Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Economic development (21)
- Informal economy/underground economy (21)
- Tax non-compliance (19)
- Public policy (13)
- Informal economy (10)
-
- Nanotechnology (10)
- URBAN PUBLIC POLICY (10)
- Emerging Technologies (9)
- National Security (8)
- Social Implications of ICT (8)
- Location-Based Services (7)
- Uberveillance (7)
- Austerity (6)
- Cyber (6)
- Cyber Operations (6)
- Entrepreneurship (6)
- Privacy (6)
- Taxation (6)
- United States (6)
- Community development (5)
- Cyber operations (5)
- Innovation (5)
- Nukes (5)
- Partnership (5)
- Sequestration (5)
- Surveillance (5)
- Business (4)
- Competition Law (4)
- Conflict (4)
- Cyber defense (4)
- Publication Year
- Publication
-
- Colin C Williams (30)
- Philip Shapira (21)
- Jan Kallberg (14)
- Professor Katina Michael (12)
- Herman L. Boschken (11)
-
- Associate Professor Katina Michael (10)
- Maria May Seitanidi (10)
- Shishir Mathur (7)
- Michael Diathesopoulos (6)
- Gary S Fields (3)
- Hristina Petrova (3)
- Justin Schwartz (3)
- Jonathan GS Koppell (2)
- Kevin F Hallock (2)
- Thomas Dick (2)
- Analia Marsella Sende (1)
- Badri Narayanan G. (1)
- Beat Habegger (1)
- Carlos Mena-Labarthe (1)
- Daniel Lyons (1)
- Donald J. Kochan (1)
- Dr. Mutaz M. Al-Debei (1)
- George H Baker (1)
- Grant Cairncross (1)
- Huseyin Ozgur Prof.Dr. (1)
- Iván Rojas V (1)
- Jeffrey Keisler (1)
- John H Bishop (1)
- Lance A Compa (1)
- Lynette H Ong, Dr (1)
Articles 1 - 30 of 158
Full-Text Articles in Business
Helping The Growing Ranks Of Poor Immigrants Living In America’S Suburbs, Els De Graauw, Shannon Gleeson, Irene Bloemraad
Helping The Growing Ranks Of Poor Immigrants Living In America’S Suburbs, Els De Graauw, Shannon Gleeson, Irene Bloemraad
Shannon Gleeson
Ask Americans to draw a mental map of who lives where, and they will likely say that immigrants and the poor live in large cities such as New York, Chicago, Los Angeles, and San Francisco, while middle-class whites make their homes in the surrounding suburbs. But these mental maps are often inaccurate. Today, more poor people live in suburbs than in central cities, and more than half of all metropolitan-area immigrants reside in suburbs. Immigration, job growth, and residential choices are making our nation’s suburbs more economically and culturally diverse. How are suburban leaders responding to disadvantaged immigrants in their …
Decision Modeling For Housing And Community Development: A Methodology For Evidence-Based Urban And Regional Planning, Michael P. Johnson Jr.
Decision Modeling For Housing And Community Development: A Methodology For Evidence-Based Urban And Regional Planning, Michael P. Johnson Jr.
Michael P. Johnson
Evaluating The Impact Of Manufacturing Extension Services On Establishment Performance, Clifford A. Lipscomb, Jan Youtie, Philip Shapira, Sanjay K. Arora, Andy Krause
Evaluating The Impact Of Manufacturing Extension Services On Establishment Performance, Clifford A. Lipscomb, Jan Youtie, Philip Shapira, Sanjay K. Arora, Andy Krause
Philip Shapira
Developing A Holistic Approach For Tackling Undeclared Work: Background Paper, Colin C. Williams
Developing A Holistic Approach For Tackling Undeclared Work: Background Paper, Colin C. Williams
Colin C Williams
"Use" Valuation Under The 1976 Tax Reform Act: Problems And Implications, Michael D. Boehlje, Neil E. Harl
"Use" Valuation Under The 1976 Tax Reform Act: Problems And Implications, Michael D. Boehlje, Neil E. Harl
Neil E. Harl
With the rapid rise in farmland*values during recent years, farmers and farm organizations have argued that land values have little relationship to agricultural productivity. The fact that farmers have been the dominant purchasers in the farm real estate market during this period of time would seem to discredit this argument to some degree, but public officials have been sympathetic to the farmers' arguments. Some state legislatures, particularly in areas o f the country where urban expansion has placed upward pressures on land values, have adopted procedures to value farmland based on its agricultural productivity for purposes of assessing property tax.
Multilevel Marketing Diffusion And The Risk Of Pyramid Scheme Activity: The Case Of Fortune Hi‐Tech Marketing In Montana, Stacie A. Bosley, Kim Mckeage
Multilevel Marketing Diffusion And The Risk Of Pyramid Scheme Activity: The Case Of Fortune Hi‐Tech Marketing In Montana, Stacie A. Bosley, Kim Mckeage
Stacie Bosley
While statisticians have simulated the expected rate of growth in pyramid schemes, this research examines actual data on the spread of an alleged pyramid scheme in Montana. Fortune Hi-Tech Marketing (FHTM) was a multilevel marketing firm, sued by six states and the Federal Trade Commission and permanently shut down in 2014. Data from a settlement with the State of Montana provide a population of participants in a geographic region with definable markets and offer unique insights into local contagion. The authors analyze the pattern of FHTM adoption within a diffusion-of-innovation framework. The findings confirm that nearly all adoption results from …
The New Panama Canal In A Global Context, Herman L. Boschken
The New Panama Canal In A Global Context, Herman L. Boschken
Herman L. Boschken
Without the "container revolution" (1970-present) and its redesign of seaport and maritime-trade infrastructures, globalization as we know it would not exist. With the recent enlargements of the Panama and Suez Canals, many new implications for U.S. economic trade are unfolding. This presentation at the Commonwealth Club of California, outlines recent changes in world trade and infrastructure development, and poses five factors that will likely determine winners and losers in the unfolding developments of this highly competitive world trade-route system.
Policy Options For Revenue Neutral Gst For Oil And Gas, Sacchidananda Mukherjee, R. Kavita Rao
Policy Options For Revenue Neutral Gst For Oil And Gas, Sacchidananda Mukherjee, R. Kavita Rao
Sacchidananda Mukherjee
1. The study suggests alternative design of GST where tax cascading goes down and prices fall and the Government revenue remains unchanged. 2. Substantial reduction in cascading of taxes is observed for a shift from baseline to alternative scenarios and tax system becomes cleaner. 3. Elimination of cascading of taxes will result in rising export competitiveness of Indian industries in the international markets. 4. In all alternative designs of GST, the prices across the sectors either remain unchanged or decline 5. Dismantling the administered pricing mechanism for petrol and diesel along with introduction of comprehensive GST for petroleum products benefits …
Innovation In The Not For Profit Sector: A Regional Australian Case Study., Grant Cairncross, Charlie Brennan, Julie Tucker
Innovation In The Not For Profit Sector: A Regional Australian Case Study., Grant Cairncross, Charlie Brennan, Julie Tucker
Grant Cairncross
This paper explores the impact of the “Innovation Farm,” a social innovation project that aimed to help long-term unemployed, highly disadvantaged jobseekers living on the Coffs Coast of the Mid-North Coast of New South Wales, overcome barriers to employment and/or further training. The project was delivered by the Coffs Harbour Employment Support Services (CHESS), a not-for-profit, social enterprise organisation. It was funded from 2009-2012 by the Australian Federal Government’s Department of Employment Education and Workplace Relations (DEEWR) through the Department’s Innovation Fund. The research found that whilst the project achieved a commendable level of success its on-going viability was compromised …
Response To Questions In The First White Paper, 'Modernizing The Communications Act', Randolph J. May, Richard A. Epstein, Justin (Gus) Hurwitz, Daniel Lyons, James B. Speeta, Christopher S. Yoo
Response To Questions In The First White Paper, 'Modernizing The Communications Act', Randolph J. May, Richard A. Epstein, Justin (Gus) Hurwitz, Daniel Lyons, James B. Speeta, Christopher S. Yoo
Daniel Lyons
The House Energy and Commerce Committee has begun a process to review and update the Communications Act of 1934, last revised in any material way in 1996. As the Committee begins the review process, this paper responds to questions posed by the Committee that all relate, in fundamental ways, to the question: "What should a modern Communications Act look like?" The Response advocates a "clean slate" approach under which the regulatory silos that characterize the current statute would be eliminated, along with almost all of the ubiquitous 'public interest' delegation of authority found throughout the Communications Act. The replacement regime …
Voice Without Say: Why Capital-Managed Firms Aren’T (Genuinely) Participatory, Justin Schwartz
Voice Without Say: Why Capital-Managed Firms Aren’T (Genuinely) Participatory, Justin Schwartz
Justin Schwartz
Why are most capitalist enterprises of any size organized as authoritarian bureaucracies rather than incorporating genuine employee participation that would give the workers real authority? Even firms with employee participation programs leave virtually all decision-making power in the hands of management. The standard answer is that hierarchy is more economically efficient than any sort of genuine participation, so that participatory firms would be less productive and lose out to more traditional competitors. This answer is indefensible. After surveying the history, legal status, and varieties of employee participation, I examine and reject as question-begging the argument that the rarity of genuine …
Tackling Undeclared Work In Croatia, Colin C. Williams, Marijana Baric, Piet Renooy
Tackling Undeclared Work In Croatia, Colin C. Williams, Marijana Baric, Piet Renooy
Colin C Williams
No abstract provided.
The Shadow Economy, Colin C. Williams, Friedrich Schneider
The Shadow Economy, Colin C. Williams, Friedrich Schneider
Colin C Williams
No abstract provided.
Tackling Undeclared Work In Montenegro, Colin C. Williams, Marijana Baric, Piet Renooy
Tackling Undeclared Work In Montenegro, Colin C. Williams, Marijana Baric, Piet Renooy
Colin C Williams
No abstract provided.
Tackling Undeclared Work In Fyr Macedonia, Colin C. Williams, Marijana Baric, Piet Renooy
Tackling Undeclared Work In Fyr Macedonia, Colin C. Williams, Marijana Baric, Piet Renooy
Colin C Williams
No abstract provided.
Tackling Undeclared Work In Turkey, Colin C. Williams, Marijana Baric, Piet Renooy
Tackling Undeclared Work In Turkey, Colin C. Williams, Marijana Baric, Piet Renooy
Colin C Williams
No abstract provided.
Tackling Undeclared Work In Iceland, Colin C. Williams, Marijana Baric, Piet Renooy
Tackling Undeclared Work In Iceland, Colin C. Williams, Marijana Baric, Piet Renooy
Colin C Williams
No abstract provided.
Tackling Undeclared Work In Croatia And Four Eu Candidate Countries, Colin C. Williams, Marijana Baric, Piet Renooy
Tackling Undeclared Work In Croatia And Four Eu Candidate Countries, Colin C. Williams, Marijana Baric, Piet Renooy
Colin C Williams
No abstract provided.
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …
Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg
Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg
Jan Kallberg
In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …
Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg
Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg
Jan Kallberg
In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …
Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther
Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther
Jan Kallberg
From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …
Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham
Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …
Innovations In Citizen-State Interaction In Vanuatu: Grassroots Approaches To Maintaining Bio-Cultural Diversity, Thomas Dick, Cherise Addinsall
Innovations In Citizen-State Interaction In Vanuatu: Grassroots Approaches To Maintaining Bio-Cultural Diversity, Thomas Dick, Cherise Addinsall
Thomas Dick
Many countries in the South Pacific are currently failing to adequately address issues in regards to bio-cultural diversity, which is leading to escalating environmental and health problems for Pacific Islanders (Morrison & Munro, 1999). These issues have the potential to undermine the Pacific way of life, which requires healthy ecosystems and continued access to natural resources for livelihoods and cultural enrichment (SPREP, 2011). The disposal of waste in small island developing states is limited due to small land areas, shallow water tables and population pressures. The consequences from insufficient waste management can consist not only of obvious aesthetic problems but …
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Professor Katina Michael
During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Professor Katina Michael
This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …
The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael
The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael
Professor Katina Michael
Microchip implants for humans are not new. Placing heart pacemakers in humans for prosthesis is now considered a straightforward procedure. In more recent times we have begun to use brain pacemakers for therapeutic purposes to combat illnesses such as epilepsy, Parkinson’s Disease, and severe depression. Microchips are even being placed inside prosthetic knees and hips during restorative procedures to help in the gathering of post-operative analytics that can aid rehabilitation further. While medical innovations that utilise microchips abound, over the last decade we have begun to see the potential use of microchip implants for non-medical devices in humans, namely for …
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Jan Kallberg
La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Associate Professor Katina Michael
The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
Jan Kallberg
With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.