Search Results - The King's Trust

Refine Results
  1. 1
  2. 2
  3. 3

    The King James only controversy : can you trust the modern translations? / by White, R. James

    Published 1995
    Book
  4. 4

    The King James only controversy : can you trust the modern translations? / by White, R. James

    Published 1995
    Book
  5. 5
  6. 6
  7. 7

    The trust crisis in healthcare causes, consequences, and cures /

    Published 2007
    Table of Contents: “…Cutler -- Building trust in a healthcare system / Michael J. Dowling -- Building trust in the clinician's office and at the bedside / Richard Toran and Howard King -- Conclusion: trust in healthcare, trust in society / Marc J. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 8

    The trust crisis in healthcare causes, consequences, and cures /

    Published 2007
    Table of Contents: “…Cutler -- Building trust in a healthcare system / Michael J. Dowling -- Building trust in the clinician's office and at the bedside / Richard Toran and Howard King -- Conclusion: trust in healthcare, trust in society / Marc J. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 9
  10. 10
  11. 11

    Africa : altered states, ordinary miracles / by Dowden, Richard

    Published 2009
    Table of Contents: “…Somalia -- Forward to the past: Zimbabwe -- Breaking apart: Sudan -- A tick bigger than the dog: Angola -- Missing the story and the sequel: Burundi and Rwanda -- God, trust and trade: Senegal -- Dancers and the leopard men: Sierra Leone -- The positive women: AIDS in Africa -- Copying King Leopold: Congo -- Not just another country: South Africa -- Meat and money: eating in Kenya -- Look out world: Nigeria -- New colonists or old friends? …”
    Book
  12. 12

    Africa : altered states, ordinary miracles / by Dowden, Richard

    Published 2009
    Table of Contents: “…Somalia -- Forward to the past: Zimbabwe -- Breaking apart: Sudan -- A tick bigger than the dog: Angola -- Missing the story and the sequel: Burundi and Rwanda -- God, trust and trade: Senegal -- Dancers and the leopard men: Sierra Leone -- The positive women: AIDS in Africa -- Copying King Leopold: Congo -- Not just another country: South Africa -- Meat and money: eating in Kenya -- Look out world: Nigeria -- New colonists or old friends? …”
    Book
  13. 13

    Public opinion in state politics

    Published 2006
    Table of Contents: “…Barrilleaux -- The civil state: trust, polarization, and the quality of state government / by Eric M. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 14

    Public opinion in state politics

    Published 2006
    Table of Contents: “…Barrilleaux -- The civil state: trust, polarization, and the quality of state government / by Eric M. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  15. 15
  16. 16
  17. 17

    The ethics of bioethics mapping the moral landscape /

    Published 2007
    Table of Contents: “…Analyzing pandora's box : the history of bioethics / Carol Levine -- A history of codes of ethics for bioethicists / Robert Baker -- The tyranny of expertise / Carl Elliott -- Trusting bioethicists / James Lindemann Nelson -- Intellectual capital and voting booth bioethics : a contemporary historical critique / M.L. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 18

    The ethics of bioethics mapping the moral landscape /

    Published 2007
    Table of Contents: “…Analyzing pandora's box : the history of bioethics / Carol Levine -- A history of codes of ethics for bioethicists / Robert Baker -- The tyranny of expertise / Carl Elliott -- Trusting bioethicists / James Lindemann Nelson -- Intellectual capital and voting booth bioethics : a contemporary historical critique / M.L. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  19. 19

    Defending the brand aggressive strategies for protecting your brand in the online arena / by Murray, Brian H., 1968-

    Published 2004
    Table of Contents: “…-- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  20. 20

    Defending the brand aggressive strategies for protecting your brand in the online arena / by Murray, Brian H., 1968-

    Published 2004
    Table of Contents: “…-- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook