Open Access. Powered by Scholars. Published by Universities.®

Other Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Other Business

A Management Plan For The Imported Fire Ant (Ifa) Migration Into Gateway Communities In East Tennessee, Elizabeth Ann Long Dec 2003

A Management Plan For The Imported Fire Ant (Ifa) Migration Into Gateway Communities In East Tennessee, Elizabeth Ann Long

Masters Theses

This thesis outlines a management plan for Gateway communities to use as a preparedness guide dealing with the establishment of the hybrid species of the Imported Fire Ant (IFA). The red species of IFA, Solenopsis invicta Buren, and the black species of IFA, Solenopsis richteri Forel, are located in southern Tennessee, but it appears that it is the hybrid species of their crossbreeding that is migrating into east Tennessee. The two species of IFA and their hybrid are moving north, both by natural migration and by being brought into the east Tennessee area on landscape plant materials and by the …


Deconstructing The Construction Industry: The Effects Of Labor Law 240/241 On The Home Building Industry In New York State, David E. Hay Jan 2003

Deconstructing The Construction Industry: The Effects Of Labor Law 240/241 On The Home Building Industry In New York State, David E. Hay

Seton Hall University Dissertations and Theses (ETDs)

.


Non-Business Use Of The World Wide Web : A Study Of Selected Western Australian Organisations, Craig Valli Jan 2003

Non-Business Use Of The World Wide Web : A Study Of Selected Western Australian Organisations, Craig Valli

Theses: Doctorates and Masters

Employees undertake a wide range of activities when they use the World Wide Web in the work place. Some of these activities may leave the modem Internet connected organisation vulnerable to undue or unknown risk, potential productivity losses and expense us a result of misuse or abuse or the Internet provision. Much of the existing literature on this subject points to a purported epidemic of misuse in the workplace. If this practice is so prevalent and widespread, what can modem Internet connected organisations do to identify the abuse and reduce the risks and losses that these abuses represent? To what …