Loading [MathJax]/jax/output/CommonHTML/jax.js
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    ABOUT NORMS AND CAUSES

    Knowing the norms of a domain is crucial, but there exists no repository of norms. We propose a method to extract them from texts: narrative texts generally do not describe a norm, but rather the discrepancies between what actually happened, and the corresponding normal sequence of events. Answers about the causes of an event often reveal the implicit norms. We apply this idea to the domain of driving, and validate it by designing algorithms that identify, in a text, the "basic" norms to which it refers implicitly.

  • articleNo Access

    On PN-groups and the norm of minimal subgroups

    A finite group is called a PN-group if all its minimal subgroups are normal. In this paper, PN-groups were characterized by investigating on the generalized norm of minimal subgroups.

  • articleNo Access

    False reputation in social control

    A simulation study is conduced on the spread of reputation in mixed respectful-cheater population. The effects of various mechanism giving raise to false reputation are shown, together with a discussion of foreseen results. The actual results of the simulation are then presented; informational accuracy is found to be an essential condition to maintain an advantage for the norms-followers.

  • articleNo Access

    MY IDEA IS OUR IDEA! SUPPORTING USER-DRIVEN INNOVATION ACTIVITIES IN CROWDSOURCING COMMUNITIES

    There is a growing stream of research unraveling individual motivations to participate in idea crowdsourcing and online user communities. While the current research has largely focused on individual user characteristics and overlooked the features of surrounding communities, our research turns the focus onto the actual community where knowledge is shared and created. We investigate the relationships between perceived support from a crowdsourcing community, and the users' intentions to share knowledge. Our research is based on a survey of 241 Chinese users of IdeasProject and shows that (1) for community trust, trust in the hosting firm has a significant effect on knowledge-sharing intentions, while collaborative norms do not; (2) for community support, both technology-based support and knowledge-based support have an effect on knowledge-sharing intentions. From a community management viewpoint, our results demonstrate the importance of providing continued support for knowledge integration, such as more opportunities for user-to-user interaction and features for providing constructive feedback.

  • articleNo Access

    Innovation in the Teaching Mathematics: Rethinking the Foundational Principles that Underpin Teaching

    If we want to innovate mathematics education — if we want to achieve something beyond conformity and compliance in mathematics education — these institutional norms need to be challenged. In this paper, I look at the results-first research methodology in which the institutional norms are challenged by the simple goal of increasing student thinking in the classroom. I share the specific results that emerged out of this research and use it as a specific case to argue that real innovation in mathematics education can only occur if we are willing to challenge the institutional norms that have been with us for 150 years.

  • articleOpen Access

    PERCEPTIONS AND VIABILITY OF ISLAMIC WEALTH MANAGEMENT AMONG STAFF AT THE ISLAMIC UNIVERSITY IN UGANDA, KAMPALA CAMPUS, KIBULI KAMPALA (IUIU-KC)

    This study investigates the role of attitudes, behavioral beliefs, and normative beliefs in shaping the intention to adopt Islamic Wealth Management (IWM) among staff at the Islamic University in Uganda, Kampala Campus (IUIU-KC). Given the varied perceptions surrounding IWM understanding these influencing factors is crucial for its viability among stakeholders. By employing a qualitative exploratory approach, data were collected through interviews with purposively selected academicians from the Faculty of Management Studies. Thematic analysis revealed that positive attitudes, supportive behavioral beliefs, and favorable normative beliefs significantly encourage IWM adoption. The findings imply that fostering these positive perceptions can enhance IWM integration within educational and financial institutions. By understanding these key drivers, policymakers, educators, and financial institutions can develop targeted strategies to promote IWM adoption. This approach not only aids stakeholder engagement and curriculum refinement in Higher Education Institutions (HEIs) but also supports informed policy-making, advancing the broader acceptance and integration of IWM in Uganda and similar contexts. Further still IWM may be an option toward achieving the 17 UN Sustainable Development Goals if implemented.

  • chapterNo Access

    Chapter 16: Security Governance in Southeast Asia: The Paradoxes of Cooperation

      Southeast Asia is a byword for diversity. It is possible to find examples of nearly every conceivable form of political organisation and level of economic development imaginable in the region, from rich Singapore to poor Laos, and from democratic Indonesia to ‘communist’ Vietnam, with lots of variations in between (Case 2002). And yet amid all this heterogeneity there are some surprising commonalities and congruencies. Much of the congruence springs from a shared history; much of the commonality flows from a desire to overcome the legacy of ‘late’ development and a concomitant sense of insecurity. Paradoxically enough, therefore, the pursuit of stability and independence in the face of an, at times, inauspicious geopolitical context has given Southeast Asian states reasons to cooperate despite their diversity. Security governance in Southeast Asia continues to reflect the imprint of such historical factors to this day (Collins 2003; Emmers 2009; Goh 2008). As a result, if we want to understand the evolution and contemporary dimensions of security governance in the region, we must begin by looking backwards to see why Southeast Asian states continue to have such a preoccupation with ‘Westphalian’ forms of security and stability…

    • chapterNo Access

      Chapter 2: Frameworks for Socially Responsible Marketing and Ethical Communication

      This chapter explores the concepts of ethics, morals and social responsibility from organisational and societal perspectives covering both marketing that is focused on profit and marketing focused on bringing about social benefit. It discusses the meanings of social responsibility from different paradigmatic viewpoints and highlights the advantages and limitations of particular approaches. The chapter also considers some aspects of legal and regulatory frameworks and the potential for the development of codes of conduct for socially responsible for-profit marketing and social marketing. The discussion is positioned in a global context and is grounded by intercultural considerations and the diversity of ethical perspectives and norms across cultures.

    • chapterNo Access

      Chapter 14: ASEAN’s 20 Years of Continued Efforts to Engage China on the South China Sea: Lessons from the DOC and the Way Forward

      In 2002, an important milestone was laid on one of the central-most security issues of Southeast Asia when ASEAN and China signed the Declaration of Conduct of the Parties on the South China Sea (DOC). The document soon became a frequently talked about topic relating to the regional security architecture, one that raised much hope but also questions about the management of one of the most enduring security challenges of the region.

      This chapter seeks to review ASEAN’s approach to building a set of codes to regulate the conduct of the stakeholders in the South China Sea, and how the Declaration of Conduct of the Parties on the South China Sea (DOC) influenced ASEAN engagement with China after its signing. The chapter would also assess the DOC’s implementation over the past 20 years, reviews current efforts to upgrade the DOC into the supposedly superior Code of Conduct, and suggest a way forward.