Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 13 of 13 matches in All Departments
This edited volume in SIOP's Organizational Frontiers Series presents the current thinking and research on the important area of motivation.Work Motivation is a central issue in Industrial organizational psychology, human resource management and organizational behavior. In this volume the editors and authors show that motivation must be seen as a multi-level phenomenon where individual, group, organizational and cultural variables must be considered to truly understand it. The book adopts an overall framework that encompasses "internal" - from the person - forces and "external" - from the immediate and more distant environment - forces. It is destined to challenge scholars of organizations to give renewed emphasis and attention to advancing our understanding of motivation in work situations.
This edited volume in SIOP's Organizational Frontiers Series presents the current thinking and research on the important area of motivation.Work Motivation is a central issue in Industrial organizational psychology, human resource management and organizational behavior. In this volume the editors and authors show that motivation must be seen as a multi-level phenomenon where individual, group, organizational and cultural variables must be considered to truly understand it. The book adopts an overall framework that encompasses internal - from the person - forces and external - from the immediate and more distant environment - forces. It is destined to challenge scholars of organizations to give renewed emphasis and attention to advancing our understanding of motivation in work situations.
This book constitutes the refereed proceedings of the Second International Information Security Practice and Experience Conference, ISPEC 2006, held in Hangzhou, China, in April 2006. The 35 revised full papers presented were carefully reviewed and selected from 307 submissions. The papers are organized in topical sections.
This innovative reassessment of ritual murder accusations brings together scholars working in history, folklore, ethnography, and literature. Favoring dynamic explanations of the mechanisms, evolution, popular appeal, and responses to the blood libel, the essays rigorously engage with the larger social and cultural worlds that made these phenomena possible. In doing so, the book helps to explain why blood libel accusations continued to spread in Europe even after modernization seemingly made them obsolete. Drawing on untapped and unconventional historical sources, the collection explores a range of intriguing topics: popular belief and scientific knowledge; the connections between antisemitism, prejudice, and violence; the rule of law versus the power of rumors; the politics of memory; and humanitarian intervention on a global scale.
This innovative reassessment of ritual murder accusations brings together scholars working in history, folklore, ethnography, and literature. Favoring dynamic explanations of the mechanisms, evolution, popular appeal, and responses to the blood libel, the essays rigorously engage with the larger social and cultural worlds that made these phenomena possible. In doing so, the book helps to explain why blood libel accusations continued to spread in Europe even after modernization seemingly made them obsolete. Drawing on untapped and unconventional historical sources, the collection explores a range of intriguing topics: popular belief and scientific knowledge; the connections between antisemitism, prejudice, and violence; the rule of law versus the power of rumors; the politics of memory; and humanitarian intervention on a global scale.
This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.
This is a new release of the original 1946 edition.
Kessinger Publishing is the place to find hundreds of thousands of rare and hard-to-find books with something of interest for everyone!
This is a biography of the leader of the Chinese revolution that overturned the corrupt and autocratic Manchu Empire. Dr Sun Yat-Sen was the first democratically elected president of the Chinese Republic.
This is a biography of the leader of the Chinese revolution that overturned the corrupt and autocratic Manchu Empire. Dr Sun Yat-Sen was the first democratically elected president of the Chinese Republic.
This is a biography of the leader of the Chinese revolution that overturned the corrupt and autocratic Manchu Empire. Dr Sun Yat-Sen was the first democratically elected president of the Chinese Republic.
Geospatial computing includes utilizing computing devices and sensors to acquire, process, analyze, manage, and visualize geospatial data, which users can then interact with via a large variety of smart geospatial applications. Geospatial computing is a computational-demanding task, in terms of computation power, data storage capacity, and memory space. Therefore, it has primarily been performed on non-mobile computers. Recent developments allow smartphones to meet many of the demanded requirements for geospatial computing. This book addresses the topic of geospatial computing in smartphones, including positioning, mobile Geographic Information Systems (GIS) and smart mobile applications. You are provided with aspects related to positioning methods, as well as solutions for geospatial data acquisition, processing, and visualization. This resource also covers various aspects of the application technologies, such as context detection and context intelligence.
|
You may like...
|