Browse Results

Showing 2,926 through 2,950 of 77,430 results

Applied Behavior Science in Organizations: Consilience of Historical and Emerging Trends in Organizational Behavior Management (Behavior Science)

by Ramona A. Houmanfar Mitch Fryling Mark P. Alavosius

Applied Behavior Science in Organizations provides a compelling overview of the history of Organizational Behavior Management (OBM) and the opportunity it presents for designing and managing positive work environments that can in turn have a positive impact on society. The book brings together leading experts from industry and research settings to provide an overview of the historical approaches in Organizational Behavior Management. It begins with an introduction to recognized practices in OBM and the applications of fundamental principles of behavior analysis to a variety of performance problems in organizational settings. The book then highlights how organizational practices and consumers’ behavior combine in a complex confluence to meet an organization’s goals and satisfy consumer appetites, whilst often unintentionally affecting the wellbeing of organizational members. It argues that the science of behavior has a responsibility to contribute to the safety, health and wellbeing of organizational members, consumers of organizational products, and beyond. Finally, the book recognizes the essential role of organizations in initiating, shaping, and sustaining the development of more nurturing and reinforcing work environments, through discussion of the need for innovation while adapting and responding to growing social upheaval, technological advances, and environmental concerns, alongside crises in the global economy, health, education, and environment. Showcasing emerging work by internationally recognized scholars on the application of behavior science in organizations, the book will be an essential read for all students and professionals of Organizational Behavior Management, as well as those interested in using organizational applications to create new models of management.

Applied Behavior Science in Organizations: Consilience of Historical and Emerging Trends in Organizational Behavior Management (Behavior Science)

by Ramona A. Houmanfar Mitch Fryling Mark P. Alavosius

Applied Behavior Science in Organizations provides a compelling overview of the history of Organizational Behavior Management (OBM) and the opportunity it presents for designing and managing positive work environments that can in turn have a positive impact on society. The book brings together leading experts from industry and research settings to provide an overview of the historical approaches in Organizational Behavior Management. It begins with an introduction to recognized practices in OBM and the applications of fundamental principles of behavior analysis to a variety of performance problems in organizational settings. The book then highlights how organizational practices and consumers’ behavior combine in a complex confluence to meet an organization’s goals and satisfy consumer appetites, whilst often unintentionally affecting the wellbeing of organizational members. It argues that the science of behavior has a responsibility to contribute to the safety, health and wellbeing of organizational members, consumers of organizational products, and beyond. Finally, the book recognizes the essential role of organizations in initiating, shaping, and sustaining the development of more nurturing and reinforcing work environments, through discussion of the need for innovation while adapting and responding to growing social upheaval, technological advances, and environmental concerns, alongside crises in the global economy, health, education, and environment. Showcasing emerging work by internationally recognized scholars on the application of behavior science in organizations, the book will be an essential read for all students and professionals of Organizational Behavior Management, as well as those interested in using organizational applications to create new models of management.

Applied Cognitive Ecostylistics: From Ego to Eco

by Malgorzata Drewniok, Marek Kuźniak, and

This book offers an up-to-date account of one of the most influential strands of eco-research: cognitive ecostylistics. The onset of the 1970s saw a global shift in scholarly perspective upon the relation between egocentric and ecocentric views of the world. The so-called eco-turn was not only linguistic at its roots, but engaged the bulk of academic thought in social sciences and humanities. Cognitive ecostylistics invites a multidisciplinary approach to the study of the conceptual relations between oral or written texts and their impact on the environment. This volume is a collection of the latest research that seeks to apply the theory and methodology developed over the last 40 years to both literary and real-life texts, engaging with a wealth of examples from First World War poetry and Anne of Green Gables through to Condé Nast Traveller hotel descriptions. Exploring the cultural effects of the eco-turn, the collection engages the reader in the problem of the present-day Anthropocene, manifested as Ego-Eco tensions at the level of communicating self-needs and the needs of the Other. Divided into two parts, it considers first the human-angled semiotic interplay contained within the universe of people, before examining the problem of semiotic engagement of texts as extraneous to the human, highlighting crucial aspects of nature, culture, and beyond.

Applied Cognitive Ecostylistics: From Ego to Eco


This book offers an up-to-date account of one of the most influential strands of eco-research: cognitive ecostylistics. The onset of the 1970s saw a global shift in scholarly perspective upon the relation between egocentric and ecocentric views of the world. The so-called eco-turn was not only linguistic at its roots, but engaged the bulk of academic thought in social sciences and humanities. Cognitive ecostylistics invites a multidisciplinary approach to the study of the conceptual relations between oral or written texts and their impact on the environment. This volume is a collection of the latest research that seeks to apply the theory and methodology developed over the last 40 years to both literary and real-life texts, engaging with a wealth of examples from First World War poetry and Anne of Green Gables through to Condé Nast Traveller hotel descriptions. Exploring the cultural effects of the eco-turn, the collection engages the reader in the problem of the present-day Anthropocene, manifested as Ego-Eco tensions at the level of communicating self-needs and the needs of the Other. Divided into two parts, it considers first the human-angled semiotic interplay contained within the universe of people, before examining the problem of semiotic engagement of texts as extraneous to the human, highlighting crucial aspects of nature, culture, and beyond.

Applied Compositional Data Analysis: With Worked Examples In R (Springer Series in Statistics)

by Peter Filzmoser Matthias Templ Karel Hron

This book presents the statistical analysis of compositional data using the log-ratio approach. It includes a wide range of classical and robust statistical methods adapted for compositional data analysis, such as supervised and unsupervised methods like PCA, correlation analysis, classification and regression. In addition, it considers special data structures like high-dimensional compositions and compositional tables. The methodology introduced is also frequently compared to methods which ignore the specific nature of compositional data. It focuses on practical aspects of compositional data analysis rather than on detailed theoretical derivations, thus issues like graphical visualization and preprocessing (treatment of missing values, zeros, outliers and similar artifacts) form an important part of the book. Since it is primarily intended for researchers and students from applied fields like geochemistry, chemometrics, biology and natural sciences, economics, and social sciences, all the proposed methods are accompanied by worked-out examples in R using the package robCompositions.

Applied Concept Mapping: Capturing, Analyzing, and Organizing Knowledge

by Brian Moon Robert R. Hoffman Joseph Novak Alberto Canas

The expanding application of Concept Mapping includes its role in knowledge elicitation, institutional memory preservation, and ideation. With the advent of the CmapTools knowledge modeling software kit, Concept Mapping is being applied with increased frequency and success to address a variety of problems in the workplace.Supported by business appl

Applied Cross-Cultural Data Analysis for Social Work (POCKET GUIDE TO SOCIAL WORK RESEARCH METHODS - PAPER)

by Thanh V. Tran Keith T. Chan

Applied Cross-Cultural Data Analysis for Social Work is a research guide for examining and interpreting data for the purpose of cultural group comparisons. This book aims to provide practical applications in statistical approaches of data analyses that are commonly used in cross-cultural research and evaluation. Readers are presented with step-by-step illustrations in the use of descriptive, bivariate, and multivariate statistics to compare cross-cultural population using large-scale, population-based survey data. These techniques have important applications in health, mental health, and social science research relevant to social work and other helping professions, especially in providing a framework of evidence to examine health disparities using population-health data. For each statistical approach discussed in this book, Thanh V. Tran and Keith T. Chan explain the underlying purpose, basic assumptions, types of variables, application of the Stata statistical package, the presentation of statistical findings, and the interpretation of results. Unlike previous guides on statistical approaches and data analysis in social work, this book explains and demonstrates the strategies of cross-cultural data analysis using descriptive and bivariate analysis, multiple regression, additive and multiplicative interaction, mediation, SEM and HLM for subgroup analysis and cross-cultural comparisons. This book also includes sample syntax from Stata for social work researchers to conduct cross-cultural analysis with their own research.

Applied Cross-Cultural Data Analysis for Social Work (POCKET GUIDE TO SOCIAL WORK RESEARCH METHODS - PAPER)

by Thanh V. Tran Keith T. Chan

Applied Cross-Cultural Data Analysis for Social Work is a research guide for examining and interpreting data for the purpose of cultural group comparisons. This book aims to provide practical applications in statistical approaches of data analyses that are commonly used in cross-cultural research and evaluation. Readers are presented with step-by-step illustrations in the use of descriptive, bivariate, and multivariate statistics to compare cross-cultural population using large-scale, population-based survey data. These techniques have important applications in health, mental health, and social science research relevant to social work and other helping professions, especially in providing a framework of evidence to examine health disparities using population-health data. For each statistical approach discussed in this book, Thanh V. Tran and Keith T. Chan explain the underlying purpose, basic assumptions, types of variables, application of the Stata statistical package, the presentation of statistical findings, and the interpretation of results. Unlike previous guides on statistical approaches and data analysis in social work, this book explains and demonstrates the strategies of cross-cultural data analysis using descriptive and bivariate analysis, multiple regression, additive and multiplicative interaction, mediation, SEM and HLM for subgroup analysis and cross-cultural comparisons. This book also includes sample syntax from Stata for social work researchers to conduct cross-cultural analysis with their own research.

Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I (Lecture Notes in Computer Science #12146)

by Mauro Conti Jianying Zhou Emiliano Casalicchio Angelo Spognardi

This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.

Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II (Lecture Notes in Computer Science #12147)

by Mauro Conti Jianying Zhou Emiliano Casalicchio Angelo Spognardi

This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.

Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings (Lecture Notes in Computer Science #4521)

by Jonathan Katz Moti Yung

This book constitutes the refereed proceedings of the 5th International Conference on Applied Cryptography and Network Security, ACNS 2007, held in Zhuhai, China, June 2007. The 31 revised full papers cover signature schemes, computer and network security, cryptanalysis, group-oriented security, cryptographic protocols, anonymous authentication, identity-based cryptography, and security in wireless, ad-hoc, and peer-to-peer networks.

Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings (Lecture Notes in Computer Science #5037)

by Angelos D. Keromytis Moti Yung Steven M. Bellovin Rosario Gennaro

This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008. The 30 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers address all aspects of applied cryptography and network security with special focus on novel paradigms, original directions, and non-traditional perspectives.

Applied Cryptography and Network Security: 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers (Lecture Notes in Computer Science #9092)

by Tal Malkin Vladimir Kolesnikov Allison Bishop Lewko Michalis Polychronakis

This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement; authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.

Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings (Lecture Notes in Computer Science #9696)

by Mark Manulis Ahmad-Reza Sadeghi Steve Schneider

This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions.ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy.

Applied Cryptography and Network Security: 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings (Lecture Notes in Computer Science #10892)

by Bart Preneel Frederik Vercauteren

This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security.

Applied Cryptography and Network Security: 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings (Lecture Notes in Computer Science #11464)

by Moti Yung Robert H. Deng Valérie Gauthier-Umaña Martín Ochoa

This book constitutes the refereed proceedings of the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, held in Bogota, Colombia in June 2019. The 29 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers were organized in topical sections named: integrity and cryptanalysis; digital signature and MAC; software and systems security; blockchain and cryptocurrency; post quantum cryptography; public key and commitment; theory of cryptographic implementations; and privacy preserving techniques.

Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings (Lecture Notes in Computer Science #3989)

by Jianying Zhou Moti Yung Feng Bao

This book constitutes the refereed proceedings of the 4th International Conference on Applied Cryptography and Network Security, ACNS 2006, held in Singapore in June 2006. Book presents 33 revised full papers, organized in topical sections on intrusion detection and avoidance, cryptographic applications, DoS attacks and countermeasures, key management, cryptanalysis, security of limited devices, cryptography, authentication and Web security, ad-hoc and sensor network security, cryptographic constructions, and security and privacy.

Applied Cryptography and Network Security: First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings (Lecture Notes in Computer Science #2846)

by Jianying Zhou Moti Yung Yongfei Han

The 1st International Conference on “Applied Cryptography and Network Se- rity” (ACNS 2003) was sponsored and organized by ICISA (International C- munications and Information Security Association), in cooperation with MiAn Pte. Ltd. and the Kunming government. It was held in Kunming, China in - tober 2003. The conference proceedings was published as Volume 2846 of the Lecture Notes in Computer Science (LNCS) series of Springer-Verlag. The conference received 191 submissions, from 24 countries and regions; 32 of these papers were accepted, representing 15 countries and regions (acceptance rate of 16.75%). In this volume you will ?nd the revised versions of the - cepted papers that were presented at the conference. In addition to the main track of presentations of accepted papers, an additional track was held in the conference where presentations of an industrial and technical nature were given. These presentations were also carefully selected from a large set of presentation proposals. This new international conference series is the result of the vision of Dr. Yongfei Han. The conference concentrates on current developments that advance the - eas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works and developments in - dustrial and technical frontiers. We thank Dr. Han for initiating this conference and for serving as its General Chair.

Applied Cryptography and Network Security Workshops: ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20–23, 2022, Proceedings (Lecture Notes in Computer Science #13285)

by Jianying Zhou Sridhar Adepu Cristina Alcaraz Lejla Batina Emiliano Casalicchio Sudipta Chattopadhyay Chenglu Jin Jingqiang Lin Eleonora Losiouk Suryadipta Majumdar Weizhi Meng Stjepan Picek Jun Shao Chunhua Su Cong Wang Yury Zhauniarovich Saman Zonouz

This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022. Due to the Corona pandemic the workshop was held as a virtual event. The 31 papers presented in this volume were carefully reviewed and selected from 52 submissions. They stem from the following workshops:– AIBlock: 4th ACNS Workshop on Application Intelligence and Blockchain Security– AIHWS: 3rd ACNS Workshop on Artificial Intelligence in Hardware Security– AIoTS: 4th ACNS Workshop on Artificial Intelligence and Industrial IoT Security– CIMSS: 2nd ACNS Workshop on Critical Infrastructure and Manufacturing System Security– Cloud S&P: 4th ACNS Workshop on Cloud Security and Privacy– SCI: 3rd ACNS Workshop on Secure Cryptographic Implementation– SecMT: 3rd ACNS Workshop on Security in Mobile Technologies– SiMLA: 4th ACNS Workshop on Security in Machine Learning and its Applications

Applied Cryptography and Network Security Workshops: ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21–24, 2021, Proceedings (Lecture Notes in Computer Science #12809)

by Jianying Zhou Chuadhry Mujeeb Ahmed Lejla Batina Sudipta Chattopadhyay Olga Gadyatskaya Chenglu Jin Jingqiang Lin Eleonora Losiouk Bo Luo Suryadipta Majumdar Mihalis Maniatakos Daisuke Mashima Weizhi Meng Stjepan Picek Masaki Shimaoka Chunhua Su Cong Wang

This book constitutes the proceedings of the satellite workshops held around the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, held in Kamakura, Japan, in June 2021.The 26 papers presented in this volume were carefully reviewed and selected from 49 submissions. They stem from the following workshops: AIBlock 2021: Third International Workshop on Application Intelligence and Blockchain Security AIHWS 2021: Second International Workshop on Artificial Intelligence in Hardware Security AIoTS 2021: Third International Workshop on Artificial Intelligence and Industrial IoT Security CIMSS 2021: First International Workshop on Critical Infrastructure and Manufacturing System Security Cloud S&P 2021: Third International Workshop on Cloud Security and Privacy SCI 2021: Second International Workshop on Secure Cryptographic Implementation SecMT 2021: Second International Workshop on Security in Mobile Technologies SiMLA 2021; Third International Workshop on Security in Machine Learning and its ApplicationsDue to the Corona pandemic the workshop was held as a virtual event.

Applied Cryptography and Network Security Workshops: ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22, 2023, Proceedings (Lecture Notes in Computer Science #13907)

by Jianying Zhou Lejla Batina Zengpeng Li Jingqiang Lin Eleonora Losiouk Suryadipta Majumdar Daisuke Mashima Weizhi Meng Stjepan Picek Mohammad Ashiqur Rahman Jun Shao Masaki Shimaoka Ezekiel Soremekun Chunhua Su Je Sen Teh Aleksei Udovenko Cong Wang Leo Zhang Yury Zhauniarovich

This book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023.The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops: · 1st ACNS Workshop on Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023) · 5th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2023) · 4th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2023) · 5th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2023) · 3rd ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2023) · 5th ACNS Workshop on Cloud Security and Privacy (Cloud S&P 2023) · 4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023) · 4th ACNS Workshop on Security in Mobile Technologies (SecMT 2023) · 5th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2023)

Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings (Lecture Notes in Computer Science #12418)

by Jianying Zhou Mauro Conti Chuadhry Mujeeb Ahmed Man Ho Au Lejla Batina Zhou Li Jingqiang Lin Eleonora Losiouk Bo Luo Suryadipta Majumdar Weizhi Meng Martín Ochoa Stjepan Picek Georgios Portokalidis Cong Wang Kehuan Zhang

This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, in Rome, Italy, in October 2020. The 31 papers presented in this volume were carefully reviewed and selected from 65 submissions. They stem from the following workshops: AIBlock 2020:Second International Workshop on Application Intelligence and Blockchain Security AIHWS 2020:First International Workshop on Artificial Intelligence in Hardware Security AIoTS 2020:Second International Workshop on Artificial Intelligence and Industrial Internet-of-Things Security Cloud S&P 2020:Second International Workshop on Cloud Security and Privacy SCI 2020:First International Workshop on Secure Cryptographic Implementation SecMT 2020:First International Workshop on Security in Mobile Technologies SiMLA 2020: Second International Workshop on Security in Machine Learning and its Applications

Applied Data-Centric Social Sciences: Concepts, Data, Computation, and Theory

by Aki-Hiro Sato

Applied data-centric social sciences aim to develop both methodology and practical applications of various fields of social sciences and businesses with rich data. Specifically, in the social sciences, a vast amount of data on human activities may be useful for understanding collective human nature. In this book, the author introduces several mathematical techniques for handling a huge volume of data and analysing collective human behaviour. The book is constructed from data-oriented investigation, with mathematical methods and expressions used for dealing with data for several specific problems. The fundamental philosophy underlying the book is that both mathematical and physical concepts are determined by the purposes of data analysis. This philosophy is shown throughout exemplar studies of several fields in socio-economic systems. From a data-centric point of view, the author proposes a concept that may change people’s minds and cause them to start thinking from the basis of data. Several goals underlie the chapters of the book. The first is to describe mathematical and statistical methods for data analysis, and toward that end the author delineates methods with actual data in each chapter. The second is to find a cyber-physical link between data and data-generating mechanisms, as data are always provided by some kind of data-generating process in the real world. The third goal is to provide an impetus for the concepts and methodology set forth in this book to be applied to socio-economic systems.

Applied Demography: An Introduction To Basic Concepts, Methods, And Data

by Steve H. Murdock

This text aims to help the novice understand demographic variables and analyze their impact on specific private and public sector interests. Examples are employed to demonstrate a wide range of techniques, and the book discusses software products from the 1990 US census that may revolutionize the use of demographic data by business and government.

Applied Demography: An Introduction To Basic Concepts, Methods, And Data

by Steve H. Murdock

This text aims to help the novice understand demographic variables and analyze their impact on specific private and public sector interests. Examples are employed to demonstrate a wide range of techniques, and the book discusses software products from the 1990 US census that may revolutionize the use of demographic data by business and government.

Refine Search

Showing 2,926 through 2,950 of 77,430 results