首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4篇
  免费   1篇
管理学   3篇
社会学   2篇
  2020年   1篇
  2017年   1篇
  2016年   1篇
  2013年   2篇
排序方式: 共有5条查询结果,搜索用时 15 毫秒
1
1.
Journal of Management and Governance - This study examines how original equipment manufacturers (OEMs) can segment their product-oriented services customers with the help of a recency, frequency,...  相似文献   
2.
This paper elaborates on the notion of performance measurement (PM) dynamism. The paper’s argument is based on a literature review and an interventionist case study. The analysis of the structure of PM dynamism is deepened by using New Institutional Sociology theory as a tool. PM dynamism was found to occur at four different levels: in setting the role of performance measures for decision making in general, in the use of measures, in the selection of measures and within the components of single measures. PM dynamism allows, for instance, measures used only for specific and topical purposes (ad hoc), in contrast to the views presented in the extant literature, which reject measures that are not institutionalized. The use of up-to-date measures, a major implication of understanding PM dynamism more thoroughly, could lead to more efficient strategy implementation and enactment at different levels. The originality of the article consists of identifying the rationale and the levels of PM dynamism and of the consideration that the use of ad hoc measures may have a positive impact on managing performance.  相似文献   
3.
Recent literature presented arguments linking income inequality to the financial crash of 2007–2008. One proposed channel is expected to work through bank credit. I analyze the relationship between income inequality and bank credit in a panel cointegration framework and find that they have a long-run dependency relationship. Results show that income inequality contributed to the increase of bank credit in developed economies after the Second World War.  相似文献   
4.
This paper argues that periodic waves of crowding‐in to ‘hot’ issue fields are a recurring feature of how globally networked civil society organizations operate, especially in countries of the Global South. We elaborate on this argument through a study of Indian civil society mobilization around climate change. Five key mechanisms contribute to crowding‐in processes: (1) the expansion of discursive opportunities; (2) the event effects of global climate change conferences; (3) the network effects created by expanding global civil society networks; (4) the adoption and innovation of action repertoires; and (5) global pressure effects creating new opportunities for civil society. Our findings contribute to the world society literature, with an account of the social mechanisms through which global institutions and political events affect national civil societies, and to the social movements literature by showing that developments in world society are essential contributors to national mobilization processes.  相似文献   
5.
Traditionally in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings over a fixed size alphabet. Inspired by permutation problems originating from information security, another viewpoint is taken in this paper. We focus on combinatorial properties of long words in which the number of occurrences of any symbol is restricted by a fixed given constant. More precisely, we show that for all positive integers m and q there exists the least positive integer N(m,q) which is smaller than $m^{2^{q-1}}$ and satisfies the following: If α is a word such that
  1. |alph(α)|≥N(m,q) (i.e., the cardinality of the alphabet of α is at least N(m,q)); and
  2. |α| a q for each a∈alph(α) (i.e., the number of occurrences of any symbol of alph(α) in α is at most q),
then there exist a set A?alph(α) of cardinality |A|=m, an integer p∈{1,2,…,q}, and permutations σ 1,σ 2,…,σ p :{1,2,…,m}→{1,2,…,m} for which $$\pi_A(\alpha)\in a_{\sigma_1(1)}^+\cdots a_{\sigma_1(m)}^+a_{\sigma _2(1)}^+\cdots a_{\sigma_2(m)}^+\cdots a_{\sigma_p(1)}^+\cdots a_{\sigma_p(m)}^+ .$$ Here A={a 1,a 2,…,a m } and π A is the projection morphism from alph(α)? into A ?. The second part of the paper considers information security. We give an introduction to (generalized iterated) hash functions and their security properties; finally we demonstrate how our combinatorial results are connected to constructing multicollision attacks on these functions.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号