Suggested Topics within your search.
Suggested Topics within your search.
- Management 16
- Business 14
- Entrepreneurship 10
- Business communication 8
- Business enterprises 8
- Business writing 6
- Commercial law 6
- Computer programs 6
- New business enterprises 6
- Industrial management 5
- Information technology 5
- Marketing 5
- Business ethics 4
- Business mathematics 4
- Commercial statistics 4
- Communication in management 4
- English language 4
- Hospitality industry 4
- Law and legislation 4
- Moral and ethical aspects 4
- Purchasing 4
- Statistics 4
- Business English 3
- Business Management 3
- Business logistics 3
- Leadership 3
- Public relations 3
- Statistical methods 3
- Tourism 3
- Accounting 2
-
8621
-
8622
Auditors in the digital age: a systematic literature review
Published 2025-01-01“…This focus acknowledges the changing dynamics of business and the growing role of technology in auditing processes.…”
Get full text
Article -
8623
PENGARUH PEMBANGUNAN JALAN TOL SUTAMI TERHADAP NILAI LAHAN DISEKITARNYA
Published 2017-06-01“…Abstract_ Land area has significance in a place of business related to warehousing activities. The larger the land, the greater the utilization. …”
Get full text
Article -
8624
The Social-Ecological System Framework of Urban Wetlands: The Role of Collective Management at Local Level
Published 2024-12-01Get full text
Article -
8625
Navigating AI and chatbot applications in education and research: a holistic approach
Published 2024-12-01Get full text
Article -
8626
Synergy and Communication of IoT Industry Development Strategies in the Perspective of Low Carbon Economy
Published 2021-01-01Get full text
Article -
8627
-
8628
Assessing the ability of Ukrainian higher education to offer key skills of tomorrow
Published 2025-01-01Get full text
Article -
8629
Creating incentives for petrochemistry development in sanctioned economy
Published 2024-08-01“…Using the example of methanol production and its use as a raw material for high-grade products creation, importance of long-term contractual relations between the state and business, such as agreements on protection and promotion of capital investments and special investment contracts, has been shown. …”
Get full text
Article -
8630
-
8631
Research on multiple enhanced k combination reverse Skyline query method
Published 2025-01-01“…It has been widely applied in business decision-making, recommendation systems, location-based services, knowledge discovery, and data mining. …”
Get full text
Article -
8632
Investigating academic resilience in learning English: an ecological context of undergraduate students
Published 2025-01-01Get full text
Article -
8633
Online medical privacy protection strategy under information value-added mechanism
Published 2022-12-01“…China’s economic level and people’s living standards have developed rapidly in recent years, and the medical level and medical technology have made breakthroughs continuously.With the promotion and deepening of“Internet Plus” to business model innovation in various fields, the development of “Internet Plus” medical has been rapidly developed.Due to the continuous development of data processing technologies such as machine learning and data mining, the risk of users’ personal medical data disclosure in the process of online medical treatment has also attracted the attention of researchers.Considering the deductibility of information, the discount mechanism was adopted to describe the change of user’s private information value in different stages of the game.Combined with the current research status in the field of online medical privacy protection motivation, how to mobilize the enthusiasm of both players from the level of privacy protection motivation was explored with game analysis.In view of the game characteristics of users’ strong willingness to continually use the online medical platform and intermittently provide privacy, the repeated game method was adopted to better describe the game process between users and the online medical platform.The tendency change law of the players on both sides of the game was obtained.Moreover, the Nash equilibrium of the game model was analyzed under different model parameters and the change trend of the game strategy of both sides with the progress of the game stage.When the parameters were met 2(c<sub>p</sub>-c<sub>n</sub>)≥l<sub>p</sub>(p<sub>n</sub>-p<sub>p</sub>), the user started to choose from “agree to share private data” to “refuse to share private data”.The above conclusion was verified by simulation experiments.Based on the above conclusions, from the perspective of online medical platform and users, policy suggestions on how to realize privacy protection from the level of privacy protection motivation in the process of online medical treatment were given.…”
Get full text
Article -
8634
Do gender disparities in socioeconomic status affect Teff productivity? A comparative analysis in Ethiopia
Published 2024-02-01Get full text
Article -
8635
Strategy of container migration and honeypot deployment based on signal game in cloud environment
Published 2022-06-01“…Multi-tenant coexistence and resource sharing in the SaaS cloud pose serious security risks.On the one hand, soft isolation of logical namespaces is easy to be bypassed or broken.On the other hand, it is easy to be subjected to co-resident attacks due to sharing of the host operating system and underlying physical resources.Therefore it poses a serious threat to data availability, integrity and confidentiality in the container cloud.Given the problem that SaaS cloud services are vulnerable to container escape and side-channel equivalent resident attack, network deception technology increases the uncertainty of the cloud environment and reduces the effectiveness of attack by hiding the business function and characteristic attributes of the executor.Aiming at the security threat caused by the co-resident attack, combining dynamic migration and virtual honeypot security technology, the economical and reasonable network deception method was studied.Specifically, a container migration and honeypot deployment strategy based on the signal game was proposed.According to the security threat analysis, container migration and honeypot were used as defense methods.The former improved the undetectability of the system based on the idea of moving to target defense, while the latter confused attackers by placing decoy containers or providing false services.Furthermore, since network reconnaissance was the pre-step of the network attack chain, the attack and defense process was modeled as a two-person signal game with incomplete information.The sender chose to release a signal according to his type, and the receiver could only obtain the signal released by the sender but could not determine the type.Then, a game tree was constructed for the complete but imperfect information dynamic game, and the costs and benefits of different strategy combinations were set.The optimal deception strategy was determined by equilibrium analysis of attack-defense model.Experimental results show that the proposed strategy can effectively improve system security.Besides, it can also reduce container migration frequency and defense cost.…”
Get full text
Article -
8636
Simplified Lawsuits in Dispute Resolution Within Sharia Economic Law in Indonesia
Published 2024-05-01“…This research is based on the numerous disputes in Sharia economic law within Sharia Business Financial Institutions, legal aid in the field of Sharia economic law, and civil matters that have not been well resolved. …”
Get full text
Article -
8637
-
8638
Predicting Short-Term Variations in End-to-End Cloud Data Transfer Throughput Using Neural Networks
Published 2023-01-01Get full text
Article -
8639
Renewable Energy for Sustainable Development: Opportunities and Current Landscape
Published 2025-01-01Get full text
Article -
8640