent variable.

Findings

The results of the model tested clearly suggest that the use of online banking services is influenced, respectively, by the technological leadership, e-trust, e-loyalty, customers’ value for online personalization, customers’ concern for privacy and propensity of technology adoption. Finally, this paper suggests that policy makers should develop a prioritized hierarchy of actions in developing the effective use of bank’s online services, based on the t- and p-values of the latter mentioned factors.

Research limitations/implications

One limitation of the study is relying on self-reported cross-sectional data collection, rather than longitudinal surveying. Despite such limitation, the study provides the Palestinian banking sector with recommendations to promote online banking services based on the empirically identified factors affecting such service adoption.

Practical implications

Palestinian banks should promote the adoption of online banking services by supporting personalization of services, privacy and trust. Customers should always be informed that their bank is among the first banks to introduce the latest state-of-the-art online services. Technology innovative and diverse online services should be offered by banks to attract customers.

Originality/value

Although numerous research studies have studied the factors affecting customers in using electronic and online banking services, few studies have considered such usage in the developing countries, such as Arab countries in general and Palestine in particular. This is the first study to examine the factors affecting the adoption of online banking services in Palestine. This study provides empirical evidence to fill in the gap by providing a deeper understanding of the factors affecting the usage of online banking services in the country. The findings of this study can help decision makers in the Palestinian banks to develop practical plans that might accelerate and expand the adoption of online banking emphasizing personalized and trusted services offered with high level of security and privacy.

To view the access options for this content please click here
Article
Publication date: 1 February 1995

Jin H. Im, Sandra J. Hartman and Robert Folger

The just‐in‐time (JIT) production system is notable for its emphasis on employee involvement and participation. However, we suggest that the role of participation that is…

Abstract

The just‐in‐time (JIT) production system is notable for its emphasis on employee involvement and participation. However, we suggest that the role of participation that is most typically described in the organizational behavior (OB) literature does not match the type of participation practiced in JIT. We introduce a theoretical framework that accounts for these different perspectives: whereas the OB approach treats participation as an intervention and hence as an independent variable, the JIT approach sees it as a side effect of the JIT production system and hence a dependent variable. Understanding of the differences is essential in JIT implementation in the workplace if we are to avoid miscommunication, stress, and disbelief in the system.

Details

The International Journal of Organizational Analysis, vol. 3 no. 2
Type: Research Article
ISSN: 1055-3185

To view the access options for this content please click here
Book part
Publication date: 1 November 2008

Abstract

Details

Institutional Approach to Global Corporate Governance: Business Systems and Beyond
Type: Book
ISBN: 978-1-84855-320-0

To view the access options for this content please click here
Article
Publication date: 1 July 1993

A.Z. Keller and A. Kazazi

Examines Just‐in‐Time (JIT) from its evolution as a Japaneseconcept through to a review of its philosophy and implementation. Citesseveral techniques of implementation…

Abstract

Examines Just‐in‐Time (JIT) from its evolution as a Japanese concept through to a review of its philosophy and implementation. Cites several techniques of implementation. Includes a review of the early work of various researchers and practitioners. Concludes that JIT is a very effective manufacturing philosophy which is universal in nature encompassing all aspects of manufacturing. Suggests a few deficiencies in current literature.

Details

Industrial Management & Data Systems, vol. 93 no. 7
Type: Research Article
ISSN: 0263-5577

Keywords

To view the access options for this content please click here
Article
Publication date: 1 June 1997

Sandra L. Fielden and Marilyn J. Davidson

Employers in the UK are under a legal obligation to ensure that their recruitment procedures conform with the Sex Discrimination Act (1975), which states that employers…

Abstract

Employers in the UK are under a legal obligation to ensure that their recruitment procedures conform with the Sex Discrimination Act (1975), which states that employers must not discriminate or indicate any hidden intention to discriminate against a potential employee on the grounds of their sex. Yet the very fact that many jobs are still viewed as ‘male’ or ‘female’ is often sufficient to prevent the non‐dominant gender group from applying for those positions (Ray, 1990). Managerial jobs have traditionally been male dominated and organisations are under a legal obligation to ensure that their recruitment procedures do not indicate any intention to discriminate, either overtly or covertly. Therefore, organisations need not only to demonstrate that they have no intention to discriminate, especially in traditionally male dominated occupations such as management, but they also need to ensure that their intention not to discriminate is clearly and explicitly communicated to potential job applicants (Ray, 1990). The aim of this article is to address the similarities and differences between the job search experiences of unemployed female and male managers, and to present the research findings from an in‐depth study of unemployed British managers.

Details

Equal Opportunities International, vol. 16 no. 6/7
Type: Research Article
ISSN: 0261-0159

1 – 10 of over 2000