|
|
Showing 1 - 25 of
57 matches in All Departments
This two-volume collection of essays provides a comprehensive
examination of the idea of social control in the history of Europe.
The uniqueness of these volumes lies in two main areas. First, the
contributors compare methods of social control on many levels, from
police to shaming, church to guilds. Second, they look at these
formal and informal institutions as two-way processes. Unlike many
studies of social control in the past, the scholars here examine
how individuals and groups that are being controlled necessarily
participate in and shape the manner in which they are regulated.
Hardly passive victims of discipline and control, these folks
instead claimed agency in that process, accepting and
resisting--and thus molding the controls under which they
functioned. In both volumes, an introduction outlines the origins
and the continuing value of the concept of social control. The
introductions are followed by two substantive sections. The essays
in part one of volume I focus on the interplay of ecclesiastical
institutions and the emerging states; those in part two of volume I
look more explicitly at discipline from a bottom-up perspective.
The essays in part one of volume 2 explore the various means by
which communities--generally working-class communities--in
nineteenth-and twentieth-century Europe were subjected to forms of
discipline in the workplace, by the church, and by philanthropic
housing organizations. It notes also how the communities themselves
generated their own forms of internal control. Part two of volume 2
focuses on various policing institutions, exploring in particular
the question of how liberal and totalitarian regimes differed in
their styles of control,repression, and surveillance.
Security has been a human concern since the dawn of time. With the
rise of the digital society, information security has rapidly grown
to an area of serious study and ongoing research. While much
research has focused on the technical aspects of computer security,
far less attention has been given to the management issues of
information risk and the economic concerns facing firms and
nations. Managing Information Risk and the Economics of Security
provides leading edge thinking on the security issues facing
managers, policy makers, and individuals. Many of the chapters of
this volume were presented and debated at the 2008 Workshop on the
Economics of Information Security (WEIS), hosted by the Tuck School
of Business at Dartmouth College. Sponsored by Tuck's Center for
Digital Strategies and the Institute for Information Infrastructure
Protection (I3P), the conference brought together over one hundred
information security experts, researchers, academics, reporters,
corporate executives, government officials, cyber crime
investigators and prosecutors. The group represented the global
nature of information security with participants from China, Italy,
Germany, Canada, Australia, Denmark, Japan, Sweden, Switzerland,
the United Kingdom and the US. This volume would not be possible
without the dedicated work Xia Zhao (of Dartmouth College and now
the University of North Carolina, Greensboro) who acted as the
technical editor.
It's the new rock and roll. It's the new black. Sustainability
is trendy, and not just among hipsters and pop stars. The uncool
chemical sector helped pioneer it, and today, companies inside and
outside the sector have embraced it. But what have they embraced?
Surely not the Brundtland definition of meeting "the needs of the
present without compromising the ability of future generations to
meet their own needs."
Sustainability describes a change in the chemical industry's
approach to the external world: to regulators, to greens, to
neighbors, to investors and to the general public. Displacing the
adversarialism of the 1970s-80s, sustainability is a new approach
to social/political conflict, and an attempt to rebuild the
industry's long-suffering public image. In practice, it consists
of:
A 'stakeholder' approach to communications and external
relations
A rebranding of regulatory compliance and risk management, with the
emphasis on their benefits to stakeholders
Recognition (and even celebration) of the opportunities, not just
the costs, of environmental and social protection
The core of this book is a survey of the world's 29 largest
chemical companies: how they put sustainability into action (six of
the 29 do not), and the six 'sustainability brands' they have
created. It begins with a history of stakeholders conflict, before
looking at various definitions of sustainability - by academics, by
the public and by investors. After the survey and analysis, the
book covers sustainability and 'greenwash' plus the ROI of
sustainability, and it gives five recommendations.
Financial identity theft is well understood with clear
underlying motives. Medical identity theft is new and presents a
growing problem. The solutions to both problems however, are less
clear.
The Economics of Financial and Medical Identity Theft discusses
how the digital networked environment is critically different from
the world of paper, eyeballs and pens. Many of the effective
identity protections are embedded behind the eyeballs, where the
presumably passive observer is actually a fairly keen student of
human behavior. The emergence of medical identity theft and the
implications of medical data privacy are described in the second
section of this book.
The Economics of Financial and Medical Identity Theft also
presents an overview of the current technology for identity
management. The book closes with a series of vignettes in the last
chapter, looking at the risks we may see in the future and how
these risks can be mitigated or avoided.
The world of sales continues to change. Strategies that created
success in the past fail today. Lone Wolf to Lead Wolf tells a
simple but powerful story of managing the sales evolution.
Written by the developers of the new 21st century HF (high
frequency) radio technology, this groundbreaking resource presents
the powerful new capabilities and technical details of 3G and WBHF
(wideband high frequency) waveforms to help professionals
understand and use the ionospheric channel for video and high-speed
data transmission. Featuring more than 180 illustrations, this
practical book enables engineers to utilize this technology to
communicate voice and data over the horizon without needing anyone
else's infrastructure, send video beyond line of sight from moving
platforms, and communicate over long ranges at such low power that
it is nearly undetectable. Readers learn the rationale behind the
new US and NATO standards for HF radio communications directly from
their developers. Additionally, the book looks at the future
direction of this technology area and the open problems requiring
further research.
The horrors of the Nazi regime and the Holocaust still present some
of the most disturbing questions in modern history: Why did
Hitler's party appeal to millions of Germans, and how entrenched
was anti-Semitism among the population? How could anyone claim,
after the war, that the genocide of Europe's Jews was a secret? Did
ordinary non-Jewish Germans live in fear of the Nazi state? In this
unprecedented firsthand analysis of daily life as experienced in
the Third Reich, "What We Knew" offers answers to these most
important questions. Combining the expertise of Eric A. Johnson, an
American historian, and Karl-Heinz Reuband, a German sociologist,
"What We Knew" is the most startling oral history yet of everyday
life in theThird Reich.
Financial identity theft is well understood with clear
underlying motives. Medical identity theft is new and presents a
growing problem. The solutions to both problems however, are less
clear.
The Economics of Financial and Medical Identity Theft discusses
how the digital networked environment is critically different from
the world of paper, eyeballs and pens. Many of the effective
identity protections are embedded behind the eyeballs, where the
presumably passive observer is actually a fairly keen student of
human behavior. The emergence of medical identity theft and the
implications of medical data privacy are described in the second
section of this book.
The Economics of Financial and Medical Identity Theft also
presents an overview of the current technology for identity
management. The book closes with a series of vignettes in the last
chapter, looking at the risks we may see in the future and how
these risks can be mitigated or avoided.
It's the new rock and roll. It's the new black. Sustainability
is trendy, and not just among hipsters and pop stars. The uncool
chemical sector helped pioneer it, and today, companies inside and
outside the sector have embraced it. But what have they embraced?
Surely not the Brundtland definition of meeting "the needs of the
present without compromising the ability of future generations to
meet their own needs."
Sustainability describes a change in the chemical industry's
approach to the external world: to regulators, to greens, to
neighbors, to investors and to the general public. Displacing the
adversarialism of the 1970s-80s, sustainability is a new approach
to social/political conflict, and an attempt to rebuild the
industry's long-suffering public image. In practice, it consists
of:
A 'stakeholder' approach to communications and external
relations
A rebranding of regulatory compliance and risk management, with the
emphasis on their benefits to stakeholders
Recognition (and even celebration) of the opportunities, not just
the costs, of environmental and social protection
The core of this book is a survey of the world's 29 largest
chemical companies: how they put sustainability into action (six of
the 29 do not), and the six 'sustainability brands' they have
created. It begins with a history of stakeholders conflict, before
looking at various definitions of sustainability - by academics, by
the public and by investors. After the survey and analysis, the
book covers sustainability and 'greenwash' plus the ROI of
sustainability, and it gives five recommendations.
Security has been a human concern since the dawn of time. With the
rise of the digital society, information security has rapidly grown
to an area of serious study and ongoing research. While much
research has focused on the technical aspects of computer security,
far less attention has been given to the management issues of
information risk and the economic concerns facing firms and
nations. Managing Information Risk and the Economics of Security
provides leading edge thinking on the security issues facing
managers, policy makers, and individuals. Many of the chapters of
this volume were presented and debated at the 2008 Workshop on the
Economics of Information Security (WEIS), hosted by the Tuck School
of Business at Dartmouth College. Sponsored by Tuck's Center for
Digital Strategies and the Institute for Information Infrastructure
Protection (I3P), the conference brought together over one hundred
information security experts, researchers, academics, reporters,
corporate executives, government officials, cyber crime
investigators and prosecutors. The group represented the global
nature of information security with participants from China, Italy,
Germany, Canada, Australia, Denmark, Japan, Sweden, Switzerland,
the United Kingdom and the US. This volume would not be possible
without the dedicated work Xia Zhao (of Dartmouth College and now
the University of North Carolina, Greensboro) who acted as the
technical editor.
'Venus Isle' by Eric Johnson is a matching guitar folio featuring
note-for-note transcriptions from that recording. This folio is
from the Recorded Versions for Guitar series from Hal Leonard and
is the latest by Eric Johnson.
Mormonism is one of the fastest growing religions in the world. For
those who have wondered in what specific ways Mormonism differs
from the Christian faith, Mormonism 101 provides definitive
answers, examining the major tenets of Mormon theology and
comparing them with orthodox Christian beliefs. Perfect for
students of religion and anyone who wants to have answers when
Mormons come calling.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
|