Search Results - The King's Trust
Suggested Topics within your search.
Suggested Topics within your search.
- History 4
- 20th century 2
- Adversaries 2
- Authorized 2
- Bible, English 2
- Bible,English 2
- Bioethics 2
- Brand name products 2
- Branding (Marketing) 2
- British and Irish Literature 2
- British literature 2
- Charitable uses, trusts, and foundations 2
- Charities 2
- Civilization 2
- Conditions sociales 2
- Conspiracies 2
- Corrupt practices 2
- Electronic commerce 2
- Hawaiians 2
- Histoire 2
- Internet marketing 2
- Kings and rulers 2
- Legal status, laws, etc 2
- Literature 2
- Literature, Modern 2
- Medical care 2
- Medical ethics 2
- Oaths (Greek law) 2
- Politics and government 2
- Politique et gouvernement 2
-
1
Broken Trust : Greed, Mismanagement & Political Manipulation at America’s Largest Charitable Trust /
Published 2006Full text available:
Electronic eBook -
2
Broken Trust : Greed, Mismanagement & Political Manipulation at America’s Largest Charitable Trust /
Published 2006Full text available:
Electronic eBook -
3
-
4
-
5
-
6
-
7
The trust crisis in healthcare causes, consequences, and cures /
Published 2007Table of Contents: “…Cutler -- Building trust in a healthcare system / Michael J. Dowling -- Building trust in the clinician's office and at the bedside / Richard Toran and Howard King -- Conclusion: trust in healthcare, trust in society / Marc J. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
The trust crisis in healthcare causes, consequences, and cures /
Published 2007Table of Contents: “…Cutler -- Building trust in a healthcare system / Michael J. Dowling -- Building trust in the clinician's office and at the bedside / Richard Toran and Howard King -- Conclusion: trust in healthcare, trust in society / Marc J. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Oaths and swearing in ancient Greece /
Published 2014An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Oaths and swearing in ancient Greece /
Published 2014An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Africa : altered states, ordinary miracles /
Published 2009Table of Contents: “…Somalia -- Forward to the past: Zimbabwe -- Breaking apart: Sudan -- A tick bigger than the dog: Angola -- Missing the story and the sequel: Burundi and Rwanda -- God, trust and trade: Senegal -- Dancers and the leopard men: Sierra Leone -- The positive women: AIDS in Africa -- Copying King Leopold: Congo -- Not just another country: South Africa -- Meat and money: eating in Kenya -- Look out world: Nigeria -- New colonists or old friends? …”
Book -
12
Africa : altered states, ordinary miracles /
Published 2009Table of Contents: “…Somalia -- Forward to the past: Zimbabwe -- Breaking apart: Sudan -- A tick bigger than the dog: Angola -- Missing the story and the sequel: Burundi and Rwanda -- God, trust and trade: Senegal -- Dancers and the leopard men: Sierra Leone -- The positive women: AIDS in Africa -- Copying King Leopold: Congo -- Not just another country: South Africa -- Meat and money: eating in Kenya -- Look out world: Nigeria -- New colonists or old friends? …”
Book -
13
Public opinion in state politics
Published 2006Table of Contents: “…Barrilleaux -- The civil state: trust, polarization, and the quality of state government / by Eric M. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Public opinion in state politics
Published 2006Table of Contents: “…Barrilleaux -- The civil state: trust, polarization, and the quality of state government / by Eric M. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
The digital crown : winning at content on the web /
Published 2014An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
The digital crown : winning at content on the web /
Published 2014An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
The ethics of bioethics mapping the moral landscape /
Published 2007Table of Contents: “…Analyzing pandora's box : the history of bioethics / Carol Levine -- A history of codes of ethics for bioethicists / Robert Baker -- The tyranny of expertise / Carl Elliott -- Trusting bioethicists / James Lindemann Nelson -- Intellectual capital and voting booth bioethics : a contemporary historical critique / M.L. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
The ethics of bioethics mapping the moral landscape /
Published 2007Table of Contents: “…Analyzing pandora's box : the history of bioethics / Carol Levine -- A history of codes of ethics for bioethicists / Robert Baker -- The tyranny of expertise / Carl Elliott -- Trusting bioethicists / James Lindemann Nelson -- Intellectual capital and voting booth bioethics : a contemporary historical critique / M.L. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Defending the brand aggressive strategies for protecting your brand in the online arena /
Published 2004Table of Contents: “…-- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Defending the brand aggressive strategies for protecting your brand in the online arena /
Published 2004Table of Contents: “…-- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook