880 resultados para Conference on Security, Stability, Development, and Cooperation in Africa (1992)
Resumo:
"April 1980."
Resumo:
A campaign against Apaches [1885-86] (Captain Maus' narrative): p. 450-471.
Resumo:
Mode of access: Internet.
Resumo:
"June 1996."
Resumo:
"B-286196"--P. 3.
Resumo:
"September 13, 1990".
Resumo:
Item 1040-A, 1040-B (MF).
Resumo:
"July 12, 1988" -- pt.2.
Resumo:
Humans are highly social animals and often help unrelated individuals that may never reciprocate the altruist's favour(1-5). This apparent evolutionary puzzle may be explained by the altruist's gain in social image: image-scoring bystanders, also known as eavesdroppers, notice the altruistic act and therefore are more likely to help the altruist in the future(5-7). Such complex indirect reciprocity based on altruistic acts may evolve only after simple indirect reciprocity has been established, which requires two steps. First, image scoring evolves when bystanders gain personal benefits from information gathered, for example, by finding cooperative partners(8-10). Second, altruistic behaviour in the presence of such bystanders may evolve if altruists benefit from access to the bystanders. Here, we provide experimental evidence for both of the requirements in a cleaning mutualism involving the cleaner fish Labroides dimidiatus. These cleaners may cooperate and remove ectoparasites from clients or they may cheat by feeding on client mucus(11,12). As mucus may be preferred over typical client ectoparasites(13), clients must make cleaners feed against their preference to obtain a cooperative service. We found that eavesdropping clients spent more time next to 'cooperative' than 'unknown cooperative level' cleaners, which shows that clients engage in image-scoring behaviour. Furthermore, trained cleaners learned to feed more cooperatively when in an `image-scoring' than in a 'non-image-scoring' situation.
Resumo:
Brand extensions are increasingly used by multinational corporations in emerging markets such as China. However, understanding how consumers in the emerging markets evaluate brand extensions is hampered by a lack of research in the emerging markets contexts. To address the knowledge void, we built on an established brand extension evaluation framework in the West, namely Aaker and Keller (1990)1. Aaker , D. A. and Keller , K. L. 1990 . Consumer evaluations of brand extensions . Journal of Marketing , 54 ( 1 ) : 27 – 41 . [CrossRef], [Web of Science ®] View all references, and extended the model by incorporating two new factors: perceived fit based on brand image consistency and competition intensity in the brand extension category. The additions of two factors are made in recognition of the uniqueness of the considerations of consumers in the emerging markets in their brand extension evaluations. The extended model was tested by an empirical experiment using consumers in China. The results partly validated the Aaker and Keller model, and evidence that both newly added factors were significant in influencing consumers' evaluation of brand extensions was also found. More important, one new factor proposed, namely, consumer-perceived fit based on brand image consistency, was found to be more significant than all the factors in Aaker and Keller's original model, suggesting that the Aaker and Keller model may be limited in explaining how consumers in the emerging markets evaluate brand extensions. Further research implications and limitations are discussed in the paper.
Resumo:
Information technology is at the centre of today’s business environment. The increasing importance of e-commerce and the integration of information systems in all areas of a business means it is crucial for managers to understand and implement IS (information systems). This major text, now in its second edition, provides the skills and knowledge necessary to choose the right systems, and to develop and manage them effectively. Business Information Systems: Technology, Development and Management assumes no prior knowledge of IS or IT, and emphasises the importance of IS to management decision making. It takes a 3 part structure: Part One covers hardware and software technologies; Part Two looks at information systems analysis and design; and Part Three describes the strategic management of IS. This successful format allows each section to be studied alongside individual modules, and enables students to focus clearly on specific areas and use the book for more than one course. This book is suitable for college students, undergraduate degree and postgraduate students taking courses with modules in the practical IT skills of selection, implementation, management and use of BIS. The practical sections are also of use to managers in industry involved in the development and use of IS.
Resumo:
A comprehensive introduction to the technology, development and management of business information systems. The book assumes no prior knowledge of IS or IT, so that new concepts and terms are defined as clearly as possible, with explanations in the text, and definitions at the margin. In this fast-moving area, the book covers both the crucial underpinnings of the subject as well as the most recent business and technology applications. It is written for students on any IS, BIS or MIS course from undergraduate to postgraduate and MBA level within a Business or Computer Science Department.