نتایج جستجو برای: corporate identity ashforth

تعداد نتایج: 166164  

Journal: :Jurnal Ilmiah Publipreneur 2017

2015
Mary Jo Hatch Majken Schultz

In response to Marshall Meyer (1990), who questioned Max Weber’s relevance to contemporary organization studies, Lounsbury and Carberry (2005) countered that, although Weberian scholarship in organization studies has dwindled, Weber’s theories continue to offer fertile ground to organizational researchers. To illustrate their point, Lounsbury and Carberry used Weber’s work to explain globalizat...

2005
Yu-Lin Hsu Chi-Hsiang Lin

The purpose of this design research is to develop a system to help users understand how Corporate Identity Systems (CISs) are developed. It is intended for designers, marketing professionals, and design clients. Within CIS, design is one of the most important elements. Trademarks, or logos, represent a set of values, ideas and often also emotions about an enterprise’s image. Using the capacitie...

Journal: :Journal of Business Research 2021

Considers the significance of corporate identity, internal brand/identity images, and brand identification for orientation. Three propositions based on above are formulated. By highlighting importance these concepts, scholars more fully able to comprehend connectedness between concepts. The same is true senior managers who have responsibility managing nurturing meaningful orientated organizatio...

2000
Christine Parker Leon Wolff

Corporations are undergoing a subtle transformation. Usually regarded as investment vehicles for shareholders,1 corporations are now assuming an additional identity—as entities which share responsibility for upholding human rights.2 This new identity does not sit comfortably with conventional wisdom on corporate governance. Traditional corporate governance theory, based on nineteenth century no...

Journal: :International Journal of Corporate Social Responsibility 2018

2015

The way organizations manage access to their critical applications and data is quickly becoming unwieldy and overly complicated. That’s because traditional identity and access management (IAM) solutions, which were supposed to help organizations guard their IT systems and networks against unsafe access, were built on outdated assumptions to meet outdated requirements. First, the user population...

Journal: :Corporate Communications: An International Journal 2009

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید