Best Selling Books by Paul Benjamin

Paul Benjamin is the author of Dictionary of Farm Animal Behaviour (1985), Amimal Attack! (2009), Starcraft (2017), Shallow Graves (2002), Developing Missional Ecclesiology Through Worship at the Lake Jackson Church of Christ (2004).

81 - 120 of 200 results
<< >>

Dictionary of Farm Animal Behaviour

Amimal Attack!

release date: Jan 01, 2009
Amimal Attack!
Spider-Man juggles his life in high school with battling such enemies as Arcade, Spider-Woman, and Sandman.

Starcraft

release date: Apr 11, 2017
Starcraft
Presents a series of short stories from the world of StarCraft in graphic novel format involving an intergalactic war, alien races, and strange new worlds.

Developing Missional Ecclesiology Through Worship at the Lake Jackson Church of Christ

release date: Jan 01, 2004

Marvel Adventures Hulk

release date: Jan 01, 2008
Marvel Adventures Hulk
Bruce Banner''s old friend, Dr. Leonard Samson, is now a gamma-powered strongman working with Betty Ross to cure Bruce. But what dark secret will push Bruce over the edge? See: Hulk battle the green-haired goliath, Doc Samson! Thrill: as Bruce is reunited with the love of his life, Betty Ross! Cringe: As Rick Jones gives Doc Samson a piece of his mind! Witness: Monkey on the psychiatrist''s couch!

Customer Ownership of the Local Loop

release date: Jan 01, 1996

Tissue Response to Tooth Movement in Normal and Rachitic Rats

Categorization and mental architectures

release date: Jan 01, 1996

Parametric Confidence Bands on Cumulative Distribution Functions

Marvel Adventures Spider-Man

release date: Jan 01, 2010
Marvel Adventures Spider-Man
Think Spidey''s the only guy that can stick to stuff? Meet PASTE POT PETE!!! God of glue! Advocate of adhesive! Will he turn the Wallcrawler into the Wallstucker?

Reality and the Futility of Escape in the Early Short Stories of Gabriel Garćia Márquez

Information Disclosure on Mobile Devices

release date: Jan 01, 2014
Information Disclosure on Mobile Devices
The use of mobile applications continues to experience exponential growth. Using mobile apps typically requires the disclosure of location data, which often accompanies requests for various other forms of private information. Existing research on information privacy has implied that consumers are willing to accept privacy risks for relatively negligible benefits, and the offerings of mobile apps based on location-based services (LBS) appear to be no different. However, until now, researchers have struggled to replicate realistic privacy risks within experimental methodologies designed to manipulate independent variables. Moreover, minimal research has successfully captured actual information disclosure over mobile devices based on realistic risk perceptions. The purpose of this study is to propose and test a more realistic experimental methodology designed to replicate real perceptions of privacy risk and capture the effects of actual information disclosure decisions. As with prior research, this study employs a theoretical lens based on privacy calculus. However, we draw more detailed and valid conclusions due to our use of improved methodological rigor. We report the results of a controlled experiment involving consumers (n=1025) in a range of ages, levels of education, and employment experience. Based on our methodology, we find that only a weak, albeit significant, relationship exists between information disclosure intentions and actual disclosure. In addition, this relationship is heavily moderated by the consumer practice of disclosing false data. We conclude by discussing the contributions of our methodology and the possibilities for extending it for additional mobile privacy research.

Computational Experiments with Stochastic Approximation

release date: Jan 01, 2001

A Tale of Two Cities

release date: Jan 01, 2003

Hulk Book 4: Radioactive

release date: Jan 01, 2008

Privacy Regulation and Place Attachment

release date: Jan 01, 1994

A Study of the Effects of European Concert Performances on the Musical Attitudes of the Participating Students

Bridging the Divide

release date: Jan 01, 2014
Bridging the Divide
Organizational insiders have considerable influence on the effectiveness of information security efforts. However, most research conducted in this area fails to examine what these individuals believe about organizational security efforts. To help bridge this gap, this study assesses the mindset of insiders regarding their relationship with information security efforts and compares it against the mindset of information security professionals. Interviews were conducted with 22 ordinary insiders and 11 information security professionals, which effort provides insight into how insiders gauge the efficacy of recommended responses to information security threats. Several key differences between insiders'' and professionals'' security mindsets are also discussed.

Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect

release date: Jan 01, 2014
Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect
This study examines the potential of RFID technology to increase the agility of supply-chain e-commerce systems by mitigating the bullwhip effect. The bullwhip effect is a supply-chain phenomenon that reveals a lack of business agility characterized by the amplification of inventory variance. This study employs an experiment involving a modified Beer Distribution Game to simulate an RFID-enabled supply chain. The results provide empirical evidence that RFID technology can increase a supply chain''s agility and reduce the bullwhip effect by reducing inventory holding costs, stockout costs, and inventory-level variances. The results are all the more important when applied to interorganizational e-commerce systems.

Control-Related Motivations and Information Security Policy Compliance

release date: Jan 01, 2014
Control-Related Motivations and Information Security Policy Compliance
Employees'' failures to follow information security policy can be costly to organizations, causing organizations to implement security controls to motivate secure behavior. Information security research has explored many control-related motivations (e.g., self-efficacy, response efficacy, and behavioral control) in the context of ISP compliance; however, the behavioral effects of perceptions of autonomous functioning are not well understood in security contexts. This paper examines employee autonomy as a control-related motivation from the lens of self-determination theory and psychological reactance theory. Self-determination theory is widely used in other disciplines to explain intrinsically driven behavior, but has not been applied to security research. Psychological reactance theory is also widely used, but is only beginning to receive attention in security research. Self-determination and psychological reactance offer complementary yet opposite conceptualizations of trait-based autonomy. This paper posits that perceptions of trait-based autonomy influence self-efficacy and response efficacy. Through a survey of government employees, we provide support for several hypotheses. We also discuss important directions for the use of self-determination theory and psychological reactance theory in future research.

Social Media Use for Open Innovation Initiatives

release date: Jan 01, 2017
Social Media Use for Open Innovation Initiatives
Small- and medium-sized enterprises (SMEs) typically face resource and capability constraints that inhibit their innovation activities. One way SMEs can overcome these constraints is by complementing internal resources and capabilities with external knowledge, referred to as open innovation. With the proliferation of the Internet, SMEs have added social media to their traditional marketing activities. However, they rarely embrace the analytical capabilities of social media for innovation. Hence, we propose the semantic learning-based innovation framework (SLBIF) to guide SMEs in using the analytical capabilities of social media to innovate their products or services. Our framework includes three consecutive stages innovators should follow -- idea selection, idea refinement, and idea diffusion -- and which explain how to analyze customer preferences through semantic analysis of customer posts and identify lead users and opinion leaders using user-directed social network analysis.

Reformulating Path Planning Problems by Task-preserving Abstraction

release date: Jan 01, 1992

On the Estimation of Parameters of the Ornstein-Uhlenbeck and Related Stochastic Processes

Information Technology and Organizational Innovation

release date: Jan 01, 2020
Information Technology and Organizational Innovation
Researchers and practitioners have long believed that information technology (IT) is a key tool for fostering innovation. However, there is a certain inconsistency in the literature, which makes it challenging for researchers to figure out exactly how and why IT plays such a pivotal, strategic organizational role. The motivation for this research is the multiple contradictory results reported by studies investigating the influence of information technology (IT) on organizational innovation. This study utilizes a fit-based perspective in an attempt to disentangle these contradictions. Using Venkatraman''s (1989) seminal paper on fit, we conceive of two critical fit-based concepts: harmonious IT affordance in an organization (HITA) and a subsequent fit between HITA and organizational courage. HITA reflects a covariance fit (coalignment) between the three major IT affordances in an organization -- collaborative affordance, organizational memory affordance, and process management affordance. Organizational courage reflects the boldness (risk-taking ability) of the organization. Finally, HITA and organizational courage represent a matching fit (reflected as actualized HITA) that influences two kinds of innovation: exploratory and exploitative. Two studies, conducted in the US and Chinese contexts, provide support for this theory. The main contribution of the paper is in showing that IT can lead to innovation if a) organizational IT affordances harmoniously co-align (as HITA); b) and, organizational courage acts as a powerful contingency that actualizes HITA, and this actualized HITA influences innovation.

Formulating Patterns in Problem Solving

release date: Jan 01, 1992

When Computer Monitoring Backfires

release date: Jan 01, 2013
When Computer Monitoring Backfires
This manuscript examines the unintended consequences that organizational computer monitoring can foster within the firm. We apply justice and reactance theories to explain why monitoring can actually increase the occurrence of detrimental organizational behaviors. Our model suggests monitoring activities that invade employees'' privacy lead to perceived injustices, which provoke destructive behavior by employees. Empirical results obtained from 439 survey respondents employed in the banking, finance, and insurance industries provide support for most of our hypotheses. Computer monitoring was found to increase internal computer abuse but not antisocial behaviors. Privacy invasions resulting from the monitoring activities were related to perceptions of procedural injustice, which in turn influenced distributive injustice perceptions. Both injustices acted as direct precursors to internal computer abuse, but only distributive injustice was a significant antecedent to antisocial behavior. We discuss these findings and their limitations in the context of modern organizations that are inundated with information-security responsibilities.

Marvel Ultimate Super Hero Collection

release date: Jan 01, 2016

Signature Serial Killer

release date: Jan 01, 2011
Signature Serial Killer
The most notorious Australian signature serial killer was a fiend called William MacDonald who murdered time and time again, mutilating his victims with his own unique signature until finally he was caught. He became known as ''The Mutilator''. Paul B. Kidd had unlimited access to the Mutilator in prison and the result is this startling book, which also includes the stories of Australia''s other signature serial killers, including ''The Granny Killer'' John Glover, plus the history of serial killers around the world.

A Framework to Enhance the Appreciation and Motivation of Employees in an Automotive Factory

release date: Jan 01, 2018
81 - 120 of 200 results
<< >>


  • Aboutread.com makes it one-click away to discover great books from local library by linking books/movies to your library catalog search.

  • Copyright © 2024 Aboutread.com