Journal of Rural and Industrial Development

Volume : 7 Issue : 2
Published : 2019
Locked
Subscribed
Open Access
Articles
The Role of CQ, EQ and SQ in Shaping Leadership Competence in Context to Transformational Leadership
Aditi Sharma Dogra, Varsha Dixit | 1-8

Knowledge Management - A Mediating Link Between Leadership Styles and Employee Turnover Intentions in Small and Medium Scale IT or ITES Organizations of North Indian Region
Anchal Luthra, Kavita Singh | 9-26

Role of Emotional Intelligence in Effective Leadership
Renu Yadav, Priti Lata | 27-32

Transformational Leadership and OCTAPACE Culture - A Study of Academic Staff in Select Universities
Umar Mufeed | 33-40

Exploring Ethics in E-Marketing for Responsible Leadership
Bodh Raj Sharma | 41-48

Assessing the Situational Leadership of Managers in the Mobile Service Industry
Himani Bhasin | 49-57

Impact of Leadership on Employee Engagement and Intent to Stay
Amitabh Patnaik, Rachana Dubey | 58-66

HR Practices in Rural Micro Enterprises - An Empirical Investigation
Dipu Varghese, Chinnu P. B. | 1-14

Psychological Empowerment: The Key to Mobilizing Rural Women as Agents of Poverty Eradication
Isha Yadav | 15-22

Content Analysis of MGNREGAs TV Advertisements and Online News Coverage
Shriram Kadia, Sapna Parashar | 23-33

An Insight into the Impact of Socio-Economic Variables on Bhadohi Carpet Industry
Chandrika Soni | 34-41

Constraints Analysis and Prospects of Cashew Growers in Sindhudurg District (Maharashtra State)
Mugdha Atul Kamat | 42-48

Profile of the Customers and Level of Banking Penetration: A Relationship Study
Mohammed Abubakkar Siddique R., Selvakumar M. | 1-12

Managing Satisfaction for Home Loan in Public Sector Banks of India
Ajitabh Dash | 13-19

Perception of Rural Households Towards Availability of Cooperative Banking Services in Northern States of India
Tarsem Lal | 20-33

Competition and Social Performance of Microfinance Institutions in India: An Empirical Investigation
Joyeeta Deb | 34-45

Scale Efficiency and Indian Life Insurance Industry During the Post-Reform Period: An Econometric Study
Madhu Sarda, Indrajit Ray | 46-62

Factors of Financial Consumer Protection of Commercial Banks
Sathyalakshmi V., Selvakumar M. | 63-75

The Legal Aspects of the Wilful Defaults in India: A Critical Study
Nikita Rangoonwala | 76-85

Antecedents of Competency Development in B-Schools
Moutushi Ganguli Sharma, Mahesh Kumar K. R., Kshitiz Sharma | 1-10

Empirical Exploration of Preferred Collaborative Knowledge-Sharing Practices in Indian Private Academia
Sushmita Goswami, Brijesh Kishore Goswami | 11-16

Human Resources and Knowledge Management Practices in Tertiary Institutions in Nigeria - Challenges and Prospects
Oluyinka Titilope Afolayan | 17-24

HR Practices in Managing Knowledge Workforce - A Perceptual Study
Umar Mufeed | 25-28

Developing a Smartphone Dependency Scale for University Students in India: A Confirmatory Factor Analytic Approach
Mohammed Naved Khan, Obaidur Rahman | 29-43

Customer Criterion for Selecting a Bank: An Exploratory Factor Analysis from an Indian Perspective
Gunjan Sharma, Kushagra Kulshreshtha | 1-8

Customised Customer Contact Services in Hotels - The State of the Art
Maria Nascimento Cunha, Isabel Miguel | 9-15

A Study on Gender Differences in Motives of Visit Intention, Perceived Value and Tourist Satisfaction With Rural Tourism in India
Anil Kumar | 16-26

An Exploratory Study of Customer Perceptions of Usage of Chatbots in the Hospitality Industry
Mihir Dash, Suprabha Bakshi | 27-33

Learning from Cradle to Grave: Attaining SDG Goal 4 to Ensure Lifelong Learning by Schools and Academic Libraries in Ghana
Gloria Tachie-Donkor, Paulina Afful-Arthur and Christopher Kwame Filson | 1-9

An Efficient Sentimental Analysis Mining for Unclassified Data in Big Data Analytics
Komarasamy G. and Vivek V. | 10-18

Data Encryption Security in Mobile and Cloud Computing Environments
Rashmi P. Sarode and Subhash Bhalla | 19-30

Performance Comparison of Similarity Measures Used in Recommendation Systems
Berna Seref and Erkan Bostanci | 31-37

Awareness Levels of Kenya Library and Information Service Consortiums (KLISC) Services and Resources at University of Nairobi and Kenya National Library Services
Naomy Mwaurah and Ben Wekalao Namande | 38-43

Review of State of Art of Software-Defined Networking for 5G
Akash Hegde and Vishalakshi Prabhu H. | 1-8

Network Security Implemented With Intelligent Agent Through Multi-Agent System
Meena Sachdeva and Avadhesh Kumar | 9-17

Detection and Elimination of the Selfish Node in Ad-Hoc Network Using Energy Credit Based System
Samara Mubeen and Syyed Johar | 18-22

Performance Analysis of a QAPF Scheduling Scheme in LTE Network
Zin Mar Myo, Zar Lwin Phyo and Aye Thida Win | 23-27

Modern Cryptographic Schemes: Applications and Comparative Study
Julius O. Olwenyi, Aby Tino Thomas and Ayad Barsoum | 28-34

Measures of Association Among Several Variables
Arnab Kumar Laha | 1-3

The Tale of Digital Democratic Journey
Madhumita Ghosh | 4-5

On Data and Science
Favio Vázquez | 6-10

A Study on Factors Influencing Employees on Adoption of Digital Transformation Initiation by Employers
Pradeep Kumar C., Renjith K. R., Nimal C. N. | 11-18

Recalibration and Application of Springate, Zmijewski and Grover Bankruptcy Models in Indian Banking Sector
Reshma Prabhu Verlekar, Manoj S. Kamat | 19-27

Emerging Trends in Accounting: An Analysis of Impact of Robotics in Accounting, Reporting and Auditing of Business and Financial Information
M. L. Ashoka, Abhishek N., Divyashree M. S. | 28-34

Causal Link Between FDI and Economic Growth - Panel Data Analysis of MINT Economies
Karan Sabharwal | 35-41

Recommending Movies Using User-Based and Item-Based Collaborative Filtering on R Platform
Chirag Malik | 42-46

Security Mechanism for Twitter Data Using Cassandra in Cloud
Sangeeta Gupta and Nikitha Kumari | 1-6

Task Scheduling and VM Allocation in Cloud Computing: A Survey
Jeny Varghese and S. Jagannatha | 7-18

Intelligent Control System of Wheelchair Based on Brain Wave and Voice
Jianyong Zhang, Wei Han and Pingzeng Liu | 1-6

Cost Analysis for N-Policy Machining System With Spares, Service Halt, Set Up and Common Cause Failure
Neetu Singh | 7-14

Smart Intrusion Detection Systems Using Machine Learning
Yaseen Khan, Zaid Haroon Jan and Nagaveni V. | 15-20

Virtualization of the Legacy VxWorks Application onto the Linux Platform
Krithika L. and Vishalakshi Prabhu H. | 19-26

A Survey on Graph-Based Collaborative Filtering Techniques in Recommender Systems
Sanket Kamta and Vijay Verma | 1-7

Performance Analysis of AODV and DSR Routing Protocols in Mobile Ad-Hoc Network
Samara Mubeen, Bibi Zahera, Ishwarya R., Ayesha G. S. and Aishwarya M. | 8-13

Live Helmet Detection System for Detecting Bikers without Helmet
Harsh Nagoriya | 14-17

Cryptosystem for Secured E-Learning and Educational Data Mining in Higher Education
Akram Salim Khanfar, Firdous Ahmad Lone and MD Moizuddin | 18-21