Search Results

There are 1314 results for: content related to: Applicant Reactions to Selection Procedures: An Updated Model and Meta-Analysis

  1. You have free access to this content
    Gas Chromatography-Combustion-Isotope Ratio Mass Spectrometry for Traceability and Authenticity in Foods and Beverages

    Comprehensive Reviews in Food Science and Food Safety

    Volume 13, Issue 5, September 2014, Pages: 814–837, Katryna A. van Leeuwen, Paul D. Prenzler, Danielle Ryan and Federica Camin

    Version of Record online : 19 AUG 2014, DOI: 10.1111/1541-4337.12096

  2. An efficient authentication system of smart device using multi factors in mobile cloud service architecture

    International Journal of Communication Systems

    Volume 28, Issue 4, 10 March 2015, Pages: 659–674, Young-Sik Jeong, Ji Soo Park and Jong Hyuk Park

    Version of Record online : 16 JAN 2014, DOI: 10.1002/dac.2694

  3. Consumer behaviour towards counterfeit drugs in a developing country

    Journal of Pharmaceutical Health Services Research

    Volume 3, Issue 3, September 2012, Pages: 165–172, Abubakr A. Alfadl, Mohamed Izham M. Ibrahim and Mohamed A. Hassali

    Version of Record online : 19 JUL 2012, DOI: 10.1111/j.1759-8893.2012.00095.x

  4. Model driven security framework for software design and verification

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2768–2792, Engin Deveci and Mehmet U. Caglayan

    Version of Record online : 12 MAR 2015, DOI: 10.1002/sec.1200

  5. Inclusion: Conceptualization and measurement

    European Journal of Social Psychology

    Volume 44, Issue 4, June 2014, Pages: 370–385, Wiebren S. Jansen, Sabine Otten, Karen I. van der Zee and Lise Jans

    Version of Record online : 13 MAR 2014, DOI: 10.1002/ejsp.2011

  6. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1378–1407, Rajeev Singh and Teek Parval Sharma

    Version of Record online : 21 AUG 2014, DOI: 10.1002/sec.1079

  7. On the trail of supply side authenticity: Paradoxes and compromises emerging from an action research

    Journal of Consumer Behaviour

    Volume 13, Issue 3, May/June 2014, Pages: 176–187, Silvia Ranfagni and Simone Guercini

    Version of Record online : 27 MAY 2014, DOI: 10.1002/cb.1481

  8. The Unwritable in Full Pursuit of the Unreadable: Adorno's Philosophie der neuen Musikin Translation: Supplement

    Music Analysis

    Volume 30, Issue 2-3, July/October 2011, Pages: 397–466, ROSE ROSENGARD SUBOTNIK

    Version of Record online : 19 JUN 2012, DOI: 10.1111/j.1468-2249.2012.00346.x

  9. Does a Terroir Product Tell the Same Story to Tourists, Day-trippers and Local Consumers? The Moderating Role of Variety-seeking Tendency and Perceived Authenticity

    International Journal of Tourism Research

    Volume 18, Issue 5, September/October 2016, Pages: 494–505, François Lenglet and Jean-Luc Giannelloni

    Version of Record online : 16 NOV 2015, DOI: 10.1002/jtr.2067

  10. Secure authentication mechanism for RFID tag in WLAN convergence 3G networks

    Security and Communication Networks

    Volume 5, Issue 3, March 2012, Pages: 319–330, Ming-Huang Guo, Horng-Twu Liaw, Jyun-Fu Chen and Der-Jiunn Deng

    Version of Record online : 12 MAY 2011, DOI: 10.1002/sec.339

  11. An Activity-Based Instructional Framework for Transforming Authentic Modeling Practices into Meaningful Contexts for Learning in Science Education

    Science Education

    Volume 100, Issue 6, November 2016, Pages: 1092–1123, GJALT T. PRINS, ASTRID M. W. BULTE and ALBERT PILOT

    Version of Record online : 26 AUG 2016, DOI: 10.1002/sce.21247

  12. How authenticity and self-directedness and student perceptions thereof predict competence development in hands-on simulations

    British Educational Research Journal

    Volume 41, Issue 2, April 2015, Pages: 265–286, Anne Khaled, Judith Gulikers, Harm Biemans and Martin Mulder

    Version of Record online : 24 FEB 2014, DOI: 10.1002/berj.3138

  13. How European consumers define the concept of traditional food: evidence from a survey in six countries


    Volume 26, Issue 4, Autumn (Fall) 2010, Pages: 453–476, Filiep Vanhonacker, Wim Verbeke, Luis Guerrero, Anna Claret, Michele Contel, Luisa Scalvedi, Sylwia Żakowska-Biemans, Krystyna Gutkowska, Claire Sulmont-Rossé, Jocelyn Raude, Britt Signe Granli and Margrethe Hersleth

    Version of Record online : 15 JUL 2010, DOI: 10.1002/agr.20241

  14. Beyond Authenticity? Humanism, Posthumanism and New Organization Development

    British Journal of Management

    Volume 25, Issue 4, October 2014, Pages: 706–723, Melanie Bryant and Julie Wolfram Cox

    Version of Record online : 10 MAR 2013, DOI: 10.1111/1467-8551.12005

  15. Customer perceptions for expectations and acceptance of an authentic dining experience in Thai restaurants

    Journal of Foodservice

    Volume 18, Issue 2, April 2007, Pages: 69–75, Piyavan Sukalakamala and Janice B. Boyce

    Version of Record online : 9 MAY 2007, DOI: 10.1111/j.1745-4506.2007.00048.x

  16. Your Guide to Authenticating Mobile Devices

    Journal of Corporate Accounting & Finance

    Volume 26, Issue 4, May/June 2015, Pages: 65–82, J. Lowell Mooney, Abbie Gail Parham and Timothy D. Cairney

    Version of Record online : 22 APR 2015, DOI: 10.1002/jcaf.22052

  17. Recent Alcatel-Lucent Patents

    Bell Labs Technical Journal

    Volume 18, Issue 3, December 2013, Pages: 293–321,

    Version of Record online : 27 NOV 2013, DOI: 10.1002/bltj.21640

  18. Recent Alcatel-Lucent Patents

    Bell Labs Technical Journal

    Volume 17, Issue 2, September 2012, Pages: 143–171,

    Version of Record online : 24 AUG 2012, DOI: 10.1002/bltj.21549

  19. Authentication Projects For Historical Fiction: Do You Believe It?

    The Reading Teacher

    Volume 66, Issue 6, March 2013, Pages: 495–505, Erin McTigue, Elaine Thornton and Patricia Wiese

    Version of Record online : 20 NOV 2012, DOI: 10.1002/TRTR.1132

  20. A secure end-to-end SMS-based mobile banking protocol

    International Journal of Communication Systems

    Sriramulu Bojjagani and V. N. Sastry

    Version of Record online : 28 FEB 2017, DOI: 10.1002/dac.3302