Code-switching as appraisal resource in talking about third parties
نویسندگان
چکیده
منابع مشابه
Talking about Knowledge with Human Resource Practitioners
In all that has been written about organizational knowledge in recent years, the voices of organizational actors have rarely been heard. This paper presents the findings from a study that explored how Human Resource (HR) professionals talked about knowledge in relation to their practice within large organizations. They talked about areas of knowledge, the importance of knowledge and the use of ...
متن کاملIdiosyncratic deals: coworkers as interested third parties.
Idiosyncratic deals (i-deals for short) are personalized employment arrangements negotiated between individual workers and employers and intended to benefit them both (D. M. Rousseau, 2005). Coworkers' acceptance of another's i-deal can ultimately impact its overall effectiveness for the organization. By using a network approach to the study of work group dynamics, this research addresses the c...
متن کاملD-Theory: Talking about Talking about Trees
Linguists, including computational linguists, have always been fond of talking about trees. In this paper, we outline a theory of linguistic structure which talks about talking about trees; we call this theory Description theory (D-theory). While important issues must be resolved before a complete picture of D-theory emerges (and also before we can build programs which utilize it), we believe t...
متن کاملContracting with Third Parties
odels of bilateral contracting, such as the canonical holdup model, typically assume that third parties are not available. Given this assumption, the equilibrium outcome is not first-best efficient if contracts can be renegotiated. To be more specific, suppose an architect and a builder must cooperate to build a building. The quality of the building will depend on three things: the quality of t...
متن کاملTowards Tiny Trusted Third Parties
Many security protocols hypothesize the existence of a trusted third party (TTP) to ease handling of computation and data too sensitive for the other parties involved. Subsequent discussion usually dismisses these protocols as hypothetical or impractical, under the assumption that trusted third parties cannot exist. However, the last decade has seen the emergence of hardware-based devices that,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Linguistik Online
سال: 2012
ISSN: 1615-3014
DOI: 10.13092/lo.51.304