Most Popular Books by Paul Benjamin

Paul Benjamin is the author of Monsters, Inc: Laugh Factory (2010), Detestable and Wicked Arts (2020), Marvel Vault of Heroes: Hulk: Biggest and Best (2019), Amimal Attack! (2009), Extraction and Generalization of Expert Advice (2018).

81 - 120 of 1,000,000 results
<< >>

Monsters, Inc: Laugh Factory

release date: Apr 06, 2010
Monsters, Inc: Laugh Factory
When acts of sabotage begin to damage Monsters, Inc equipment, all the evidence points to Mike! Can Mike convince Sulley to help him find the true culprit?

Detestable and Wicked Arts

release date: Jan 01, 2020
Detestable and Wicked Arts
"While interpersonal, local, and regional contexts are critical to the analysis of witch-hunting in early New England, this book shows that a full understanding of the Puritan colonies'' battle against black magic can only be achieved by placing it in a trans-Atlantic perspective"--

Marvel Vault of Heroes: Hulk: Biggest and Best

release date: Jan 01, 2019
Marvel Vault of Heroes: Hulk: Biggest and Best
"Originally published by Marvel as Marvel adventures: Hulk issues #1-12"--Indicia.

Amimal Attack!

release date: Jan 01, 2009
Amimal Attack!
Spider-Man juggles his life in high school with battling such enemies as Arcade, Spider-Woman, and Sandman.

Extraction and Generalization of Expert Advice

release date: Mar 02, 2018
Extraction and Generalization of Expert Advice
This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work. This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work. As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

Starcraft

release date: Apr 11, 2017
Starcraft
Presents a series of short stories from the world of StarCraft in graphic novel format involving an intergalactic war, alien races, and strange new worlds.

Impacts of the Conservation Reserve Program on the Virginia Economy

release date: Jan 01, 1991

Categorization and mental architectures

release date: Jan 01, 1996

Information Disclosure on Mobile Devices

release date: Jan 01, 2014
Information Disclosure on Mobile Devices
The use of mobile applications continues to experience exponential growth. Using mobile apps typically requires the disclosure of location data, which often accompanies requests for various other forms of private information. Existing research on information privacy has implied that consumers are willing to accept privacy risks for relatively negligible benefits, and the offerings of mobile apps based on location-based services (LBS) appear to be no different. However, until now, researchers have struggled to replicate realistic privacy risks within experimental methodologies designed to manipulate independent variables. Moreover, minimal research has successfully captured actual information disclosure over mobile devices based on realistic risk perceptions. The purpose of this study is to propose and test a more realistic experimental methodology designed to replicate real perceptions of privacy risk and capture the effects of actual information disclosure decisions. As with prior research, this study employs a theoretical lens based on privacy calculus. However, we draw more detailed and valid conclusions due to our use of improved methodological rigor. We report the results of a controlled experiment involving consumers (n=1025) in a range of ages, levels of education, and employment experience. Based on our methodology, we find that only a weak, albeit significant, relationship exists between information disclosure intentions and actual disclosure. In addition, this relationship is heavily moderated by the consumer practice of disclosing false data. We conclude by discussing the contributions of our methodology and the possibilities for extending it for additional mobile privacy research.

Computational Experiments with Stochastic Approximation

release date: Jan 01, 2001

Formulating Patterns in Problem Solving

release date: Jan 01, 1992

Parametric Confidence Bands on Cumulative Distribution Functions

Developing Missional Ecclesiology Through Worship at the Lake Jackson Church of Christ

release date: Jan 01, 2004

Reformulating Path Planning Problems by Task-preserving Abstraction

release date: Jan 01, 1992

Control-Related Motivations and Information Security Policy Compliance

release date: Jan 01, 2014
Control-Related Motivations and Information Security Policy Compliance
Employees'' failures to follow information security policy can be costly to organizations, causing organizations to implement security controls to motivate secure behavior. Information security research has explored many control-related motivations (e.g., self-efficacy, response efficacy, and behavioral control) in the context of ISP compliance; however, the behavioral effects of perceptions of autonomous functioning are not well understood in security contexts. This paper examines employee autonomy as a control-related motivation from the lens of self-determination theory and psychological reactance theory. Self-determination theory is widely used in other disciplines to explain intrinsically driven behavior, but has not been applied to security research. Psychological reactance theory is also widely used, but is only beginning to receive attention in security research. Self-determination and psychological reactance offer complementary yet opposite conceptualizations of trait-based autonomy. This paper posits that perceptions of trait-based autonomy influence self-efficacy and response efficacy. Through a survey of government employees, we provide support for several hypotheses. We also discuss important directions for the use of self-determination theory and psychological reactance theory in future research.

On the Estimation of Parameters of the Ornstein-Uhlenbeck and Related Stochastic Processes

Shaman. World of Warcraft

release date: Jan 01, 2010

Marvel Ultimate Super Hero Collection

release date: Jan 01, 2016

Customer Ownership of the Local Loop

release date: Jan 01, 1996

The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Engagement in Security-Based Precaution Taking

release date: Jan 01, 2020
The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Engagement in Security-Based Precaution Taking
Protecting organizational information is a top priority for most firms. This reality, coupled with the fact that organizational insiders control much of their organizations'' valuable information, has led both researchers and practitioners to acknowledge the importance of insiders'' behavior for information security (InfoSec). Until recently, researchers have employed only a few theories to understand these influences, and this has generated calls for a broadened theoretical repertoire. Given this opportunity, we incorporate the framework of emotions developed in the information systems (IS) discipline by Beaudry and Pinsonneault (2010) and add the broaden-and-build theory (BBT) to understand the influence of discrete positive and negative emotions on insiders'' precaution-taking activities. Our findings demonstrate that the relationship between both positive and negative emotions and precaution taking is mediated by insiders'' (1) psychological capital (PsyCap), a higher-order, work-related construct of positive psychological resource capabilities, and (2) psychological distancing, a coping mechanism characterized by insiders'' attempts to detach themselves psychologically from a situation. By considering these factors, our model explains 32 percent of the variance in insiders'' precaution taking in organizations. Researchers and practitioners can use these findings to develop effective insider InfoSec training, including emotional appeals that increase insiders'' precaution taking.

Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect

release date: Jan 01, 2014
Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect
This study examines the potential of RFID technology to increase the agility of supply-chain e-commerce systems by mitigating the bullwhip effect. The bullwhip effect is a supply-chain phenomenon that reveals a lack of business agility characterized by the amplification of inventory variance. This study employs an experiment involving a modified Beer Distribution Game to simulate an RFID-enabled supply chain. The results provide empirical evidence that RFID technology can increase a supply chain''s agility and reduce the bullwhip effect by reducing inventory holding costs, stockout costs, and inventory-level variances. The results are all the more important when applied to interorganizational e-commerce systems.

The Effective School Principal in Elementary and Secondary Schools

Marvel Adventures Spider-Man

release date: Jan 01, 2010
Marvel Adventures Spider-Man
Think Spidey''s the only guy that can stick to stuff? Meet PASTE POT PETE!!! God of glue! Advocate of adhesive! Will he turn the Wallcrawler into the Wallstucker?

Marvel Adventures Hulk

release date: Jan 01, 2008
Marvel Adventures Hulk
Bruce Banner''s old friend, Dr. Leonard Samson, is now a gamma-powered strongman working with Betty Ross to cure Bruce. But what dark secret will push Bruce over the edge? See: Hulk battle the green-haired goliath, Doc Samson! Thrill: as Bruce is reunited with the love of his life, Betty Ross! Cringe: As Rick Jones gives Doc Samson a piece of his mind! Witness: Monkey on the psychiatrist''s couch!

Is Trust Always Better Than Distrust? The Potential Value of Distrust in Newer Virtual Teams Engaged in Short-Term Decision-Making

release date: Jan 01, 2015
Is Trust Always Better Than Distrust? The Potential Value of Distrust in Newer Virtual Teams Engaged in Short-Term Decision-Making
The debate on the benefits of trust or distrust in groups has generated a substantial amount of research that points to the positive aspects of trust in groups, and generally characterizes distrust as a negative group phenomenon. Therefore, many researchers and practitioners assume that trust is inherently good and distrust is inherently bad. However, recent counterintuitive evidence obtained from face-to-face (FtF) groups indicates that the opposite might be true; trust can prove detrimental, and distrust instrumental, to decision-making in groups. By extending this argument to virtual teams (VTs), we examined the value of distrust for VTs completing routine and non-routine decision tasks, and showed that the benefits of distrust can extend to short-term VTs. Specifically, VTs seeded with distrust significantly outperformed all control groups in a non-routine decision-making task. In addition, we present quantitative evidence to show that the decision task itself can significantly affect the overall levels of trust/distrust within VTs. In addition to its practical and research implications, the theoretical contribution of our study is that it extends to a group level, and then to a VT setting, a theory of distrust previously tested in the psychology literature in the context of completing non-routine and routine decision tasks at an individual level.

A Stage-Based Model for RFID Assimilation Processes by Supply Chain Participants in China

release date: Jan 01, 2013
A Stage-Based Model for RFID Assimilation Processes by Supply Chain Participants in China
RFID technology is an emerging technology that attracts attention of supply chain participants. However, most Chinese supply chain participants just adopt this new innovation without making further steps to fully utilize its benefits. Extant IS research on this technology also only focuses on factors that will impact its organizational adoption. Assimilation theories suggest that most information technologies exhibit an “assimilation gap” which means the widespread usage tends to lag behind their adoption. But a technology can only achieve its greatest benefits through full-scale deeper diffusion into the organization''s daily operations besides physical adoption. Drawing upon TOE framework, we use a stage-based model to investigate factors that influence the assimilation of RFID into an organization. Moreover, we investigate these factors'' changing effect across different assimilation stages in the Chinese context which is addressed little in the previous literature.
81 - 120 of 1,000,000 results
<< >>


  • Aboutread.com makes it one-click away to discover great books from local library by linking books/movies to your library catalog search.

  • Copyright © 2025 Aboutread.com