Showing 8,621 - 8,640 results of 10,490 for search '"business"', query time: 0.08s Refine Results
  1. 8621
  2. 8622

    Auditors in the digital age: a systematic literature review by Diogo Leocádio, Luís Malheiro, João Carlos Gonçalves dos Reis

    Published 2025-01-01
    “…This focus acknowledges the changing dynamics of business and the growing role of technology in auditing processes.…”
    Get full text
    Article
  3. 8623

    PENGARUH PEMBANGUNAN JALAN TOL SUTAMI TERHADAP NILAI LAHAN DISEKITARNYA by Muhammad Harum, Sutriani Sutriani

    Published 2017-06-01
    “…Abstract­_ Land area has significance in a place of business related to warehousing activities. The larger the land, the greater the utilization. …”
    Get full text
    Article
  4. 8624
  5. 8625
  6. 8626
  7. 8627
  8. 8628
  9. 8629

    Creating incentives for petrochemistry development in sanctioned economy by V. Ya. Afanasiev, O. V. Baykova, O. I. Bolshakova, A. A. Romantsov

    Published 2024-08-01
    “…Using the example of methanol production and its use as a raw material for high-grade products creation, importance of long-term contractual relations between the state and business, such as agreements on protection and promotion of capital investments and special investment contracts, has been shown. …”
    Get full text
    Article
  10. 8630
  11. 8631

    Research on multiple enhanced k combination reverse Skyline query method by Song Li, Xinyuan Zhang, Liping Zhang

    Published 2025-01-01
    “…It has been widely applied in business decision-making, recommendation systems, location-based services, knowledge discovery, and data mining. …”
    Get full text
    Article
  12. 8632
  13. 8633

    Online medical privacy protection strategy under information value-added mechanism by Shengzhi MING, Jianming ZHU, Zhiyuan SUI, Xian ZHANG

    Published 2022-12-01
    “…China’s economic level and people’s living standards have developed rapidly in recent years, and the medical level and medical technology have made breakthroughs continuously.With the promotion and deepening of“Internet Plus” to business model innovation in various fields, the development of “Internet Plus” medical has been rapidly developed.Due to the continuous development of data processing technologies such as machine learning and data mining, the risk of users’ personal medical data disclosure in the process of online medical treatment has also attracted the attention of researchers.Considering the deductibility of information, the discount mechanism was adopted to describe the change of user’s private information value in different stages of the game.Combined with the current research status in the field of online medical privacy protection motivation, how to mobilize the enthusiasm of both players from the level of privacy protection motivation was explored with game analysis.In view of the game characteristics of users’ strong willingness to continually use the online medical platform and intermittently provide privacy, the repeated game method was adopted to better describe the game process between users and the online medical platform.The tendency change law of the players on both sides of the game was obtained.Moreover, the Nash equilibrium of the game model was analyzed under different model parameters and the change trend of the game strategy of both sides with the progress of the game stage.When the parameters were met 2(c<sub>p</sub>-c<sub>n</sub>)≥l<sub>p</sub>(p<sub>n</sub>-p<sub>p</sub>), the user started to choose from “agree to share private data” to “refuse to share private data”.The above conclusion was verified by simulation experiments.Based on the above conclusions, from the perspective of online medical platform and users, policy suggestions on how to realize privacy protection from the level of privacy protection motivation in the process of online medical treatment were given.…”
    Get full text
    Article
  14. 8634
  15. 8635

    Strategy of container migration and honeypot deployment based on signal game in cloud environment by Lingshu LI, Jiangxing WU, Wei ZENG, Wenyan LIU

    Published 2022-06-01
    “…Multi-tenant coexistence and resource sharing in the SaaS cloud pose serious security risks.On the one hand, soft isolation of logical namespaces is easy to be bypassed or broken.On the other hand, it is easy to be subjected to co-resident attacks due to sharing of the host operating system and underlying physical resources.Therefore it poses a serious threat to data availability, integrity and confidentiality in the container cloud.Given the problem that SaaS cloud services are vulnerable to container escape and side-channel equivalent resident attack, network deception technology increases the uncertainty of the cloud environment and reduces the effectiveness of attack by hiding the business function and characteristic attributes of the executor.Aiming at the security threat caused by the co-resident attack, combining dynamic migration and virtual honeypot security technology, the economical and reasonable network deception method was studied.Specifically, a container migration and honeypot deployment strategy based on the signal game was proposed.According to the security threat analysis, container migration and honeypot were used as defense methods.The former improved the undetectability of the system based on the idea of moving to target defense, while the latter confused attackers by placing decoy containers or providing false services.Furthermore, since network reconnaissance was the pre-step of the network attack chain, the attack and defense process was modeled as a two-person signal game with incomplete information.The sender chose to release a signal according to his type, and the receiver could only obtain the signal released by the sender but could not determine the type.Then, a game tree was constructed for the complete but imperfect information dynamic game, and the costs and benefits of different strategy combinations were set.The optimal deception strategy was determined by equilibrium analysis of attack-defense model.Experimental results show that the proposed strategy can effectively improve system security.Besides, it can also reduce container migration frequency and defense cost.…”
    Get full text
    Article
  16. 8636

    Simplified Lawsuits in Dispute Resolution Within Sharia Economic Law in Indonesia by Dadin Solihin, Setiadi Setiadi, Bubun Bunyamin, Deni Kamaludin Yusup, Ahmad Hasan Ridwan

    Published 2024-05-01
    “…This research is based on the numerous disputes in Sharia economic law within Sharia Business Financial Institutions, legal aid in the field of Sharia economic law, and civil matters that have not been well resolved. …”
    Get full text
    Article
  17. 8637
  18. 8638
  19. 8639
  20. 8640