Search Results - (( business preventions. ) OR ((( business representations. ) OR ( business prevention. ))))

Search alternatives:

Refine Results
  1. 1

    Business ethics : a managerial approach / by Wicks, Andrew C.

    Published Prentice Hall, 2010.
    Table of Contents: “…The language of ethics -- A look at the sources of ethical problems in business and how to prevent them -- Ethics, stakeholders, corporate strategy, and value creation -- Business ethics in the global marketplace -- Appendix: List of industry benchmarks and international agreements -- Leadership -- Marketing and operations -- Finance and accounting -- Management -- Environmental sustainability and its challenges -- Managing on the ethical frontier.…”
    Book
  2. 2

    The dark side of leadership : identifying and overcoming unethical practice in organizations /

    Published Emerald Group Publishing Limited, 2016.
    Full-text access
    e-Book
  3. 3

    Imprecision and Uncertainty in Information Representation and Processing New Tools Based on Intuitionistic Fuzzy Sets and Generalized Nets /

    Published Springer International Publishing : Imprint: Springer, 2016.
    Full-text access
    e-Book
  4. 4

    Pharmaceutical Supply Chains - Medicines Shortages

    Published Springer International Publishing : Imprint: Springer, 2019.
    Full-text access
    e-Book
  5. 5

    Data-Centric Business and Applications Evolvements in Business Information Processing and Management-Volume 1 /

    Published Springer International Publishing : Imprint: Springer, 2019.
    Full-text access
    e-Book
  6. 6

    Business Information Systems and Technology 4.0 New Trends in the Age of Digital Change /

    Published Springer International Publishing : Imprint: Springer, 2018.
    Full-text access
    e-Book
  7. 7

    Funeral Rites in Contemporary Korea The Business of Death / by Han, Gil-Soo

    Published Springer Nature Singapore : Imprint: Springer, 2019.
    Full-text access
    e-Book
  8. 8

    Semantic Web Implications for Technologies and Business Practices /

    Published Springer International Publishing : Imprint: Springer, 2016.
    Table of Contents: “…-- Unnatural Language Processing: Characterizing the Challenges in Translating Natural Language Semantics into Ontology Semantics -- The Lexical Bridge: A Methodology for Bridging the Semantic Gaps between a Natural Language and an Ontology -- Reliable Semantic Systems For Decision Making: Defining A Business Rules Ontology For A Survey Decision System -- University Ontology: A Case study at Ahlia University -- Semantic Enrichment of Event Stream for Semantic Situation Awareness -- Semantic Web and Business:Reaching a tipping point?.…”
    Full-text access
    e-Book
  9. 9

    Proceedings of the 23rd International Conference on Industrial Engineering and Engineering Management 2016 Theory and Application of Industrial Engineering /

    Published Atlantis Press : Imprint: Atlantis Press, 2017.
    Table of Contents: “…1.Selection Of Port Enterprise Logistics Service Providers Based On The Combination Weighting-Grey Synthetic Decision-Making Method -- 2.Application of evaluation of aircraft material demand forecasting method and mining of association rules -- 3.Research on the Selection of Business-to-Customer e-commerce Logistics Model Based on Analytic Hierarchy Process Method -- 4.Content Framework and Evaluating Method of the Energy Efficiency Assessment Standard for Machining period -- 5.Combining Problem and Lecture Based Learning for Production System Modeling and Simulation Course in Industrial Engineering Education -- 6.Schedule Risk Management of IT Outsourcing Project Using Negotiation Mechanism -- 7.The Effect of Reciprocity on Revenue Sharing Contract Coordination and its Dynamics -- 8.Intelligent Rescheduling System for Steelmaking and Continuous Casting Production -- 9.Application of RCA to the Data Analysis in Medication Errors of the TPR System -- 10.An Investigation of Adverse Events in Medication Processes by HFACS and Conditional Probability -- 11.Adaptive Grasping and Adjusting Method of Virtual Hand Gestures with Semantics Information for Virtual Assembly -- 12.Dynamic Medical Risk Assessment based on Bow-tie Approach and Bayesian Network -- 13.Rational Thinking of the Marketing Strategy Based on Customer Equity -- 14.An Empirical Study on Manufacturing Strategy Formulation in Turbulent Environment: Dealing with Changes and Uncertainties -- 15.The Impacts of Trust Relationship on Knowledge Absorptive Capacity: An Empirical Study from Service Outsourcing Enterprises -- 16.Determination of price and warranty length under claim rate of customer -- 17.Research on Module Construction based on Product Lifecycle Management -- 18.Logistics Distribution Path Planning Based On Genetic Algorithm -- 19.Research on the Mechanism of Risk Cascading Propagation across Interdependent R&D Networks -- 20.Research on Capabilities-based Optimization Matching of Vessel Maintenance Support Equipment -- 21.Analysis on Warship Technology Supportability Equipment System-of-Systems Based on System Dynamics -- 22.Simulation Model of Rail Transshipment System in Hydropower Development Project -- 23.The Application Of Six Sigma Theory In The Secondary Hospital Management -- 24.Research on Parameter Optimization of ant colony algorithm based on genetic algorithm -- 25.Multi-objective Integrated Optimization Problem of Preventive Maintenance Planning and Flexible Job-Shop Scheduling -- 26.Cost-sensitive Association Rule Modeling for Predicting Sequential Event -- 27.Study on the Improved PSO Algorithm Used in Coal Mine Safety Resource Allocation -- 28.Research on the Improving Design of Laminating Machine Based on Lean Six Sigma -- 29.A Method of Quality Evaluation for Complexity Equipment Manufacturing and Service Based on Process Area and its Reliability & Validity Analysis -- 30.Analyzing "Made in China 2025" Under theBackground of "Industry 4.0" -- 31.Study on the Implementation Strategy of Liaoning Manufacturing Collaborative Innovation System Based on "Made in China 2025" -- 32.Layout Analysis and Design of the Spindle Box Processing Workshop -- 33.Empirical Research on Production Leveling of Domestic Car -- 34.Exploration and Practice of Car Industry Lean Culture Construction -- 35.The study about intelligent manufacturing resource allocation efficiency based on mutual information criterion -- 36.Social Insurance Expenditure and Future Trend in China -- 37.A Two-Level Principal-Agent Model for Schedule Risk Control of IT Outsourcing Project Based on Genetic Algorithm -- 38.An Empirical Analysis of Influence of Capital Allocation Efficiency on Performance in Listing Corporation -- 39.The Game about Competition and Cooperation in Port Group -- 40.The factors Influencing Dwelling-Type Choices of residents in the Old Industrial District: an Investigation based on the Logistic Model -- 41.A management method ofaccounts receivable based on credit rating for rail equipment manufacturing industry -- 42.The Research of Doctors Recommendation Algorithm -- 43.Resource Constrained Project Scheduling Optimization With Robust Objective Under Stochastic Duration Of Activities -- 44.Dynamic scheduling of public bicycles based on artificial bee colony algorithm -- 45.Web service classification approach with an integrated similarity measure -- 46.How to Optimize Production and Carbon Resources under Cap and Trade -- 47.The Development About Social Network Analysis And The Review About Its -- 48.Gallbladder Diagnosis and Importance Analysis based on Bayesian Network -- 49.The Effect of Dynamic Capabilities on International Performance of Chinese Universities -- 50.Researching The Role Of Online Movie Reviews Based On User Classification -- 51.Analysis and Simulation Application for Enterprise Populations M&A Based on Predator-prey Model -- 52.Research on Mechanism of Early Warning of Health Management Based onCloud Computing and Big Data -- 53.Research on Early Safety Warning Evaluation Based on Multi-hierarchy Fuzzy AHP in Civil Aviation Airport -- 54.Modeling and Analysis of the Customer Checkout Process with Flexible Servers for a Retail Store -- 55.An Integrated Strategy for Information Security:Outsourcing and In-house.…”
    Full-text access
    e-Book
  10. 10

    Advances in Business ICT: New Ideas from Ongoing Research

    Published Springer International Publishing : Imprint: Springer, 2017.
    Table of Contents: “…Advances in Business ICT: New Ideas from Ongoing Research -- Verification of Temporal Knowledge Bases as an Important Aspect of Knowledge Management Processes in Organization -- The role of simulation performance in software-in-the-loop simulations -- Cognitum Ontorion: Knowledge Representation and Reasoning System -- Overview of Selected Business Process Semantization Techniques -- Selected Approaches Towards Taxonomy of Business Process Anomalies -- Hybrid framework for investment project portfolio selection -- Towards Predicting Stock Price Moves with Aid of Sentiment Analysis of Twitter Social Network Data and Big Data Processing Environment -- On a Property of Phase Correlation and Possibilities to Reduce the Walsh Function System.…”
    Full-text access
    e-Book
  11. 11

    Intellectual Property and Financing Strategies for Technology Startups by Halt, Jr., Gerald B., Donch, Jr., John C., Stiles, Amber R., Fesnak, Robert

    Published Springer International Publishing : Imprint: Springer, 2017.
    Table of Contents: “…Introduction -- Part I: Startup Funding Sources, Stages of the Life Cycle of a Business, and The Corresponding Intellectual Property Strategies for Each Stage -- Sources of Company Funding -- Early Stage Strategy -- Growth and Expansion Stage -- Mature, Exit and Rebirth Stage -- Achieving Success Stage -- Part II: Overview of Intellectual Property Rights for Startups -- Trademarks and Trade Dress -- Domain Names -- Patents -- Trade Secrets -- Copyrights -- Intellectual Property Issues in Labeling and Marketing -- Enforcement and Infringement of Intellectual Property Rights -- Part III: Implementation of IP Strategies for Startups -- Successful Implementation of a Startup's IP Strategy -- Developing and Managing an Intellectual Property Portfolio -- Valuing Startup Companies -- Licensing of Intellectual Property Rights for Startups -- Startup Tips for Avoiding and Preventing Intellectual Property Problems -- Appendices.…”
    Full-text access
    e-Book
  12. 12

    Identifying Patterns in Financial Markets New Approach Combining Rules Between PIPs and SAX / by Leitão, João, Neves, Rui Ferreira, Horta, Nuno C.G

    Published Springer International Publishing : Imprint: Springer, 2018.
    Full-text access
    e-Book
  13. 13

    The management and leadership of educational marketing research, practice and applications /

    Published Emerald, 2012.
    Full-text access
    e-Book
  14. 14

    Engineering Digital Transformation Proceedings of the 11th International Conference on Industrial Engineering and Industrial Management /

    Published Springer International Publishing : Imprint: Springer, 2019.
    Table of Contents: “…-- Chapter 5. Business Model Innovation from a Technology Perspective: A Review -- Chapter 6. …”
    Full-text access
    e-Book
  15. 15

    Applied Computing and Information Technology

    Published Springer International Publishing : Imprint: Springer, 2017.
    Table of Contents: “…Business Sustainability Conceptualization -- A Replicated Study on Relationship between Code Quality and Method Comments -- A Predictive Model for Standardized Test Performance in Michigan Schools -- A Development Technique for Mobile Applications Program -- Identification Method Applications Development using Adapting Component Model -- Development of Guiding Walking Support Device for Visually Impaired People with the GPS -- User Evaluation Prediction Models Based on Conjoint Analysis and Neural Networks for Interactive Evolutionary Computation -- Emotional Video Scene Retrieval Using Multilayer Convolutional Network -- Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments -- Practical Uses of Memory Storage Extension -- How to Build a High Quality Mobile Applications Based on Improved Process -- A New Hybrid Discrete Firefly Algorithm for Solving the Traveling Salesman Problem.…”
    Full-text access
    e-Book
  16. 16
  17. 17

    Gendered Perspectives on Conflict and Violence.

    Published Emerald, 2014.
    Table of Contents: “…/ Andrea Dauber -- "That candy bar ain't free": Managing performances of masculinity in prison / Eleanor Novek -- Before Prevention: The Trajectory and Tensions of Feminist Anti-Violence / Max Greenberg,Michael Messner -- "Our" honor and "Their" honor: The case of honor killings in Turkey / Julie Dilmaç -- SYMBOLIC VIOLENCE: RESHAPING POST- PATRIARCHAL DISCOURSES ON GENDER / Franca Bimbi.…”
    Full-text access
    e-Book
  18. 18

    Intelligent Decision Technologies 2019 Proceedings of the 11th KES International Conference on Intelligent Decision Technologies (KES-IDT 2019), Volume 2 /

    Published Springer Nature Singapore : Imprint: Springer, 2019.
    Table of Contents: “…Quality Improvement Through the Preventive Detection of Potentially Defective Products in the Automotive Industry by Means of Advanced Artificial Intelligence Techniques -- An Efficient Non-Blind Steering Vector Estimation Technique For Robust Adaptive Beamforming With Multi-Stage Error Feedback -- The P2P-Grid-Agent Distributed Platform: A Distributed and Dynamic Platform for Developing and Executing Large Scale Application based on Deep Learning Techniques -- Recognition of Daily Human Activities Using Accelerometer and sEMG Signals -- Classification of Alzheimer's Disease from Structural Magnetic Resonance Imaging using Particle-Bernstein Polynomials Algorithm -- Selecting Informative Samples for Animal Recognition in the Wildlife -- Genetic Algorithm for Selecting Relevant Regions in Digital Watermarking Scheme for 2D/3D Medical Images -- A Transport Coding Gain Estimation in the Conditions of Time Limitation for Maximum Acceptable Message Delay -- Modeling Customers Speed of Movement from POS and RFID-data -- Discovering and Analyzing Binary Codes Based on Monocyclic Quasi-Orthogonal Matrices -- The Study of Generators of Orthogonal Pseudo-Random Sequences -- Portraits of Orthogonal Matrices as a Base for Discrete Textile Ornament Patterns -- Training Sample Generation Software -- Business AI Alignment Modeling Based on Enterprise Architecture -- Eye Tracking as a Method of Neuromarketing for Attention Research - an Empirical Analysis Using the Online Appointment Booking Platform from Mercedes-Benz -- A Concept of an Interactive Web-Based Machine Learning Tool for Individual Machine and Production Monitoring -- Benefits of Agile Project Management in an Environment of Increasing Complexity - A Transaction Cost Analysis -- Potential Benefits of Digital Business Models and Its Processes in the Financial and Insurance Industry -- Risk-Sensitive Decision Making under Risk Constraints with Coherent Risk Measures -- Mutual Evaluation and Solution Method -- Visualization of Criteria Priorities Using a Ternary Diagram -- Changes in Organizations Due to Management Mechanization (Case Studies of Life Insurance Companies in Japan) -- Naturality for Ranking from Pairwise Comparisons -- Upper Level Processes and Projects Model-Building -- SPCM with Harker Method for MDAHP including Hierarchical Criteria -- Building a Telemedicine System for Monitoring the Health Status and Supporting the Social Adaptation of Children with Autism Spectrum Disorders -- Implementation of Digital Technologies in Pharmaceutical Products Lifecycle -- Home Hospital e-Health Centers for barrier-free and cross-border Telemedicine Ralf Seepold, Maksym Gaiduk -- Data Driven Human Movement Assessment -- Attitudes to Telemedicine, and Willingness to Use in Young People -- Posture Tracking Using a Machine Learning Algorithm for a Home AAL Environment.…”
    Full-text access
    e-Book
  19. 19

    Information Technology - New Generations 15th International Conference on Information Technology /

    Published Springer International Publishing : Imprint: Springer, 2018.
    Table of Contents: “…Part I Cybersecurity -- Safeguarding Personal Health Information: Case Study -- Cybersecurity as People Powered Perpetual Innovation -- Performance Study of the Impact of Security on 802.11ac Networks -- Training Neural Tensor Networks with the Never Ending Language Learner -- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework -- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan -- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network -- A Virtual Animated Commentator Architecture for Cybersecurity Competitions -- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features -- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach) -- A Self Proxy Signature Scheme over NTRU Lattices -- Towards an Ontology of Security Assessment: a core model proposal -- Integration of Mobile Forensic Tool Capabilities -- Deep Packet Inspection: A Key Issue for Network Security -- What Petya/NotPetya Ransomware is and What its Remidiations are -- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform -- New Techniques for Public Key Encryption with Sender Recovery -- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa -- Protecting Personal Data with Blockchain Technology -- The Role of CAE-CDE in Cybersecurity Education for Workforce Development -- Software Optimizations for DES -- Part II Networking and Wireless Communications -- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment -- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks -- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges -- A Dual canister medicine IoT Dispenser -- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks -- Denial of service attacks inwireless sensor networks with proposed countermeasures -- Part III Education and Technology -- Internet-Based Education: A New Milestone for Formal Language and Automata Courses -- Teaching Communication Management in Software Projects through Serious Educational Games -- Gamification applied in the teaching of agile Scrum methodology -- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework -- Part IV Agile Software Testing and Development -- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects -- Alignment of Requirements and Testing in Agile: an Industrial Experience -- Health Care Information Systems: A Crisis Approach -- Using Correct-by-Construction Software Agile Development -- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services -- Improving Agile Software Development with Domain Ontologies -- A Stratified Sampling Algorithmfor Artificial Neural Networks -- Part V Data Mining/Machine Learning -- Mining ENADE Data from the Ulbra Network Institution -- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA) -- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise -- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets -- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series -- DeRis: Information system supporting the prediction of default risk in companies -- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm -- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics -- A model for hour-wise prediction of mobile device energy availability -- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model -- A Traffic Light Recognition Device -- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment -- Reproducible Research in Document Analysis and Recognition -- Music Genre Classification using Data Mining and Machine Learning -- Improving word representations using Paraphrase dataset -- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions -- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning -- Business Intelligence Dashboard Application for Insurance Cross Selling -- Speech Features Analysis for Tone Language Speaker Discrimination Systems -- Selection of Transformations of Continuous Predictors in Logistic Regression -- Part VI Software Engineering -- A Generic Approach to Efficiently Parallelize Legacy Sequential Software -- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications -- A Timed Petri NetModel to Specify Scenarios of Video Games -- Survey of Biometric Techniques for Automotive Applications -- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations -- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application -- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules -- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games -- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies -- Increasing the prediction quality of software defective modules with automatic feature engineering -- Part VII High Performance Computing Architectures -- NSF Noyce Recruitment and Mentorship -- Mining Associations between Two Categories using Unstructured Text Data in Cloud -- A Note on Computational Science Curriculum -- Development of a Local Cloud-Based Bioinformatics Architecture -- Part VIII Computer Vision, Image Processing/Analysis -- AComputer Vision Based Algorithm for Obstacle Avoidance -- The ST-Vis tool for SpatioTemporal Visualization -- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima -- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network -- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation -- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries -- Part IX Health, Bioinformatics, Pattern Detection and Optimization -- Benefits of Establishing Makerspaces in Distributed Development Environment -- Semantic Description of Healthcare Devices to Enable Data Integration -- Applying transfer learning to QSAR regression models -- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine -- A Complete Diabetes Management and Care System -- On the use of van der PauwTechnique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring -- Part X Potpourri -- Smart Lighting Controlling System: Case Study of Yarmouk University Museum -- Incremental Topology Generated for ANN A Case Study on a Helicopter's Flight Simulation -- Degree Aware Triangulation of Annular Regions -- Heuristic Approaches for the Open-Shop Scheduling Problem -- Continuous State Power-down Systems for Renewable Energy Management -- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems -- Part XI Short Papers -- Customer services management and satisfaction of Internet-related banking of First National Bank -- BIG IoT - Interconnecting IoT Platforms from different domains - First success story -- Cross-Cultural Perspective of E-Commerce -- Website Usability Requirements: Through the Lens of Individual's Perception -- Methods of Ensuring the Reliability and Fault Tolerance of Information Systems -- Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise -- Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly -- A Classifier Evaluation for Payments' Default Predictions in a Brazilian Retail Company -- Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review -- Operating System Security Management and…”
    Full-text access
    e-Book
  20. 20

    Advances in Internet, Data & Web Technologies The 6th International Conference on Emerging Internet, Data & Web Technologies (EIDWT-2018) /

    Published Springer International Publishing : Imprint: Springer, 2018.
    Full-text access
    e-Book