Search Results

1 - 4 of 4 items :

  • Business Management, other x
  • Business and Economics x
Clear All
Foreign-Versus Domestic-Owned firms in the Predicament ‘Cui bono?’

. (2015), “Estimating direct and indirect effects of foreign direct investment on firm productivity in the presence of interactions between firms”, Journal of International Economics, Vol. 95, No. 1, pp. 157-169. 46. Girma, S., Görg, H., Pisu, M. (2008), “Exportation, effets d’entraînement, et effets externes de productivité en provenance de l’investissement direct de l’étranger’” (Exporting, linkages and productivity spillovers from foreign direct investment), Canadian Journal of Economics/Revue canadienne d’économique, Vol. 41, No. 1, pp. 320-340. 47

Open access
True Synergy for Real Effects: How to Control Integrated Marketing Successfully

References Naik, Prasad (2007): “Integrated Marketing Communications: Provenance, Practice and Principles,” in: Ambler, T./Tellis, G.: Handbook of Advertising, Sage Publications, pp. 35 - 53. Naik, Prasad; Peters, Kay (2009): “A Hierarchical Marketing Communications Model of Online and Offline Media Synergies,” Journal of Interactive Marketing, Vol. 23 (4), pp. 288 - 299. Naik, Prasad; Raman, Kalyan (2003): “Understanding the Impact of Synergy in Multimedia Communications,” Journal of Marketing Research, Vol. 40

Open access
Special Issue on Cyberinfrastructure, Machine Learning, and Digital Library

between machine learning, cyberinfrastructure and digital library is an important step to achieve smart data and information management. However, there is lack of mediums and forums that bring together researchers and practitioners to share visions, questions, latest advances in methodology, application experiences, and best practices. Library and archival professionals are often unfamiliar with cyberinfrastructure. In turn, cyberinfrastructure experts lack experience in traditional digital library and archives practices such as metadata, provenance, publishing

Open access
Identifier Services: Modeling and Implementing Distributed Data Management in Cyberinfrastructure

functions create a representation of a dataset’s provenance and evolution. IDS can be used by researchers to track data stored at multiple locations, and vice versa, by repositories and data stores to continue tracking the evolution of the datasets. This paper is organized as follows. In the Related Work section, we discuss authenticity as the conceptual framework for IDS, and review how different repository and data management projects support identity functions and implement data models. Along with each point, we clarify the novel contributions brought by IDS. In the

Open access