Suggested Topics within your search.
Suggested Topics within your search.
- Management 16
- Business 14
- Entrepreneurship 10
- Business communication 8
- Business enterprises 8
- Business writing 6
- Commercial law 6
- Computer programs 6
- New business enterprises 6
- Industrial management 5
- Information technology 5
- Marketing 5
- Business ethics 4
- Business mathematics 4
- Commercial statistics 4
- Communication in management 4
- English language 4
- Hospitality industry 4
- Law and legislation 4
- Moral and ethical aspects 4
- Purchasing 4
- Statistics 4
- Business English 3
- Business Management 3
- Business logistics 3
- Leadership 3
- Public relations 3
- Statistical methods 3
- Tourism 3
- Accounting 2
-
441
STRATEGIES OF MANIPULATIVE RHETORIC IN THE ENGLISH-LANGUAGE BUSINESS MEDIA DISCOURSE
Published 2024-12-01Subjects: Get full text
Article -
442
PRELIMINARY DISCUSSIONS ON ISSUES RELATED TO A EUROPEAN BUSINESS CODE
Published 2024-05-01Subjects: “…european business code…”
Get full text
Article -
443
Business process mining based insider threat detection system
Published 2016-10-01“…Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.…”
Get full text
Article -
444
Manufacturer’s Business Strategy: Interaction of Sharing Economy and Product Rollover
Published 2020-01-01“…This paper develops an analytical framework to study a manufacturer’s optimal business strategy involving the interaction of product sharing and product rollover in the sharing economy. …”
Get full text
Article -
445
Resilient business strategies in the German hospitality industry and its viability
Published 2024-07-01Subjects: Get full text
Article -
446
Asymmetry of prosperity and business activity levels according to the regions of Georgia
Published 2025-01-01“…The per capita volume of direct foreign investment in Georgia's regions is ten times lower than in the capital, while business sector output is 3.4 times lower.…”
Get full text
Article -
447
DISCLOSURE OF BUSINESS VALUE INFORMATION IN THE FINANCIAL STATEMENTS (REPORTING OF THE COMPANY)
Published 2017-04-01Subjects: “…business value…”
Get full text
Article -
448
MODELING THE DISTRIBUTION AND USE OF PROFITS IN VARIOUS BUSINESS DEVELOPMENT STRATEGIES
Published 2019-10-01Get full text
Article -
449
Designing the Business Model of Qarz-Al-Hasna Digital Bank
Published 2024-06-01Subjects: “…business model…”
Get full text
Article -
450
Economic reliability of the organisation in the context of groups of interests of the business environment
Published 2021-10-01Subjects: Get full text
Article -
451
CHANGES IN SUBSTITUTION OF BANK LOANS AND EU SUBSIDIES IN POLISH BUSINESSES
Published 2021-07-01“… The aim of the article was to determine the degree of bank loan replacement by Polish businesses after profiting from EU help. The identification of similarities and differences was made amonggroups of enterprises that benefit or not from the state aid in the EU’s successive financial perspectives, over the years 2007-2017. …”
Get full text
Article -
452
The Energy Crisis and Gas Supply Stop: Consequences for Businesses in Germany
Published 2022-06-01“…Similarly, many businesses report price increases. Output and price adjustments are more likely to occur among businesses reporting rising energy costs or supply chain bottlenecks. …”
Get full text
Article -
453
Features of the Processes of Digitalization of Small and Medium-Sized Businesses in Ukraine
Published 2024-06-01“…The aim of the article is to identify the key features of the processes of digitalization of small and medium-sized businesses in Ukraine. Analyzing and summarizing the scientific works of scientists that were placed in the Scopus database, with the help of the VOSviewer program in the thematic area of «digitalization» and «SMEs», the views on this research issue were systematized. …”
Get full text
Article -
454
An industrial internet business management platform that supports the cloud-native
Published 2022-05-01Subjects: Get full text
Article -
455
From Data to Decisions: The Power of Machine Learning in Business Recommendations
Published 2025-01-01Subjects: “…Business recommendation…”
Get full text
Article -
456
SOCIAL ASPECT OF SUPPORT OF SMALL BUSINESS AND PROBLEMS OF MIGRATION IN GERMANY
Published 2016-02-01“…They will take potential workplaces or will open the business, but a question in, whether it is possible to occupy the arrived migrants in small business in the territory of Germany. …”
Get full text
Article -
457
RETRACTED: Small business development in the field of agriculture: Government support
Published 2024-01-01Get full text
Article -
458
Crowdfunding as a modern direction of business angel investing in Ukraine
Published 2021-12-01Subjects: Get full text
Article -
459
Stock Plant Production and Management Basics for Small Greenhouse Businesses
Published 2005-12-01Get full text
Article -
460
An automatic verification method for software quality with real business data
Published 2024-03-01“…Performance tests help to verify whether a business cluster can meet its access scale requirements, but current tools have problems such as evaluating proper parameters and requiring manual inputs, low performance, and difficulty in automation. …”
Get full text
Article