03311nam 2200637Ia 450 991046265910332120200520144314.01-283-85451-190-04-24177-9(CKB)2670000000309438(EBL)1081558(OCoLC)821180633(SSID)ssj0000784732(PQKBManifestationID)11486498(PQKBTitleCode)TC0000784732(PQKBWorkID)10763449(PQKB)11511093(MiAaPQ)EBC1081558(nllekb)BRILL9789004241770(Au-PeEL)EBL1081558(CaPaEBR)ebr10631728(CaONFJC)MIL416701(EXLCZ)99267000000030943820120907d2013 uy 0engurcn|||||||||txtccrBreaking into the monopoly[electronic resource] provincial merchants and manufacturers' campaigns for access to the Asian market, 1790-1833 /by Yukihisa KumagaiLeiden ;Boston Brill20131 online resource (249 p.)Library of economic history ;v. 4Description based upon print version of record.90-04-24172-8 Includes bibliographical references and index.Preliminary Material -- Introduction -- Defending the Monopoly: The East India Company, 1790's–1830's -- Challenging the Commercial Giant: The Glasgow East India Association, 1812–1813 -- Struggling for Lucrative Trade: The Glasgow East India Association, 1829–1833 -- Aiming for the Premier Port of the Empire: The Liverpool East India Association, 1812–1813 and 1829–1833 -- Searching for New Markets: The Manchester Chamber of Commerce and Manufacturers, 1829–1833 -- Conclusion -- Appendices -- Bibliography -- Index.Based on a number of historical documents, Breaking into the Monopoly examines how the commercial pressure groups of Glasgow, Liverpool, and Manchester organised nationwide campaigns to break into the British East India Company’s monopoly for free access to Asian markets from 1812-1813 and 1829-1833. The analysis includes various aspects of the campaigners’ motives, strategies, methods, and networks, as well as their relationship with the London mercantile society in nineteenth-century Britain. The author, Yukihisa Kumagai, brings new insights to the question regarding the connection between the rapidly growing provincial mercantile and manufacturing interests and Britain’s economic and imperial policies during the Industrial Revolution.Library of Economic History4.MonopoliesGreat BritainHistory19th centuryTrade associationsGreat BritainHistory19th centuryAsiaCommerceGreat BritainGreat BritainCommerceAsiaElectronic books.MonopoliesHistoryTrade associationsHistory382.095382.095041Kumagai Yukihisa866057MiAaPQMiAaPQMiAaPQBOOK9910462659103321Breaking into the monopoly1932899UNINA06107nam 22006855 450 99646545090331620200903195841.03-030-57404-010.1007/978-3-030-57404-8(CKB)4100000011392507(DE-He213)978-3-030-57404-8(MiAaPQ)EBC6313876(PPN)257360050(EXLCZ)99410000001139250720200903d2020 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierHuman Aspects of Information Security and Assurance[electronic resource] 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings /edited by Nathan Clarke, Steven Furnell1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (XI, 367 p. 51 illus., 30 illus. in color.) IFIP Advances in Information and Communication Technology,1868-4238 ;593Includes index.3-030-57403-2 Privacy and COVID-19 -- Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference? -- Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa -- A review of information security aspects of the emerging covid19 contact tracing mobile phone applications -- Awareness and Training -- Towards a Cross-Cultural Education Framework for Online Safety Awareness -- A heuristic point of view of cybersecurity and online safety pedagogy -- Context Based Micro Training: A Framework for Information Security Training -- Social Engineering -- Employees’ Ambition for Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test -- Does ubuntu influence social engineering susceptibility? -- Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory -- Security Behaviour -- Kids Doodle Pass: An Exploratory Study of an Authentication Mechanism for Young Children -- Information security behavioural threshold analysis in practice: An implementation framework -- Information security behaviour: Development of a measurement instrument based on the self-determination theory -- Education -- Addressing SME Characteristics for Designing Information Security Maturity Models -- Cyber Security Education and Training: Delivering industry relevant education and skills via Degree Apprenticeships -- Internet Self-Regulation in Higher Education: A Metacognitive approach to Internet Addiction -- End-User Security -- Evaluation of User App Choices in the Presence of Risk Communication on Android Devices -- Exploring Information Security and Domestic Equality -- Responding to KRACK: Wi-Fi Security Awareness in Private Households -- Usable Security -- Exploring the meaning of "usable security" -- Dyslexia and Password Usage: Accessibility in Authentication Design -- Securing User eXperience (SUX): A Review For the End-Users’ Software Robustness -- Security Policy -- SMEs’ Confidentiality Concerns for Security Information Sharing -- Validation of an information privacy perception instrument at a Zimbabwean university -- Are We Really Informed on the Rights GDPR Guarantees? -- Attitudes and Perceptions -- “Most Companies Share Whatever They Can to Make Money!”: Comparing User's Perceptions with the Data Practices of IoT Devices -- Analysis of the ‘Open Source Internet Research Tool’: A Usage Perspective from UK Law Enforcement -- Critical analysis of Information Security Culture Definitions.This book constitutes the proceedings of the 14th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.* The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions. They are organized in the following topical sections: privacy and COVID-19; awareness and training; social engineering; security behavior; education; end-user security; usable security; security policy; and attitudes and perceptions. *The symposium was held virtually due to the COVID-19 pandemic.IFIP Advances in Information and Communication Technology,1868-4238 ;593Application softwareComputer securityData encryption (Computer science)Computer networksSecurity measuresComputer communication systemsInformation Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Mobile and Network Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28050Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Application software.Computer security.Data encryption (Computer science).Computer networksSecurity measures.Computer communication systems.Information Systems Applications (incl. Internet).Systems and Data Security.Cryptology.Mobile and Network Security.Computer Communication Networks.005.8Clarke Nathanedthttp://id.loc.gov/vocabulary/relators/edtFurnell Stevenedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996465450903316Human Aspects of Information Security and Assurance2161895UNISA01625nam a22003131i 450099100210760970753620040126100812.0040407s1987 it a||||||||||||||||ita b12871783-39ule_instARCHE-085140ExLDip.to Scienze StoricheitaA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l.709.88709.22Italia :Soprintendenza per i beni culturali e ambientali di Palermo423419Opere d'arte dal XII al XVII secolo :interventi di restauro ed acquisizioni culturali : attività divulgativa e didattica 1987 /schede a cura di V. Abbate ... [et al.] ; nota introduttiva di V. Scuderi[S.l. :s.n.,1987](Palermo :Arti grafiche siciliane)89 p., 41 c. di tav. :ill. ;22 cmCatalogo della mostraIn testa al front.: Assessorato regionale dei beni culturali, ambientali e pubblica istruzione, Soprintendenza per i beni culturali e ambientali, Sezione per i beni artistici e storici, Galleria regionale della Sicilia, PalermoOpere d'arte restaurateEsposizioni1987SiciliaOpere d'arteSec. 12.Sec. 17.RestauriAbbate, Vincenzo<1949- >Scuderi, Vincenzo.b1287178302-04-1416-04-04991002107609707536LE009 ARTE 710-4012009000325401le009-E0.00-n- 01110.i1343274616-04-04Opere d'arte dal XII al XVII secolo300667UNISALENTOle00916-04-04ma -itait 01