resource dependence theory (RDT) posits, a department’s power depends on the extent to which its resources are critical for the firm’s success (Salancik and Pfeffer, 1978). Powerful marketing departments likely produce enhanced marketing resources, competences, and assets (Feng et al.,2015; Kru...
Following his concept, we expect that the degree to which people perceive the crisis as a threat increases their willingness to share electricity. The norm activation theory posits that for an individual to behave altruistically, this individual must be (1) aware of the negative consequences of a...
Understanding the impact of past relationships on emotional well-being. Explore the importance of moving on from an ex-.
Distributed energy-politics posits that distributed energy sources and technologies enable and organize distributed political power and vice versa. Efforts are underway to find ways to re-organize distributed energy flows into aggregated and concentrated stocks of energy and other forms of political power...
Gordon Allport posits additional ideas regarding cell assembly theory and its role in forming engrams, along the lines of the concept of auto-association, described as follows: “If the inputs to a system cause the same pattern of activity to occur repeatedly, the set of active elements consti...
A fan-made theory that's quickly gaining traction onRedditposits that the members of the Usher family each represent one of the seven deadly sins. Also referred to as the cardinal sins, these vices have a strong presence in Christian teachings and, as a result, Western literature. Often desc...
Damn straight! The theory of complete transparency is like the nothing to hide argument that I hate so much. MikeA•March 11, 2008 11:24 AM @cassandra: In some people’s experience, the mere act of asking someone in officialdom for their ID signals to the official in question that you...
This article surveys contemporary trends in leadership theory as well as its current status and the social context that has shaped the contours of leadersh... W Bennis - 《American Psychologist》 被引量: 366发表: 2007年 Middle power leadership and coalition building: Australia, the Cairns Group,...
The potential loss in security due to quantum computing has led to a great interest in adapting more secure cryptographic primitives for the DLT systems and transition plans. This concern is primarily applicable to asymmetric cryptographic algorithms. The current view is that symmetric and hash ...
The disinhibition hypothesis posits that the NMDAR blockade on 𝛾γ-aminobutyric acid (GABA)-ergic interneurons results in lower interneuron activity and, therefore, the higher activity of glutamatergic neurons, thus consequently inducing activity-dependent long-term potentiation (LTP) [23,24,25]. ...