New Releases by Paul Benjamin

Paul Benjamin is the author of John Dewey's Metaphysical Theory (2023), World of Warcraft: Shaman (2023), Disney Princess: Beyond the Extraordinary (2021), Pantheon High, Volume 2 (2020), Pantheon High, Volume 3 (2020).

1 - 30 of 90 results
>>

John Dewey's Metaphysical Theory

release date: Oct 24, 2023
John Dewey's Metaphysical Theory
John Dewey’s Metaphysical Theory provides an overview and technical exposition of Dewey’s mature ontological theory. In particular, “nature,” “experience,” and their relationship, are given extended treatment through a close reading of primary texts. Following Dewey’s metaphysical postulates and conclusions, the book suggests how experience may reveal the fundamental traits of nature. In addition, the book reveals how Dewey understood the ways in which all phenomena may relate within an inclusive economy of existence, what it means to have an “identity,” what constitutes “selfhood” or personality, and how metaphysics relates to the ideals of democracy and social ethics.

World of Warcraft: Shaman

release date: Mar 07, 2023

Disney Princess: Beyond the Extraordinary

release date: Jan 01, 2021
Disney Princess: Beyond the Extraordinary
"Short comics stories full of fun and cheer with all of the Disney Princesses!"--

Pantheon High, Volume 2

release date: Apr 17, 2020
Pantheon High, Volume 2
With Pantheon High out of commission, Aziza and Yukio must attend Gilgamesh High, home to their greatest rival demigods. But when Yukio is getting beaten up, Ketan - the demigod of bad luck - comes along and offers his help and protection. Will being friends with the bad luck demigod bring Yukio good luck? Meanwhile, Griffin manages to tag along when the Valkyries escort Grace to Valhalla...

Pantheon High, Volume 3

release date: Apr 17, 2020
Pantheon High, Volume 3
The New York Times–bestselling author’s manga series continues as the demigod students prepare for midterms—and fight to save the world! Gimme a T-R-O-U-B-L-E! What''s that spell? Trouble, with a capital T. And that''s what Pantheon High''s got going for it as the demigod students into midterm season. Fortunately they’ve been hitting the books extra hard to earn their marks in heroism, and when you throw in an extra-curricular excursion to fine tune their fighting skills, there''s no doubt that Griffin, Grace, Aziza and Yukio are going to get an A+ in stopping evil!

Pantheon High, Volume 1

release date: Apr 17, 2020
Pantheon High, Volume 1
Danger looms when the gods of the world send their kids to high school in this manga series debut that “entertains with intelligence and humor” (Publishers Weekly). Welcome to a modern-day world where the deities of all religions coexist. Norse Gods roam Asgard, Greek Gods rule Mount Olympus, Egyptian Gods orbit around Ra, Japanese Gods bestow luck and wisdom . . . and their demigod children all attend the same private high school in Los Angeles! The students of Pantheon High aren’t your typical bunch. Grace wonders is she’ll ever understand her father Tyr, the Norse god of war. Griffin, child of Hades, is having a hell of a time adjusting. Yukio, son of Benten, gets by on his endless luck, while Aziza, daughter of Ra, has the heat of the sun at her fingertips. But when evil gods from across the globe band together, these mythical teens are the only ones who can stop them from plunging the world into darkness!

Disney Princess

release date: Jan 01, 2020
Disney Princess
A collection of all original comic short stories featuring the Disney princesses, including Rapunzel, Snow White and Tiana.

Detestable and Wicked Arts

release date: Jan 01, 2020
Detestable and Wicked Arts
"While interpersonal, local, and regional contexts are critical to the analysis of witch-hunting in early New England, this book shows that a full understanding of the Puritan colonies'' battle against black magic can only be achieved by placing it in a trans-Atlantic perspective"--

Information Technology and Organizational Innovation

release date: Jan 01, 2020
Information Technology and Organizational Innovation
Researchers and practitioners have long believed that information technology (IT) is a key tool for fostering innovation. However, there is a certain inconsistency in the literature, which makes it challenging for researchers to figure out exactly how and why IT plays such a pivotal, strategic organizational role. The motivation for this research is the multiple contradictory results reported by studies investigating the influence of information technology (IT) on organizational innovation. This study utilizes a fit-based perspective in an attempt to disentangle these contradictions. Using Venkatraman''s (1989) seminal paper on fit, we conceive of two critical fit-based concepts: harmonious IT affordance in an organization (HITA) and a subsequent fit between HITA and organizational courage. HITA reflects a covariance fit (coalignment) between the three major IT affordances in an organization -- collaborative affordance, organizational memory affordance, and process management affordance. Organizational courage reflects the boldness (risk-taking ability) of the organization. Finally, HITA and organizational courage represent a matching fit (reflected as actualized HITA) that influences two kinds of innovation: exploratory and exploitative. Two studies, conducted in the US and Chinese contexts, provide support for this theory. The main contribution of the paper is in showing that IT can lead to innovation if a) organizational IT affordances harmoniously co-align (as HITA); b) and, organizational courage acts as a powerful contingency that actualizes HITA, and this actualized HITA influences innovation.

Marvel Adventures Spider-Man Vol. 13

release date: Jan 17, 2019
Marvel Adventures Spider-Man Vol. 13
Collects Marvel Adventures Spider-Man (2005) #49-52. The all-new, all-ages, all-action fun continues! It''s wall-to-wall mayhem in the Mighty Marvel Manner with four original tales of everybody''s favorite teenage wall-crawler! Featuring the new Sinister Six and Paste Pot Pete!

Marvel Vault of Heroes: Hulk: Biggest and Best

release date: Jan 01, 2019
Marvel Vault of Heroes: Hulk: Biggest and Best
"Originally published by Marvel as Marvel adventures: Hulk issues #1-12"--Indicia.

A Framework to Enhance the Appreciation and Motivation of Employees in an Automotive Factory

release date: Jan 01, 2018

Thor & Hulk

release date: Sep 06, 2017
Thor & Hulk
It''s a normal, quiet day at Empire State University, filled with lots of lectures and higher education - until a fistfight breaks out! A big one! And Doreen Green gets a new Flying Squirrel suit from a mystery benefactor that would render her even more unbeatable, if such a thing was scientifically possible! But a new super villain in town wants to mold Squirrel Girl into the perfect minion. Gasp at a secret invasion of character motivations! Thrill at a civil war of emotions! Boggle as monsters truly get unleashed and Doreen''s fate hangs in the balance! Also, machine-gun-wielding bears! It''s squirrels and girls and punching, oh my! Plus: When Squirrel Girl goes to the Negative Zone, it''s up to Koi Boi, Chipmunk Hunk and Brain Drain to keep the city safe. Uh-oh! Collecting UNBEATABLE SQUIRREL GIRL (2015B) #17-21.

Starcraft

release date: Apr 11, 2017
Starcraft
Presents a series of short stories from the world of StarCraft in graphic novel format involving an intergalactic war, alien races, and strange new worlds.

Social Media Use for Open Innovation Initiatives

release date: Jan 01, 2017
Social Media Use for Open Innovation Initiatives
Small- and medium-sized enterprises (SMEs) typically face resource and capability constraints that inhibit their innovation activities. One way SMEs can overcome these constraints is by complementing internal resources and capabilities with external knowledge, referred to as open innovation. With the proliferation of the Internet, SMEs have added social media to their traditional marketing activities. However, they rarely embrace the analytical capabilities of social media for innovation. Hence, we propose the semantic learning-based innovation framework (SLBIF) to guide SMEs in using the analytical capabilities of social media to innovate their products or services. Our framework includes three consecutive stages innovators should follow -- idea selection, idea refinement, and idea diffusion -- and which explain how to analyze customer preferences through semantic analysis of customer posts and identify lead users and opinion leaders using user-directed social network analysis.

US LAWN TENNIS ASSN & THE WW

release date: Aug 27, 2016
US LAWN TENNIS ASSN & THE WW
This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work. This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work. As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

Marvel Ultimate Super Hero Collection

release date: Jan 01, 2016

United States Lawn Tennis Association and the World War - War College Series

release date: Feb 24, 2015
United States Lawn Tennis Association and the World War - War College Series
This is a curated and comprehensive collection of the most important works covering matters related to national security, diplomacy, defense, war, strategy, and tactics. The collection spans centuries of thought and experience, and includes the latest analysis of international threats, both conventional and asymmetric. It also includes riveting first person accounts of historic battles and wars.Some of the books in this Series are reproductions of historical works preserved by some of the leading libraries in the world. As with any reproduction of a historical artifact, some of these books contain missing or blurred pages, poor pictures, errant marks, etc. We believe these books are essential to this collection and the study of war, and have therefore brought them back into print, despite these imperfections.We hope you enjoy the unmatched breadth and depth of this collection, from the historical to the just-published works.

Squeeze Play

release date: Aug 01, 2014
Squeeze Play
Privatdetektiv Max Klein bliver stillet på en af sin karrieres største opgaver. Han skal redde den tidligere baseball-stjerne George Chapmans liv. Mordtrusler svirrer i luften og bliver snart erstattet af egentlige hævnmotiver, mødet med en smuk, mystisk kvinde, politiske intriger blandt New Yorks mest indflydelsesrige personer og mord ... "Austers debut, den hårdkogte detektivroman Squeeze Play, skrev Auster som 31-årig i forsøget på at skrabe penge hjem til familien. Nu er den her endelig, i sin egen ret, med Austers navn som diskret skygget skrift under Benjamins på forsiden. Og den er interessant også uden for denne sammenhæng ... Det er noir, så det oser, det er dybt tilfredsstillende. Lige ud af Raymond Chandler, også i den typiske billedsætning af den fatale kvinde bag alle viderværdighederne. Benjamin/Auster skriver lethåndet, med fin fornemmelse for krydrede situationer og udsyrede personer, med kynisk humor og en forbløffende sikker, kringlet plotkonstruktion ... Og ud fra genren selv er den lydefri pastiche egentlig mesterværket." - Peter Kierkegaard, Information

Information Disclosure on Mobile Devices

release date: Jan 01, 2014
Information Disclosure on Mobile Devices
The use of mobile applications continues to experience exponential growth. Using mobile apps typically requires the disclosure of location data, which often accompanies requests for various other forms of private information. Existing research on information privacy has implied that consumers are willing to accept privacy risks for relatively negligible benefits, and the offerings of mobile apps based on location-based services (LBS) appear to be no different. However, until now, researchers have struggled to replicate realistic privacy risks within experimental methodologies designed to manipulate independent variables. Moreover, minimal research has successfully captured actual information disclosure over mobile devices based on realistic risk perceptions. The purpose of this study is to propose and test a more realistic experimental methodology designed to replicate real perceptions of privacy risk and capture the effects of actual information disclosure decisions. As with prior research, this study employs a theoretical lens based on privacy calculus. However, we draw more detailed and valid conclusions due to our use of improved methodological rigor. We report the results of a controlled experiment involving consumers (n=1025) in a range of ages, levels of education, and employment experience. Based on our methodology, we find that only a weak, albeit significant, relationship exists between information disclosure intentions and actual disclosure. In addition, this relationship is heavily moderated by the consumer practice of disclosing false data. We conclude by discussing the contributions of our methodology and the possibilities for extending it for additional mobile privacy research.

Bridging the Divide

release date: Jan 01, 2014
Bridging the Divide
Organizational insiders have considerable influence on the effectiveness of information security efforts. However, most research conducted in this area fails to examine what these individuals believe about organizational security efforts. To help bridge this gap, this study assesses the mindset of insiders regarding their relationship with information security efforts and compares it against the mindset of information security professionals. Interviews were conducted with 22 ordinary insiders and 11 information security professionals, which effort provides insight into how insiders gauge the efficacy of recommended responses to information security threats. Several key differences between insiders'' and professionals'' security mindsets are also discussed.

Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect

release date: Jan 01, 2014
Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect
This study examines the potential of RFID technology to increase the agility of supply-chain e-commerce systems by mitigating the bullwhip effect. The bullwhip effect is a supply-chain phenomenon that reveals a lack of business agility characterized by the amplification of inventory variance. This study employs an experiment involving a modified Beer Distribution Game to simulate an RFID-enabled supply chain. The results provide empirical evidence that RFID technology can increase a supply chain''s agility and reduce the bullwhip effect by reducing inventory holding costs, stockout costs, and inventory-level variances. The results are all the more important when applied to interorganizational e-commerce systems.

Control-Related Motivations and Information Security Policy Compliance

release date: Jan 01, 2014
Control-Related Motivations and Information Security Policy Compliance
Employees'' failures to follow information security policy can be costly to organizations, causing organizations to implement security controls to motivate secure behavior. Information security research has explored many control-related motivations (e.g., self-efficacy, response efficacy, and behavioral control) in the context of ISP compliance; however, the behavioral effects of perceptions of autonomous functioning are not well understood in security contexts. This paper examines employee autonomy as a control-related motivation from the lens of self-determination theory and psychological reactance theory. Self-determination theory is widely used in other disciplines to explain intrinsically driven behavior, but has not been applied to security research. Psychological reactance theory is also widely used, but is only beginning to receive attention in security research. Self-determination and psychological reactance offer complementary yet opposite conceptualizations of trait-based autonomy. This paper posits that perceptions of trait-based autonomy influence self-efficacy and response efficacy. Through a survey of government employees, we provide support for several hypotheses. We also discuss important directions for the use of self-determination theory and psychological reactance theory in future research.

When Computer Monitoring Backfires

release date: Jan 01, 2013
When Computer Monitoring Backfires
This manuscript examines the unintended consequences that organizational computer monitoring can foster within the firm. We apply justice and reactance theories to explain why monitoring can actually increase the occurrence of detrimental organizational behaviors. Our model suggests monitoring activities that invade employees'' privacy lead to perceived injustices, which provoke destructive behavior by employees. Empirical results obtained from 439 survey respondents employed in the banking, finance, and insurance industries provide support for most of our hypotheses. Computer monitoring was found to increase internal computer abuse but not antisocial behaviors. Privacy invasions resulting from the monitoring activities were related to perceptions of procedural injustice, which in turn influenced distributive injustice perceptions. Both injustices acted as direct precursors to internal computer abuse, but only distributive injustice was a significant antecedent to antisocial behavior. We discuss these findings and their limitations in the context of modern organizations that are inundated with information-security responsibilities.

Dad, don't go to work

release date: Nov 22, 2012
Dad, don't go to work
This humorous and incisive collection of poetry celebrates the joys of childhood and of being a father. Paul Benjamin captures in verse his delight at sharing the world with his son. From family outings to cricket on the lawn, sharing time with each other and the heartache of saying goodbye, Dad, don''t go to work will be loved by parents and children alike. Ideal for reading aloud or quiet enjoyment, this collection will nurture lovers of life, children and words.

Voices of Yugoslav Jewry

release date: Feb 01, 2012
Voices of Yugoslav Jewry
Voices of Yugoslav Jewry emphasizes the role of history in shaping Yugoslav Jewish identity. World War II imposed irreversible effects on this population of Jews, leaving them with an acute sense of disjuncture and fragmentation. This once-unified Jewish community lost its secure place in the politico-symbolic order of a single multiethnic state, and the surviving local Jewish communities, which are now a part of new states, face the task of refashioning their identities once again. The process of creating the new Yugoslavia has allowed for the emergence of a new Jewish collective voice, one that blended harmoniously with the emerging voice of Tito. This collective voice manifested itself by using language, material culture, and dramaturgical performances in ways that exhibited high public integration with the symbolic order of the new state. In searching for the voices of individuals and listening to them closely, a wide range of diverse individual experiences and ways of constructing meaningful Jewish selves can be heard. It is these voices that constitute the core of the book.

The Australian Crime File

release date: Jan 01, 2012
The Australian Crime File
Now for the first time the bumper edition of the two best-selling volumes of Australian crime in one book. Featuring over 100 stories from the annals of our criminal history, from high-profile murder cases to crimes of the macabre and bizarre. Includes: THE CLAREMONT SERIAL MURDERS, THE SNOWTOWN SERIAL MURDERS, THE LESBIAN VAMPIRE MURDER, THE CASE OF THE WALKING CORPSE, ALAN BOND CROOK OR HERO?, AZARIA: HOW COULD WE HAVE GOT IT SO WRONG?, CELLULOID SERIAL KILLERS and ROSALEEN NORTON - THE WICKET WITCH OF KINGS CROSS.
1 - 30 of 90 results
>>


  • Aboutread.com makes it one-click away to discover great books from local library by linking books/movies to your library catalog search.

  • Copyright © 2024 Aboutread.com