Northampton Electronic Collection of Theses and Research

Items where Division is "Business"

Group by: Creators | Item Type | Date | No Grouping
Jump to: A | B | C | D | F | G | H | K | L | M | P | Y
Number of items at this level: 70.

A

  1. Ai, Q. and Tan, H. (2016) EMNEs' inter-firm knowledge transfer in outward M&As: evidence from Chinese manufacturing firms. Proceedings of the European Academy of Management Annual Conference. 16 2466-7498.
  2. Alaka, H. A., Oyedele, L. O., Owolabi, H. A., Kumar, V., Ajayi, S. O., Akinade, O. O. and Bilal, M. (2018) Systematic review of bankruptcy prediction models: towards a framework for tool selection. Expert Systems with Applications. 94, pp. 164-184. 0957-4174.

B

  1. Batista, L., Bourlakis, M. and Maull, R. (2016) Business models in the circular economy and the enabling role of supply chains. Paper presented to: 23rd European Operations Management Association (EurOMA) Conference, Trondheim, Norway, 17- 22 June 2016.
  2. Batista, L., Dora, M., Toth, J., Molnár, A., Malekpoor, H. and Kumari, S. (2018) Knowledge management for food supply chain synergies – A maturity level analysis of SME companies. Production Planning & Control. 0953-7287. (Accepted)
  3. Batista, L., Meadows, M., Dibb, S., Hinton, M. and Analogbei, M. (2013) Improving organisational responsiveness through CRM – the dynamics of strategy, information systems, and staff empowerment. In: British Academy of Management Conference Proceedings. Liverpool: British Academy of Management (BAM).

C

  1. Cherrafi, A., Elfezazi, S., Hurley, B., Jose Arturo, G.-R., Kumar, V., Anosike, A. and Batista, L. (2017) Green and Lean: a Gemba–Kaizen model for sustainability enhancement. Production Planning & Control. 0953-7287. (Accepted)

D

  1. Daneshkhah, A., Hosseinian-Far, A., Chatrabgoun, O., Sedighi, T. and Farsi, M. (2018) Probabilistic modeling of financial uncertainties. International Journal of Organizational and Collective Intelligence (IJOCI). 8(2), pp. 1-11. 1947-9344.

F

  1. Farsi, M., Daneshkhah, A., Hosseinian-Far, A., Chatrabgoun, O. and Montasari, R. (2018) Crime data mining, threat analysis and prediction. In: Jahankhani, H. (ed.) Cyber Criminology. Springer. (Accepted)
  2. Fassam, L. (2015) Procurement fraud: the insider threat to fraud and the ability to prevent with an intelligence led approach to big data and internet of things. Invited Presentation presented to: 14th European Conference on Cyber Warfare and Security (ECCWS 2015 UK), University of Hertfordshire, Hatfield, UK, 02-03 July 2015. (Unpublished)
  3. Fassam, L., Bates, M. P. and Dani, S. (2015) Resource efficiency: creating a route to logistics and the circular economy. Paper presented to: 20th Logistics Research Network (LRN) Annual Conference and PhD Workshop, University of Derby, 09-11 September 2015. (Unpublished)
  4. Fassam, L. and Hills, M. (2016) Food supply chain resilience: a conceptual vision for an intelligence-led approach to combating food criminality and terrorism. Journal of Transportation Security. 1938-7741. (Accepted)
  5. Fitzgerald, R. (2015) Ensuring quality in the delivery of TNE - improving teaching practices. Invited Presentation presented to: Transnational Education 2015: Widening the UK's Higher Education Market, Congress Centre, London, 04 March 2015. (Unpublished)
  6. Fitzgerald, R. (2014) Transforming higher education curriculum for transnational education. Invited Presentation presented to: The Future of Transnational Education, Royal College of Surgeons, London, 22 May 2014. (Unpublished)
  7. Fitzgerald, R., Anderson, M. and Thompson, R. (2014) MOOCs - mass marketing for a niche audience. Paper presented to: 13th European Conference on e-Learning (ECEL-2014), Aalborg University, Copenhagen, Denmark, 30-31 October 2014. (Unpublished)

G

  1. Gough, A. and Miles, R. (2017) Demand planning for novel modes of transport: the case of the Northampton Mole. Paper presented to: Chartered Institute of Logistics and Transport, Logistics Research Network Annual Conference, Southampton Solent University, 06-08 September 2017.
  2. Gough, A. and Murray, J. (2015) Engaging with the next generation: logistics and secondary education. Invited Presentation presented to: Council of Supply Chain Management Professionals: European Reseach Summit 2015, Copenhagen, Denmark, 23-24 April 2015.

H

  1. Hasan, M. N. (2016) Sustainable and socially responsible business: doable reality or just a luxury? An exploratory study of the Bangladeshi manufacturing SMEs. World Review of Entrepreneurship, Management and Sustainable Development. 1746-0581. (In Press)
  2. He, S., Khan, Z., Lew, Y. K. and Fallon, G. (2018) Technological innovation as a source of Chinese multinationals’ firm-specific advantages and internationalization. International Journal of Emerging Markets. 1746-8809. (Accepted)
  3. Hills, M. (2013) Editorial Board Member. Central European Journal of International and Security Studies. Online: Metropolitan University Prague. 7805-482x (online), 1802-548x (print).
  4. Hills, M. (2015) Committee Member of the 15th European Conference on Cyber Warfare and Security. European Conference on Cyber Warfare and Security.
  5. Hills, M. (2017) Reviewer. Journal of Terrorism Research.
  6. Hills, M. (2015) Reviewer. Information Security Journal.
  7. Hills, M. (2012) A new perspective on the achievement of psychological effects from cyber warfare payloads: the analogy of parasitic manipulation of host behavior. Journal of Law & Cyber Warfare. 1(1), pp. 208-217.
  8. Hills, M. (2017) Always on guard: how a corporate immune system can engage full-spectrum risks – a conceptual framework to re-engineer organizational capability and culture. In: Bajgoric, N. (ed.) Always-On Enterprise Information Systems for Modern Organizations. London: IGI Global. pp. 41-59.
  9. Hills, M. (2015) Assuring organisational resilience with lean Scenario-Driven Exercises. International Journal of Emergency Services. 4(1), pp. 37-49. 2047-0894.
  10. Hills, M. (2018) Asymmetric thinking: anthropology and its potential for career development. Workshop presented to: Anthropology Career Options, Oxford Brookes University, 23 April 2018.
  11. Hills, M. (2015) Beyond simple human threats to cybersecurity: the need for strong proactive measures and resilient responses to cyber risk. Cyber Security Review. Spring(2015), pp. 26-30. 2055-6950.
  12. Hills, M. (2015) Business continuity: observations for a Northamptonshire Enterprise Partnership seminar. Practical presented to: Business Continuity Workshop - Northamptonshire Enterprise Partnership, Nene Whitewater Centre, Northampton, 29 April 2015. (Unpublished)
  13. Hills, M. (2017) Communicating risk. POSTnote. 564(Nov 17), pp. 1-7.
  14. Hills, M. (2015) Competitive advantage from human factors: cybersecurity. Invited Presentation presented to: Warwick Manufacturing Group Cybersecurity MSc Programme Event, Warwick University, 20 April 2015. (Unpublished)
  15. Hills, M. (2012) Developing and maintaining personal resilience. Invited Presentation presented to: Senior Civil Service Base Camp, National School of Government, Sunningdale, 08 March 2012. (Unpublished)
  16. Hills, M. (2015) Enhancing corporate resilience to cyber-enabled attack: building immunity to psycho-cultural exploits. Invited Presentation presented to: Inaugural Northampton Business School Research Conference, Sunley Management Centre, The University of Northampton, 18 June 2015. (Unpublished)
  17. Hills, M. (2018) Enhancing evidence-based research within law-enforcement intelligence practice. Invited Keynote presented to: Society for Evidence Based Policing (SEBP) Conference 2018, Open University, Milton Keynes, 01-02 March 2018.
  18. Hills, M. (2012) From the field, to information warfare, to 10 Downing Street, the boardroom to the business school: applying anthropology to the real world. Invited Presentation presented to: Presentation for Final Year Undergraduates in Anthropology, Department of Anthropology, Oxford Brookes University, 09 February 2012. (Unpublished)
  19. Hills, M. (2017) Full spectrum threats – why organizational culture (and its micro-cultures) are critical to the success or failure of organizational resilience. In: Boskovic, M. (ed.) Security Risks: Assessment, Management and Current Challenges. New York: Nova Science Publishers.
  20. Hills, M. (2018) Improving incident detection through capturing new behaviour analytics. Invited Presentation presented to: The European Information Security Summit 2018 (TEISS), ILEC Conference Centre, London, 20-21 February 2018.
  21. Hills, M. (2014) Intellectual first mover advantage in a people-centric approach to achieving military superiority: out-thinking and out-fighting adversaries. The British Army Journal. 2014
  22. Hills, M. (2014) Key challenges for reputation, brand security and supply chain integrity. Invited Keynote presented to: Annual General Meeting of the UK Leather Federation, BLC Leather Technology Centre, Northampton, 28 January 2014. (Unpublished)
  23. Hills, M. (2017) Lessons from the NHS ransomware calamity. EDQuarter. 26/05/2017
  24. Hills, M. (2014) Leveraging professional expertise & leveraging choice for career or personal development. In: Alden Rivers, B. and Smith, J. (eds.) Changemaker in the Curriculum: The University of Northampton: Case Studies 2013-2014. Northampton: The University of Northampton. pp. 21-24.
  25. Hills, M. (2017) Nowt wrong with £3.47 chicken. Country Squire Magazine. 26/09/2017
  26. Hills, M. (2017) On Her Majesty’s service (and beyond): Anthropology’s contribution to an unconventional career. In: MacClancy, J. (ed.) Anthropology and Public Service: The UK Experience. Oxford: Berghahn. pp. 61-78.
  27. Hills, M. (2012) Social media & violent effects. Invited Presentation presented to: Changing Character of War Programme / British Army Study Day, University of Oxford, 09 July 2012. (Unpublished)
  28. Hills, M. (2015) Socio-cultural insight. Invited Presentation presented to: Changing Character of War Programme - British Army Study Day, University of Oxford, 19 May 2015. (Unpublished)
  29. Hills, M. (2014) Socio-technical security: the insider threat. Invited Presentation presented to: Warwick Manufacturing Group Cybersecurity MSc Programme Event, Warwick University, 24 April 2014. (Unpublished)
  30. Hills, M. (2017) The cancer of terrorism. Country Squire Magazine. 18/08/17
  31. Hills, M. (2014) The deregulation and swarming of cyberwarfare: the need for and limitations of law in enabling aggressive ‘hacking-back’ and pre-emption. Journal of Law & Cyber Warfare. 3(1), pp. 43-51.
  32. Hills, M. (2016) The use of lean, scenario-driven exercises for decision-making resilience. Invited Presentation presented to: Performing Under Pressure: A Masterclass In Organisational Resilience To Terrorism & Other Risks, Cheyne Walk Club, Cheyne Walk, Northampton, 06 May 2016. (Unpublished)
  33. Hills, M. (2017) Towards corporate cyber immunity. Invited Keynote presented to: Cyber Security Briefing by Northamptonshire Growth Hub, Office of the Police and Crime Commissioner and the University of Northampton, Cottesbrooke, Park Campus, The University of Northampton, 08 September 2017.
  34. Hills, M. (2015) Upstream operations: resilience to malign intent – ‘Analogical reasoning’ for new options to detect and engage. Invited Presentation presented to: Upstream Effects: Capacity Building, Stabilisation and Counter-Terrorism (Land Intelligence Fusion Centre, British Army and Oxford University), Merton College, University of Oxford, 08-09 December 2015. (Unpublished)
  35. Hills, M. (2014) Weak signals of the future: current challenges that may endure future media: implications for the armed forces of engagement in and through the media. Invited Presentation presented to: Changing Character of War Programme / British Army Directorate of Force Development, University of Oxford, 15 January 2014. (Unpublished)
  36. Hills, M. (2016) Why we need to rethink email #NHSMail. The University of Northampton Blog. 16/11/2016
  37. Hills, M. (2016) Written evidence submitted by Dr Mils Hills to the Culture, Media and Sport Select Committee Inquiry Cyber Security: Protection of Personal Data Online. London: Houses of Parliament.
  38. Hills, M. and Allen, N. (2018) Growing immunity to terrorist or other violent attacks at UK higher education institutions - CHESS: the Colleges and Higher Education Security Standard. Invited Presentation presented to: University of Northampton Annual Research Conference, The University of Northampton, 20-21 June 2018.
  39. Hills, M. and Allen, N. (2018) Organisational resilience at UoN: growing immunity to a full spectrum of threats. Invited Keynote presented to: Higher Education Business Continuity Network (HEBCoN) Annual Conference 2018, University of York, 22 March 2018.
  40. Hills, M. and Batchelor, G. (2015) Hard targets and an immune response: how information warfare and special force perspectives can deliver competitive advantage in mitigation and management of cyber crisis. Invited Presentation presented to: I4 (International Information Integrity Institute) - KPMG, Barcelona, Spain, 24 June 2015. (Unpublished)
  41. Hills, M. and Logendran, G. (2014) The rotten apple in the barrel has a bug in it: how the analogy of parasitic infection may shed light on the causes of & solutions to recent financial scandals. Invited Presentation presented to: British Accounting and Finance Association (BAFA) Annual Conference 2014, London School of Economics, 14-16 April 2014. (Unpublished)
  42. Hills, M. and Mehta, A. (2015) Parasites, energy and complex systems: generating novel intervention options to counter recruitment to suicide terrorism. In: Stedmon, A. and Lawson, G. (eds.) Hostile Intent and Counter-Terrorism: Human Factors Theory and Application. Farnham: Ashgate. pp. 225-231.

K

  1. Kakabadse, N. K., Lee-Davies, L. and Theodorakopoulos, N. (2010) Entrepreneurship, sustainability and CSR: the roles of values in SMEs. Enterprising Matters. Summer, p. 1. 2041-2606.
  2. Khan, Z., Wood, G., Tarba, S., Rao-Nicholson, R. and He, S. (2018) Human resource management in Chinese multinationals in the UK: the interplay of institutions, culture and strategic choice. Human Resource Management. 0090-4848. (In Press)
  3. Khan, Z., Khan, S. and Hills, M. (2013) Resource warfare: considering the challenge of supply chain security in an era of unrestricted warfare. International Journal of Logistics Economics and Globalisation. 5(3), pp. 240-249. 1741-5373.

L

  1. Laurie, S., Mortimer, K. and Beard, F. (2017) What is advertising? A study of the perceptions of Millenials. Paper presented to: 16th International Conference on Research in Advertising (ICORIA) 2017, Ghent University, Belgium, 29 June - 01 July 2017.

M

  1. McFarlane, P. and Hills, M. (2013) Developing immunity to flight security risk: prospective benefits from considering aviation security as a socio-technical eco-system. Journal of Transportation Security. 6(3), pp. 221-234. 1938-7741.
  2. Miles, R., Gough, A. and Silverthorne, B. (2016) The Northampton Mole Project – a case study of the application of freight pipelines in an urban environment. Invited Presentation presented to: 7th International Symposium on Underground Freight Transportation (ISUFT 2016), Arlington, Texas, USA, 22-24 August 2016.
  3. Montasari, R., Hill, R., Hosseinian-Far, A. and Montaseri, F. (2018) Countermeasures for timing-based side-channel attacks against shared, modern computing hardware. International Journal of Electronic Security and Digital Forensics. 1751-911X. (Accepted)
  4. Montasari, R., Hosseinian-Far, A. and Hill, R. (2018) Policies and innovative self-adaptive techniques to counter adversarial attacks in network and cyber environments. In: Jahankhani, H. (ed.) Cyber Criminology. Springer. (Accepted)
  5. Mostovicz, E. I. and Kakabadse, N. K. (2010) Humanistic business: toward a new business model. Paper presented to: 16th International Symposium on Ethics, Business and Society: Facing the Crisis: Towards a New Humanistic Synthesis, IESE Business School, University of Navarra, Barcelona, Spain, 13-15 May 2010. (Unpublished)
  6. Mshelia, J. B. and Anchor, J. R. (2018) Political risk assessment by multinational corporations in African markets: a Nigerian perspective. Thunderbird International Business Review. 1096-4762. (In Press)

P

  1. Paterson-Young, C., Hazenberg, R. and Bajwa-Patel, M. (2017) Exploring the education background for children and young people sentenced to custody in England and Wales. Panel Presentation presented to: European Educational Research Association (ECER) 2017: Reforming Education and the Imperative of Constant Change: Ambivalent Roles of Policy and Educational Research, Copenhagen, Denmark, 21-25 August 2017.

Y

  1. Yu, Y., Kaiya, H., Yoshioka, N., Hu, Z., Washizaki, H., Xiong, Y. and Hosseinian-Far, A. (2018) Goal modelling for security problem matching and pattern enforcement. International Journal of Secure Software Engineering (IJSSE). 8(3), pp. 42-57. 1947-3036.
This list was generated from NECTAR on Wed Sep 3 16:48:44 2025 BST.