Operationalizing seasonal work in Germany
In: IAW discussion papers no. 131 (September 2018)
1268 Ergebnisse
Sortierung:
In: IAW discussion papers no. 131 (September 2018)
In: Journal of enterprising culture: JEC, Band 14, Heft 3, S. 199-218
ISSN: 0218-4958
In presenting two perspectives through which SME networking can be discussed, namely a system view and a view that considers networks as entities, this paper aims to contribute to the current discourse on SME network resources. A network-level performance measurement system emphasizes win-win situations in a network between the leader company and the other members of the network. The main objective of the present paper is to develop a measurement system for analyzing the value of resources and competencies in a production network, which can be used to complement existing network-level performance measurement systems. By taking into account the resources in a network environment in this way, the value of the whole network and its resources comes to represent the sum of the resources fit with customer needs, the co-operation ability and willingness of the network, and the entrepreneurial capability of the network to create new business opportunities.
In response to widespread concerns about the integrity of research published in scholarly journals, several initiatives have emerged that are promoting research transparency through access to data underlying published scientific findings. Journal editors, in particular, have made a commitment to research transparency by issuing data policies that require authors to submit their data, code, and documentation to data repositories to allow for public access to the data. In the case of the American Journal of Political Science (AJPS) Data Replication Policy, the data also must undergo an independent verification process in which materials are reviewed for quality as a condition of final manuscript publication and acceptance. Aware of the specialized expertise of the data archives, AJPS called upon the Odum Institute Data Archive to provide a data review service that performs data curation and verification of replication datasets. This article presents a case study of the collaboration between AJPS and the Odum Institute Data Archive to develop a workflow that bridges manuscript publication and data review processes. The case study describes the challenges and the successes of the workflow integration, and offers lessons learned that may be applied by other data archives that are considering expanding their services to include data curation and verification services to support reproducible research.
BASE
In: Journal of international peacekeeping, Band 20, Heft 1-2, S. 1-131
ISSN: 1875-4104
Operationalizing Human Rights in Peace Missions / Christopher Michaelsen 1-3. - Reforming UN Peace Operations / Jeni Whalan 5-20. - UN Peacekeeping as the Most Presentable Part of Japan's 2015 Peace and Security Legislation / Tetsuya Toyoda 21-36. - The Legal Quagmire of Civilian Protection in Peacekeeping under Japan's New Security Legislation / Hitoshi Nasu 37-48. - Barriers to Operationalising the "Women, Peace & Security" Doctrine in United Nations Peacekeeping Operations / Susan Harris Rimmer 49-68. - Policing the Peacekeepers / Olivera Simić 69-85. - When Do-Gooders Do Harm / Kevin C. Chang 86-110. - The Power of Article 103 of the UN Charter on Treaty Obligations / Sophocles Kitharidis 111-131
World Affairs Online
Beauchamp's target article raises important questions about the features that often accompany fear. How reliable an indicator of fear is vigilance? Is it constitutive, cause, or consequence of fear? These questions force us towards a clearer definition of "fear."
BASE
In: Perspectives on Global Development and Technology, Band 17, Heft 2, S. 13-31
ISSN: 1569-1497
In: Journal of developing societies, Band 17, Heft 2, S. 13-32
ISSN: 0169-796X
In: Verfassung und Recht in Übersee: VRÜ = World comparative law : WCL, Band 18, Heft 1, S. 5-24
ISSN: 0506-7286
In: Verfassung und Recht in Übersee: VRÜ = World comparative law : WCL, Band 18, Heft 1, S. 5-24
ISSN: 0506-7286
World Affairs Online
In: State and local government review, Band 47, Heft 2, S. 134-145
Planning researchers often use planning capacity as an independent variable in studies of plan making and implementation. Increased capacity is associated with higher quality planning processes and plans. Yet, unlike in other fields such as public administration, planners have not devoted much attention to understanding the nature, impacts, and implications of planning capacity. This article synthesizes the literature concerning capacity in planning and related fields and proposes criteria that future definitions and measures of capacity should include.
In: HARNESSING DATA INNOVATION FOR MIGRATION POLICY. A HANDBOOK FOR PRACTITIONERS. IOM, April 2023
SSRN
View the Executive SummaryThis Letort Paper describes effective Counter Threat Finance strategies as a specific area where the capability of U.S. and allied militaries can be augmented for the purpose of targeted action against adversaries. With appropriate analysis and exploitation, financial data can be used to reveal patterns of enemy behavior, motivations, and possible intentions as well as lifestyles and networks, all of which will impact directly upon military operations within a counterinsurgency environment. The targeting of the financial, and perhaps more importantly, the economic base of an organization, will not only impact the operational capability of that organization, but can ultimately lead to its destruction. To date, these strategies have been used predominantly for the purpose of disruption. However, the potential application of such strategies goes far beyond—they have the potential to be a multifaceted weapon, capable not only of disruption of the enemy, but of detecting impending instability. Specific recommendations are proposed for making best use of the potential for financial intelligence as part of an integrated strategy for both forecasting and countering contemporary security threats. ; https://press.armywarcollege.edu/monographs/1311/thumbnail.jpg
BASE
In: Armed forces & society, Band 35, Heft 3, S. 501-525
ISSN: 1556-0848
Since the UN promulgation of the concept of human security in the early 1990s, one of the countries most enthusiastic about the new paradigm has been South Africa. That country has endeavored to reflect human security values in virtually all state activities. This article examines how South Africa has applied the concept to its armed forces. It argues that the military 'operationalization' is evident in two key respects: first, in the country's support for Africa's emerging security architecture; and second, in an increasing willingness to commit military forces to external peace operations. However, this application has largely occurred at the national strategic level. It was much less clear in 2007 that any human security ethos was forming within the South African armed forces themselves. Adapted from the source document.
In: Armed forces & society: official journal of the Inter-University Seminar on Armed Forces and Society : an interdisciplinary journal, Band 35, Heft 3, S. 501-525
ISSN: 0095-327X
In: Armed forces & society, Band 35, Heft 3, S. 501-525
ISSN: 1556-0848
Since the UN promulgation of the concept of human security in the early 1990s, one of the countries most enthusiastic about the new paradigm has been South Africa. That country has endeavored to reflect human security values in virtually all state activities. This article examines how South Africa has applied the concept to its armed forces. It argues that the military "operationalization" is evident in two key respects: first, in the country's support for Africa's emerging security architecture; and second, in an increasing willingness to commit military forces to external peace operations. However, this application has largely occurred at the national strategic level. It was much less clear in 2007 that any human security ethos was forming within the South African armed forces themselves.