Flylib.com
Index_R
Previous page
Table of content
Next page
R
Radtke, R 73-74
Rampton, S 7
Rampton, S and Stauber, J
Toxic Sludge is Good for You: The Public Relations Industry Unspun
5, 63, 167, 170
Trust Us, We're Experts: How Industry Manipulates Science and Gambles with Your Future
63, 114
Rand, A
Atlas Shrugged
47
The Fountainhead
47
reputation 5, 160
respect 51-65
r sum 56-58
padding 57-58
˜puffing up 56-57
rights 31-35
conflicting 33-34
in public relations 34-35
and responsibilities 32-33
˜Robin Hood ethics 43-47
Robinson, D and Garratt, C,
Introducing Ethics
170-71
role of PR, social responsibility 160-62
roles of PR practitioners 105
advocacy role 106-07, 109-10
rule-based ethics 38-40
rules 37-42
compared with laws 37-38
conflicting 40
interpretation 40
loopholes 39
Previous page
Table of content
Next page
Ethics in Public Relations: A Guide to Best Practice (PR in Practice)
ISBN: 074945332X
EAN: 2147483647
Year: 2004
Pages: 165
Authors:
Patricia J Parsons
,
Patricia J. Parsons
BUY ON AMAZON
Lotus Notes and Domino 6 Development (2nd Edition)
Defining a Domino Database
Error Handling
Writing JavaScript for Domino Applications
Writing Java Applets
Using Roles
VBScript Programmers Reference
Control of Flow
The Scripting Runtime Objects
Appendix F The Scripting Runtime Library Object Reference
Appendix I VBScript Features not in VBA
Appendix K The Variant Subtypes
Visual C# 2005 How to Program (2nd Edition)
Classes, Objects, Methods, Properties and Instance Variables
Exercises
Wrap-Up
Self-Review Exercises
J.1. ATM Case Study Implementation
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
The roots of SOA (comparing SOA to past architectures)
Service activity
Reliable messaging
The agile strategy
Benefits of a business-centric SOA
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 338 Service-Entrance Cable Types SE and USE
Article 384 Strut-Type Channel Raceway
Article 394 Concealed Knob-and-Tube Wiring
Article 504 Intrinsically Safe Systems
Article 701 Legally Required Standby Systems
802.11 Wireless Networks: The Definitive Guide, Second Edition
User Authentication with 802.1X
Management Architecture
Power Conservation
Complementary Code Keying
Ensuring Secrecy Through Encryption
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies