NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 661 to 675 of 2,150 results Save | Export
Sue Brooks – ProQuest LLC, 2020
To keep the United States economically competitive in a rapidly changing world, business leaders are calling for employment candidates who can work efficiently in a globalized context with both language skills and cross-cultural dispositions critical to the economic success of the country. These language proficiency skills and cross-cultural…
Descriptors: Second Language Learning, Second Language Instruction, Mandarin Chinese, Immersion Programs
Peer reviewed Peer reviewed
Direct linkDirect link
Sablok, Gitika; Stanton, Pauline; Bartram, Timothy; Burgess, John; Boyle, Brendan – Education & Training, 2017
Purpose: The purpose of this paper is to examine the HRD practices of multinational enterprises (MNEs) operating in Australia to understand the value that MNEs place on investment in their human capital, particularly managerial talent. Design/methodology/approach: Drawing on a representative sample of 211 MNEs operating in Australia, this paper…
Descriptors: Human Resources, Labor Force Development, International Trade, Corporations
Peer reviewed Peer reviewed
Direct linkDirect link
Cho, Yonjoo; Park, Jiwon; Han, Soo Jeoung; Ju, Boreum; You, Jieun; Ju, Ahreum; Park, Chan Kyun; Park, Hye Young – European Journal of Training and Development, 2017
Purpose: The purpose of this study was to compare South Korean female executives' definitions of career success with those of male executives, identify their career development strategies for success and provide implications for research and practice. Two research questions guiding our inquiry included: How do female executives' definitions of…
Descriptors: Foreign Countries, Females, Administrators, Success
Cooper, Paul K. – ProQuest LLC, 2017
There has been a significant growth of portable devices capable of storing both personal data as well as sensitive organizational data. This growth of these portable devices has led to an increased threat of cyber-criminal activity. The purpose of this study was to gain a better understanding of security threats to the data assets of organizations…
Descriptors: Information Security, Crime, Computer Security, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Mayo, Michael; Howell, William; De Masi, Sara – Journal of Teaching in International Business, 2018
Educators have long sought how to prepare students to develop a global mind set and to work under conditions of complexity and uncertainty common in many world markets. The purpose of this study was to support educators in this cause by providing them with a "hands-on" exercise readily adaptable across the business curriculum to identify…
Descriptors: International Trade, Teaching Methods, Business Administration Education, Cultural Differences
Peer reviewed Peer reviewed
Direct linkDirect link
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Miller, Brian G. – ProQuest LLC, 2018
Ethics and compliance training of sales managers in the U.S. pharmaceutical industry showed little evidence that eLearning interventions developed to address employees' (a) awareness of unethical sales practices, (b) ability to judge a selling practice as unethical, and (c) intentions to speak up about unethical sales practices have had the…
Descriptors: Ethics, Social Cognition, Social Theories, Decision Making
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chowdhury, Manzoor E. – American Journal of Business Education, 2016
Business curriculums in many universities now include a senior Capstone course that integrates topics or materials from all business areas. This capstone course is designed to teach the skills of strategic thinking and analysis rather than mere facts or concepts. With that goal in mind, the ideal course is structured in such a way so that students…
Descriptors: Business Administration Education, Teaching Methods, Instructional Materials, Annual Reports
Peer reviewed Peer reviewed
Direct linkDirect link
Kim, Hyejin – Asia-Pacific Education Researcher, 2016
The last decade has witnessed the emergence of a new type of player in primary and secondary education in the Asia Pacific. This type is the transnational corporation (TNC) specializing in schools. I refer to these organizations as Education TNCs, which I define as private firms that operate for-profit schools in multiple countries. This paper…
Descriptors: Foreign Countries, Corporations, International Schools, Proprietary Schools
Nzyoka Yongo, Cyd W. – ProQuest LLC, 2016
Implementation and utilization of human resource information system (HRIS) though a very desirable prospect for many organizations, still remains a daunting task for many. This has been daunting because of prohibitive costs, security risks, top management resistance, employee attitudes, and so forth. Trends globally show that, organizations that…
Descriptors: Corporations, Human Resources, Labor Force Development, Competition
Peer reviewed Peer reviewed
Direct linkDirect link
Beets, S. Douglas – Journal of Academic Ethics, 2015
Tuition and government funding does not adequately support the mission of many colleges and universities, and increasingly, corporations are responding to this need by making payments to institutions of higher learning with significant contracted expectations, including influence of the curriculum and content of college courses. One large, public…
Descriptors: Ethics, Corporations, School Business Relationship, College Curriculum
Beyer, Dawn M. – ProQuest LLC, 2014
The protection of sensitive data and technologies is critical in preserving United States (U.S.) national security and minimizing economic losses. However, during a cyber attack, the operational capability to constrain the exfiltrations of sensitive data and technologies may not be available. A cyber preparedness methodology (CPM) can improve…
Descriptors: Case Studies, Computer Security, National Security, Risk Management
Peer reviewed Peer reviewed
Direct linkDirect link
Ingunn Johanne Ness; Gunn Elisabeth Søreide – Journal of Workplace Learning, 2014
Purpose: The aim of this article is to investigate the creative knowledge processes which are often invisible in innovation work. Design/methodology/approach: An ethnographic field study was conducted following three multidisciplinary groups; two groups in an Oil and Gas Company, Statoil and one group in a Research Institute. Data collection…
Descriptors: Creative Thinking, Cognitive Psychology, Innovation, Corporations
Peer reviewed Peer reviewed
Direct linkDirect link
Wieczorek, Oliver; Beyer, Stephanie; Münch, Richard – Higher Education: The International Journal of Higher Education Research, 2017
In this article, we apply Max Weber's ideal types of fief and benefice feudalism to elite and non-elite chemistry departments in the USA. We develop a theoretical analogy of academic feudalism in regard to three dimensions: power relations, engagement with companies, and the impact of structural changes on the autonomy of scholars. We use a mixed…
Descriptors: Higher Education, Institutional Autonomy, Chemistry, Selective Admission
Johnson, Kenneth T. – ProQuest LLC, 2017
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Descriptors: Information Security, Corporations, Telecommunications, Industry
Pages: 1  |  ...  |  41  |  42  |  43  |  44  |  45  |  46  |  47  |  48  |  49  |  ...  |  144