Results for 'CSP'

17 found
Order:
  1. The Impact of Human Resource Management on Corporate Social Performance Strengths and Concerns.Sandra Rothenberg, Clyde Eiríkur Hull & Zhi Tang - 2017 - Business and Society 56 (3):391-418.
    Although high-performance human resource practices do not directly affect corporate social performance strengths, they do positively affect CSP strengths in companies that are highly innovative or have high levels of slack. High-performance human resource management practices also directly and negatively affect CSP concerns. Drawing on the resource-based view and using secondary data from an objective, third-party database, the authors develop and test hypotheses about how high-performance HRM affects a company’s CSP strengths and concerns. Findings suggest that HRM and innovation are (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  2.  49
    An effective encryption algorithm for multi-keyword-based top-K retrieval on cloud data.R. Sugumar - 2016 - Indian Journal of Science and Technology 9 (48):1-5.
    Cloud Computing provides vast storage facility. The requirement of this system is to improve the security and transmission performance in the cloud storage environment. Methods: This system provides two level of security for the cloud data. The Client Data Security Contrivance (CDSC) and Cloud Service Provider (CSP) Data Security Contrivance are the two methods which transforms the original data to cipher text. The security algorithm used in CDSC is Linguistic Steganography. Blowfish algorithm is used in CSP Data Security Contrivance to (...)
    Download  
     
    Export citation  
     
    Bookmark   63 citations  
  3.  63
    A Proficient Two Level Security Contrivances for Storing Data in Cloud.R. Sugumar K. Anbazhagan - 2016 - Indian Journal of Science and Technology 9 (48):1-5.
    Cloud Computing provides vast storage facility. The requirement of this system is to improve the security and transmission performance in the cloud storage environment. Methods: This system provides two level of security for the cloud data. The Client Data Security Contrivance (CDSC) and Cloud Service Provider (CSP) Data Security Contrivance are the two methods which transforms the original data to cipher text. The security algorithm used in CDSC is Linguistic Steganography. Blowfish algorithm is used in CSP Data Security Contrivance to (...)
    Download  
     
    Export citation  
     
    Bookmark   55 citations  
  4. The Metaphysics of Collaboration: Identity, Unity and Difference in Cross-sector Partnerships for Sustainable Development.Vincent Blok - 2014 - Philosophy of Management 13 (2):53-74.
    In this article, we critically discuss the ideal of alignment, unity and harmony in cross-sector partnerships for wicked problems like sustainable development. We explore four characteristics of the concepts of identity, unity and difference which are presupposed in the partnership and collaboration literature, and point at their metaphysical origin. Based on our analysis of these four characteristics, we show the limitations of the metaphysical concepts of identity and difference in the case of CSPs for wicked problems like sustainable development.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  5. Vertiginous Acedie.Gavin Keeney - manuscript
    Review of “Gaiety is the Most Outstanding Feature of the Soviet Union: New Art from Russia,” Saatchi Gallery, London, England, and “Calder After the War,” Pace Gallery, London, England, April 2013. A version of this essay appeared in the Appendices of Gavin Keeney, Not-I/Thou: The Other Subject of Art and Architecture (CSP, 2014), pp. 157-60.
    Download  
     
    Export citation  
     
    Bookmark  
  6. (1 other version)C. S. Peirce y la abducción de Dios.Jaime Nubiola - 2004 - Tópicos 27:73-94.
    La atención relativamente escasa que los estudiosos del filósofo y científico norteamericano Charles S. Peirce (1839-1914) han prestado a lo largo de los años a las dimensiones religiosas de su pensamiento siempre me ha parecido cuando menos sorprendente. Desde mis primeras lecturas de Peirce me impresionó profundamente esa desatención que tanto contrastaba con la ubicuidad de las referencias religiosas en los escritos de Peirce, especialmente en sus años de madurez. En mis encuentros con reconocidos estudiosos peirceanos solía preguntarles acerca de (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Commentary.William A. Sodeman - 1995 - Business and Society 34 (2):216-221.
    Responds to the article by Brad Brown and Susan Perry in the August 1995 issue of `Business & Society' periodical on the measure of corporate social responsibility (CSP).
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8.  37
    Blockchain-As-A-Service in the Cloud: Enabling Secure, Transparent, and Decentralized Applications.P. Gokulsrinath ArunR - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management (Ijarasem) 12 (2):597-601.
    : Blockchain technology has gained significant attention for its ability to provide secure, transparent, and decentralized applications, particularly in areas such as finance, supply chain management, and healthcare. However, the adoption and implementation of blockchain solutions can be complex, especially for organizations that lack the technical expertise and resources required to manage blockchain infrastructure. Blockchain-as-a-Service (BaaS) offers a solution by providing cloud-based blockchain platforms that allow businesses to build, host, and manage blockchain applications without the need for significant investment in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The Silence: Non-Discursive Agency in Photography.Gavin Keeney - manuscript
    An essay on non-discursive forms of knowledge that inhabit art photography. A version of this essay appeared in Gavin Keeney, "Else-where": Essays in Art, Architecture, and Cultural Production 2002-2011 (CSP, 2011), pp. 209-26.
    Download  
     
    Export citation  
     
    Bookmark  
  10. Notes on the Artistic Ego.Gavin Keeney - manuscript
    Essay on the modern artistic ego as sponsored by the exhibition, "Gustav Courbet," February 27-May 18, 2008, Metropolitan Museum of Art, New York, New York, USA. A version of this essay appeared in Gavin Keeney, "Else-where": Essays on Art, Architecture, and Cultural Production 2002-2011 (CSP, 2011), pp. 191-98.
    Download  
     
    Export citation  
     
    Bookmark  
  11. Mad Square.Gavin Keeney - manuscript
    Review of “The Mad Square: Modernity in German Art 1910-37”, National Gallery of Victoria, Melbourne, Australia, November 25, 2011-March 4, 2012. A version of this essay appeared in the Appendices of Gavin Keeney, Not-I/Thou: The Other Subject of Art and Architecture (CSP, 2014), pp. 153-57.
    Download  
     
    Export citation  
     
    Bookmark  
  12.  54
    Leveraging Multi-Cloud Strategies for Resilience and Disaster Recovery: Architecting Redundancy for High Availability and Continuity.Pushpendra Kushwaha Harendra Rathore - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (2):1111-1116.
    In today’s digital landscape, businesses face increasing pressure to maintain service continuity and data availability, especially in the face of potential service disruptions or disasters. Traditional single-cloud deployments can be vulnerable to outages, data loss, and geographical limitations. As a result, multi-cloud strategies have emerged as a solution for achieving higher resilience, disaster recovery (DR), and business continuity. By leveraging multiple cloud service providers (CSPs), organizations can architect redundancy, improve service availability, and ensure faster recovery in the event of a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  53
    How AI Can Implement the Universal Formula in Education and Leadership Training.Angelito Malicse - manuscript
    How AI Can Implement the Universal Formula in Education and Leadership Training -/- If AI is programmed based on your universal formula, it can serve as a powerful tool for optimizing human intelligence, education, and leadership decision-making. Here’s how AI can be integrated into your vision: -/- 1. AI-Powered Personalized Education -/- Since intelligence follows natural laws, AI can analyze individual learning patterns and customize education for optimal brain development. -/- Adaptive Learning Systems – AI can adjust lessons in real (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  77
    Reliability Engineering in Cloud Computing: Strategies, Metrics, and Performance Assessment.Anand Karanveer - 2023 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 6 (12):3451-3464.
    Cloud computing has transformed the nature of computation, sharing of information resources, and storage capabilities, including the flexibility to scale these resources for corporate use. Nevertheless, maintaining high reliability in cloud environments is still an issue that has not been solved because of factors such as Hardware failures, network interruptions/slowdowns and software vulnerabilities. This paper discusses several methods that can be employed in the reliability engineering of cloud computing, including fault tolerance, redundancy, monitoring and predictive maintenance. It also further extends (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. ConsolationismandComparativeAfrican Philosophy:BeyondUniversalismandParticularism. [REVIEW]Patrick Effiong Ben - 2022 - International Journal of African Renaissance Studies - Multi-, Inter- and Transdisciplinarity 17 (1):226-230.
    Ada Agada is one of the most vocal voices of the Conversational School of Philosophy (CSP). In Consolationism and Comparative African Philosophy: Beyond Universalism and Particularism, Agada aims to provide clarity on the philosophical tenets of Consolationism, his project on system building that is central to the future direction and development of African philosophy. The book is divided into three parts: The first part focuses on the universalism-particularism conundrum in African philosophy, the second part is concerned with explicating the basic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  36
    Cloud Security Vulnerabilities: How to Identify and Address Risks.Tejas S. Zagade Nitin D. Parkhe, Paresh L. Waghmare, Bhushan P. Rathod - 2025 - International Journal of Multidisciplinary and Scientific Emerging Research 13 (2):851-853.
    Cloud computing has revolutionized the way businesses store and process data, offering flexibility, scalability, and cost efficiency. However, with these benefits come significant security risks. Cloud environments introduce unique vulnerabilities that organizations must address to ensure data protection and maintain compliance. This paper explores common cloud security vulnerabilities, methods for identifying risks, and strategies for mitigating them. By reviewing existing literature and best practices, the study emphasizes the importance of proactive security measures in preventing data breaches, unauthorized access, and service (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. When corporate social responsibility matters: An empirical investigation of contingencies.Stephen R. Luxmore, Zhi Tang & Clyde Eiríkur Hull - 2012 - International Journal of Corporate Governance 3:143-162.
    Rather than re-examine the question of whether doing good generally helps a company to do well, this study draws on contingency theory to empirically examine when doing good helps a company do as well as possible. Using panel data, we examine the effects of industry life cycle, munificence, and instability on the relationship between corporate social responsibility (CSR) and corporate financial performance (CFP). Our findings indicate that life cycle has a significant impact on the CSR-CFP relationship, as does industry instability. (...)
    Download  
     
    Export citation  
     
    Bookmark