Academic literature on the topic 'Business-books=2017-06-11'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Business-books=2017-06-11.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Business-books=2017-06-11"

1

Добжанська-Найт, Наталія, and Христина Войтко. "Linguistic Manipulative Techniques in Advertising Slogans of Fast Food Restaurants." East European Journal of Psycholinguistics 4, no. 2 (2017): 14–23. http://dx.doi.org/10.29038/eejpl.2017.4.2.dob.

Full text
Abstract:
The article deals with the notion of manipulation in advertising slogans of fast food restaurants. It focuses on techniques and means of language influence on the recipient. The article shows results of the study of 239 advertising slogans of fast food restaurants in English-speaking countries (a total number of 104 companies). Different language patterns which are used in advertising slogans and aimed at persuasion of customers on the subconscious level, are defined and analyzed; among them the most numerous are language patterns which create statements with distortions, deletions, and generalizations manifesting themselves in a variety of forms. The research also describes manipulative language patterns specifically related to advertising, such as unique selling proposition or life values. The article also shows quantitative proportions of the use of each pattern, as well as patterns used by the most successful and less successful restaurants. The most frequent of the manipulative language patterns are lost performatives, mind reading, and comparisons. The techniques of life values, mind reading, and antithesis are more common in advertising slogans of top restaurants compared to less popular ones. Individual slogans frequently manifest the use of more than one linguistic pattern of manipulation.
 References
 
 Alder, H. (2002). Handbook of NLP: A Manual for Professional Communicators. New York: Routledge
 Bandler, R, Grinder, J. (1975). The Structure of Magic (1st edition). USA: Science & Behavior Books.
 Burton, K., Ready, R. (2010). Neuro-linguistic Programming for Dummies. West Sussex: Wiley
 Ciotti, G. 5 Ways to Develop a Unique Selling Proposition Convince&Convert. Dec. 2013. Retrieved from http://www.convinceandconvert.com/digital-marketing/5-ways-to-develop-a-unique-selling-proposition/
 Colbert, B. (2012). From Ordinary to Extraordinary – How to Live An Exceptional Life. Ireland: Gill
 Danciu, V. (2014). Manipulative marketing: persuasion and manipulation of the consumer through advertising. Theoretical and Applied Economics, 9(2), 19-34.
 Гесюк Ю. Застосування нейролінгвістичного програмування в рекламі. Медіапростір. 2014, № 5. С. 122-126.
 Горин С. НЛП: Техники россыпью. //Метафора экспромтом. Под ред. Н. Либман. М.: КСП+, 2004. С. 269-268.
 Каліщук Д. Психолінгвістичні прийоми мовленнєвого маніпулювання у політичному дискурсі «Гра у простонародність» // Вісник Харківського національного університету імені В.Н. Каразіна. 2012. Вып. 1022, № 71. С. 59-63.
 Кутуза Н. Маніпулятивні прийоми в рекламному та політичному дискурсах: лінгвістичні аспекти // Науковий вісник Херсонського державного університету. 2006. № 3. С. 285-288.
 Lapšanská, J. (2006). The language of advertising with the concentration on the linguistic means and the analysis of advertising slogans. Diploma thesis, Bratislava: Comenius University in Bratislava, Faculty of Education.
 Romanenko, E. (2014). Linguistic analysis of on-line advertising in English. Bachelor thesis, Prague: Charles University in Prague, Faculty of education.
 Vaknin, S. (2008). The Big Book of NLP Techniques. Charleston: BookSurge.
 
 References (translated and transliterated)
 
 Hesiuk, Y. (2014). Zastosuvannia neirolinhvistychnoho prohramuvannia v reklami [The usage of neurolinguistic programming in advertising]. Mediaprostir, 5, 122-126.
 Horyn, S. (2004). NLP: Tehnyky rossypiu. [Writing techniques]. In: Metafora Expromtom, (pp. 269-268). N. Libman (ed). Moscow: KSP+.
 Kalischuk, D. (2012). Psykholinhvistychni pryiomy movlennievoho manipuliuvannia u politychnomu dyskursi. “Hra u prostonarodnist” [Psycholinguistic Techniques of Speech Manipulation in Political Discourse. “Plain Folks”]. Journal of V.N.Karazin National University of Kharkiv, 1022(71), 59-63.
 Kutuza, N. (2006). Manipuliatyvni pryiomy v reklamnomu ta politychnomu dyskursakh: linhvistychni aspekty [Manipulative techniques in advertisement and political discourse]. Informational-Methodical Journal of Kherson State University, 3, 285-288.
 
 Sources
 
 Advertising. 2017. In Business dictionary.com. Retrieved November 9, 2017, from http://www.businessdictionary.com/definition/advertising.html
 Advertising. 2017. In Cambridge dictionary. com. Retrieved November 9, 2017, from https://dictionary.cambridge.org/dictionary/english/advertising
 Advertising. 2017. In Longman Dictionary of Contemporary English. Retrieved November 9, 2017, from https://www.ldoceonline.com/dictionary/advertising
 Burger King Slogans. (2017). Retrieved September 09, 2017, from http://www.thinkslogans.com/ company/burger-king/
 Eagle Boys Pizza Seeks Expansion In India. (2013, August 26). Retrieved September 10, 2017, from https://news.franchiseindia.com/Eagle-Boys-Pizza-seeks-expansion-in-India-2017
 Eat Good And Feel Good. (2016, June 21). Retrieved September 09, 2017, from http://www.eatwithhop. com/2016/06/eat-good-and-feel-good-extreme-pita.html
 Famous restaurant slogans and taglines. (2017). Retrieved August 09, 2017, from http://sloganshub.org/restaurants-slogans/
 Fast Food Slogans List A – F. (2017). Retrieved July 23, 2017, from http://www.ffood. net/fast_food_slogans.htm
 Fast food slogans. (2017). Retrieved September 01, 2017, from http://www.textart.ru/advertising/ slogans/fast-food.html
 Fish and chips slogans. (2017). Retrieved June 12, 2017, from http://www.textart.ru/advertising/ slogans/fish-and-chips.html
 Five Guys Prices. (2017, May 20). Retreived June 20, 2017, from https://fastfoodinusa.com/five-guys-prices/
 Hunt, Kristin. “10 things you didn't know about steak 'n shake” Thrillist. May, 2014. Retrieved July 10, 2017 from https://www.thrillist.com/eat/nation/a-brief-history-of-steak-n-shake
 Manipulation. 2017. In Dictionary.com. Retrieved November 9, 2017, from http://www.dictionary. com/browse/manipulation?s=t
 Manipulation. 2017. In Oxford Learner’s Dictionary. Retrieved November 9, 2017, from https://www.oxfordlearnersdictionaries.com/definition/english/manipulation?q=manipulation
 Papa Murphy's Cowboy Pizza TV Commercial, 'Love at 425 Degrees. (2013). Retrieved August 09, 2017, from https://www.ispot.tv/ad/7d6y/papa-murphys-cowboy-pizza-love-at-425-degrees
 Perrotte, Ashley. “America’ dinner is always open”. Prezi. Oct, 2015. Retrieved July 20, 2017, from https://prezi.com/vn99xnq6may_/americas-diner-is-always-open/
 Pizza Hut. (2017). Retrieved August 11, 2017, from http://www.bestslogans.com/v/237117/makin-it-great-again-and-again-pizza-hut/
 Pret a manager. (2017). Retrieved June 09, 2017, from https://www.pinterest.com/pin/ 535013630709601320/
 Rella, E. “We're lovin' it: McDonald's slogans over the last five decades” Finance. Mar. 2016. Retrieved June 09, 2017, from https://www.aol.com/article/2016/03/01/were-lovin-it-mcdonalds-slogans-over-the-last-five-decades/21320937/ https://genius.com/Fast-food-slogans-annotated
 Restaurant Slogans. (2017). Retrieved August 09, 2017, from http://www.advergize.com/slogans-list/restaurant-slogans/
 Restaurants. (2013, March 03). Retrieved June 03, 2017, from . http://www.morrisanderson.com/ resource-center/entry/Chains-last-links-Nostalgia-helps-keep-once-thriving-restaurant-franchises-/
 Sarodh, Waiz. “Krispy Kreme: Slogans & Humble Beginnings” Advergize Empowering Marketing, Mar. 2017. Retrieved August 09, 2017, from http://www.advergize.com/ advertising/krispy-kreme-slogans-and-humble-beginnings/
 Smaktakula. “Commercials We Do Not Like: Bad Andy” Promethean Times. Feb. 2011. Retrieved September 22, 2017, from https://prometheantimes.com/2011/02/22/commercials-we-do-not-like-badandy/
 Smith, Nelson. “Boston Pizza: Sink Your Teeth into This Delicious 6% Yield” Baystreet, May. 2017. Retrieved October 10, 2017, from http://www.baystreet.ca/dividends/159/Boston-Pizza-Sink-Your-Teeth-into-This-Delicious-6-Yield
 Subway. (2017). Retrieved June 10, 2017, from http://slogans.wikia.com/wiki/Subway
 10+ Wendy’s Slogans Today, and Over the Years. (2017, June 8). Retrieved August 21, 2017, from http://www.advergize.com/advertising/10-wendys-slogans-today-years/
 Wang, Eric. “McDonald's Slogans”. Flickr. Nov. 2006. Retrieved November 01, 2017, from https://www.flickr.com/photos/99353402@N00/300852871/
APA, Harvard, Vancouver, ISO, and other styles
2

Shamsi, Mohd Adeel, and Aftab Alam. "Exploring Lean Six Sigma implementation barriers in Information Technology industry." International Journal of Lean Six Sigma 9, no. 4 (2018): 523–42. http://dx.doi.org/10.1108/ijlss-06-2017-0054.

Full text
Abstract:
Purpose The purpose of this paper is to present critical barriers and obstacles faced by Information Technology (IT) industry in the implementation of Lean Six Sigma (LSS) as the business improvement methodology. Design/methodology/approach A literature review of peer-reviewed journal articles, master and doctoral theses, paradigmatic books with managerial impact and survey reports was used to identify distinct barriers. An empirical survey, using 400 self-administered questionnaires, was then conducted. Data about 11 LSS barriers from 256 usable questionnaires, with a response rate of 64 per cent, were collected and analyzed by means of statistical data analysis software. Findings The challenges of “part-time involvement in Lean Six Sigma projects”, “time consuming”, “staff turnover in middle of project”, “difficulty in data collection” and “difficulty in identifying project scope” emerged as the most critical barriers in the context of IT industry. This research work advocates the development of a strategy for addressing the most critical barrier instead of focusing on all for successful implementation. Originality/value This paper will prove to be a fantastic resource for many researchers and practitioners who are engaged in research and applications of LSS in the IT industry. Moreover, the scarcity of literature specific to LSS in IT industry will be addressed to some extent.
APA, Harvard, Vancouver, ISO, and other styles
3

Sandoria, Febby Wella, and Leonard Pangaribuan. "PENGARUH PENGALAMAN, BIAYA AUDITOR, PROFESIONALISME DAN INDEPENDENSI AUDITOR KANTOR AKUNTAN PUBLIK JAKARTA TERHADAP KEMAMPUAN MENGUNGKAPKAN FRAUD." Jurnal Akuntansi 9, no. 2 (2020): 93–111. http://dx.doi.org/10.46806/ja.v9i2.763.

Full text
Abstract:
The ability to disclose fraud essential to researched due to problems in the field. In Indonesia, there have been some cases where the company experienced massive losses because the auditors were not able to reveal the fraud. The purpose of this study was to analyze the influence of experience, audit fee, professionalism, and independence of auditors against the ability to disclose fraud. Fraud is an irregularity or unlawful act for the benefit of personal / group interests, either directly or indirectly detrimental to another party. According to the Indonesian Institute of Accountants (IAI) fraud is misstatement or loss of amount or disclosure in intentional financial statements. The result of the research shows that auditors experience variable with value of sig 0,011 has a positive influence on the ability to disclose fraud. The auditor audit fee variable with the value of sig 0,007 has a positive influence on the ability to disclose fraud. 
 Keywords : Auditors experience, audit fee, professionalism, independence, the ability to disclose fraud
 
 References:
 https://www.wartaekonomi.co.id/read145257/ketika-skandal-fraud-akuntansi-menerpa-british-telecom-dan- pwc.html
 https://economy.okezone.com/read/2019/06/28/320/2072245/kronologi-kasus-laporan-keuangan-garuda- indonesia-hingga-kena-sanksi
 Agustina, R. D., & Pratomo, D. (2019). Pengaruh Fraud Pentagon Dalam Mendeteksi Kecurangan Pelaporan Keuangan. Jurnal Ilmiah Manajemen, Ekonomi, & Akuntansi (MEA), 3(1), 44–62. https://doi.org/10.31955/mea.vol3.iss1.pp44-62
 Anggriawan. (2014). Pengaruh Pengalaman Kerja Skeptisme Profesional dan Tekanan Waktu Terhadap Kemampuan Aufitor Dalam Mendeteksi Fraud ( Studi Empiris Pada Kantor Akuntan Publik Di Diy) Eko. III.
 Arens, A. A., Elder, R. J., & Beasley, M. S. (2014). Auditing & Jasa Assurance.
 Aulia. (2013). Pengaruh Pengalaman Indepenensi Dan Skeptisme Profesional Auditor Terhadap Pendeteksi Kecurangan. (206082004000).
 Biksa, I. A. I., & Wiratmaja, I. D. N. (2016). Pengaruh Pengalaman, Independensi, Skeptisme Profesional Auditor pada pendeteksian kecurangan. E-Jurnal Akuntansi Universitas Udayana, 17(3), 2384–2415.
 Boynton, W. C. (2004). Modern Auditing (7th ed.).
 Bowerman, et al (2017). Business Statistics In Practice (8th ed).
 Carolita, M. K., & Rahardjo, S. N. (2012). Pengaruh Pengalaman Kerja, Independensi, Objektifitas, Integritas, Kompetensi, dan Komitmen Organisasi Terhadap Kualitas Hasil Audit. (Studi Pada Kantor Akuntan Publik di Semarang). 1(2002), 1–11.
 Christiawan, Y. J. (2002). Kompetensi Dan Independensi Akuntan Publik : Refleksi Hasil Penelitian Empiris. Jurnal Akuntansi Dan Keuangan, 4(2), 79–92. https://doi.org/10.9744/jak.4.2.pp.79-92
 Cooper, D. R., & Schindler, P. S. (2017). Metode Penelitian Bisnis (12th ed.). Salemba Empat.
 Fachruddin. (2017). Pengaruh Fee Audit, Pengalaman Kerja,Dan Pengalaman Kerja, Dan Independensi uditor Terhadap Kualitas Audit Pada Kantor Akuntan Publik DI Kota Medan Wan. 3(2), 144–155.
 George, C. S. (2005). The History of Management Thought. Paperback.
 Ghozali, I. (2016). Aplikasi Analisis Multivariete (8th ed.). Badan Penerbit Universitas Diponegoro.
 Hartan, T. H. (2016). Pengaruh Skeptisme Profesional, Independensi dan Kompetensi Terhadap Kemampuan Auditor Mendeteksi Kecurangan (Studi Empiris Pada Inspektorat DIY). Audit.
 Herliansyah, Y., & Ilyas, M. (2014). Pengaruh Pengalaman Auditor terhadap Penggunaan Bukti Tidak Relevan dalam Auditor Judgement. Simposium Nasional Akuntansi IX, 1–15.
 Hermawan, A., & Wulandari, R. (2019). Pengaruh Pengalaman Dan Keahlian Terhadap Ketepatan Pemberian Opini Audit Melalui Skeptisisme Profesional Auditor (Studi kasus pada Kantor Akuntan Publik di Jakarta Selatan). Proseding Seminar Nasional Akuntansi, 2(1). Retrieved from http://openjournal.unpam.ac.id/index.php/SNU/article/view/2601/2062
 Hutabarat, J. F. (2015). Pengaruh Profesionalisme, Independensi, Kompetensi dan Tanggungjawab Auditor terhadap Kemampuan Auditor dalam Mendeteksi Kecurangan (Survey pada Auditor di Kap Wilayah Sumatera). Jurnal Online Mahasiswa Fakultas Ekonomi Universitas Riau, 2(2), 1–14.
 Karamoy, H., & Wokas, H. R. N. (2016). Pengaruh Independensi Dan Profesionalisme, Dalam Mendeteksi Fraud Pada Auditor Internal Provinsi Sulawesi Utara.
 Kristianti. (2017). Tipe Kepribadian, Penerimaan Perilaku Disfungsional Dan Keputusan Audit. Jurnal Economia, 13(1), 28. https://doi.org/10.21831/economia.v13i1.10906
 Melati, L. (2017). Pengaruh Narsisme Klien, Audit Fee, Independensi, Skeptisme Profesional, Dan Interlock Auditor Eksternal Terhadap Audit Judgement Dalam Pendeteksian Kecurangan Laporan Keuangan (Studi Kasus Pada Kap Di Manado). Going Concern : Jurnal Riset Akuntansi, 12(2), 594–604. https://doi.org/10.32400/gc.12.2.17977.2017
 Mulyadi. (1998). Auditing (5th ed.; S. T. I. E. YKPN, ed.). Salemba Empat.
 Nasution, H., & Fitriani. (2012). Pengaruh Beban Kerja, Pengalaman Audit dan Tipe Kepribadian Terhadap Skeptisme Profesional dan Kemampuan Auditor Dalam Mendeteksi Kecurangan. Audit, 69(2), 283–291.
 Nurgiyantoro, B., Gunawan, & Marzuki. (2002). Statistik Terapan. Universitas Gadjah Mada.
 Pangestika, R. (2014). Pengaruh Independensi Dan Efektivitas Komite Audit Terhadap Manajemen Laba (Studi Empiris pada Perusahaan Manufaktur yang Terdaftar di Bursa Efek Indonesia Tahun 2010 – 2012). Jurnal Telaah Dan Riset Akuntansi, 7(2), 131–141.
 Pratomo. (2017). Pengalaman Auditor Aparat Pengawas Intern Pemerintah ( Apip ) Terhadap Pendeteksian Fraud Dengan Skeptisisme Profesional Sebagai Variabel Intervening Pada Perwakilan Bpkp Provinsi. (60), 67– 83.
 Putri, F. P. (2015). Pengaruh Pengetahuan, Pengalaman Auditor, Kompleksitas Tugas, Locus of Control, dan Tekanan Ketaatan Terhadap Audit Judgement (Studi Kasus Pada Perwakilan BPKP Provinsi Riau). Audit, 39(5), 561–563.
 Rahmayani. (2014). Pengaruh Kemampuan Auditor, Skeptisme Profesional Auditor, Teknik Audit Dan Whistleblower Terhadap Efektivitas Pelaksanaan Audit Investigasi Dalam Pengungkapan Kecurangan (Studi Empiris Pada BPK dan BPKP Perwakilan Provinsi Riau). JOM FEKON, 1(4), 53
 Ramadona. (2016). Pengaruh Struktur Kepemilikan Manajerial, Struktur Kepemilikan Institusional, Ukuran Perusahaan Dan Leverage Terhadap Konservatisme Akuntansi (Studi pada Perusahaan Makanan dan Minuman yang Terdaftar di Bursa Efek Indonesia Tahun 2011-2014. 3(1).
 Sulistyowati. (2014). Pengaruh Pengalaman, Kompetensi, Independensi dan Profesionalisme Auditor Terhadap Pendeteksian Kecurangan. Implementation Science, 39(1), 1–15. https://doi.org/10.4324/9781315853178
 Sunyoto, D. (2007). Analisis Regresi dan Korelasi Bivariat. Yogyakarta: Amara Books. Terry, G. R. (2014). Dasar-Dasar Manajemen. Jakarta: Bumi Aksara.
 Umar, H. (2008). Metode Penelitian Untuk Skripsi dan Tesis Bisnis. PT Rajagrafindo Persada.
 Widiyastuti, M., & Pamudji, S. (2016). Pengaruh Kompetensi, Independensi, dan Proesionalisme Terhadap Kemampuan Auditor dalam Mendeteksi Kecurangan. Audit, 134(4), 635–646.
 Windasari, M., & Juliarsa, G. (2016). Pengaruh Kompetensi, Independensi, Dan Profesionalisme Auditor Internal Dalam Mencegah Kecurangan Pada Bpr Di Kabupaten Badung. E-Jurnal Akuntansi, 17(3), 1924–1952.
 Wiratmaja2, I. A. I. B. I. D. N., & Wiratmaja2, I. A. I. B. I. D. N. (2016). Pengaruh Pengalaman, Indepedensi, Skeptisme Profesional Auditor Pada Pendeteksian Kecurangan. E-Jurnal Akuntansi Universitas Udayana, 19(8), 2059–2067. https://doi.org/10.1016/0032-3950(77)90421-X
 Wulandari, S. (2014). Analisis Faktor-Faktor Yang Mempengaruhi Auditor Dalam Memberikan Opini Audit Going Concern. E-Jurnal Akuntansi, 6(3), 531–558.
APA, Harvard, Vancouver, ISO, and other styles
4

Das, Devaleena. "What’s in a Term: Can Feminism Look beyond the Global North/Global South Geopolitical Paradigm?" M/C Journal 20, no. 6 (2017). http://dx.doi.org/10.5204/mcj.1283.

Full text
Abstract:
Introduction The genealogy of Feminist Standpoint Theory in the 1970s prioritised “locationality”, particularly the recognition of social and historical locations as valuable contribution to knowledge production. Pioneering figures such as Sandra Harding, Dorothy Smith, Patricia Hill Collins, Alison Jaggar, and Donna Haraway have argued that the oppressed must have some means (such as language, cultural practices) to enter the world of the oppressor in order to access some understanding of how the world works from the privileged perspective. In the essay “Meeting at the Edge of Fear: Theory on a World Scale”, the Australian social scientist Raewyn Connell explains that the production of feminist theory almost always comes from the global North. Connell critiques the hegemony of mainstream Northern feminism in her pyramidal model (59), showing how theory/knowledge is produced at the apex (global North) of a pyramid structure and “trickles down” (59) to the global South. Connell refers to a second model called mosaic epistemology which shows that multiple feminist ideologies across global North/South are juxtaposed against each other like tiles, with each specific culture making its own claims to validity.However, Nigerian feminist Bibi Bakare-Yusuf’s reflection on the fluidity of culture in her essay “Fabricating Identities” (5) suggests that fixing knowledge as Northern and Southern—disparate, discrete, and rigidly structured tiles—is also problematic. Connell proposes a third model called solidarity-based epistemology which involves mutual learning and critiquing with a focus on solidarity across differences. However, this is impractical in implementation especially given that feminist nomenclature relies on problematic terms such as “international”, “global North/South”, “transnational”, and “planetary” to categorise difference, spatiality, and temporality, often creating more distance than reciprocal exchange. Geographical specificity can be too limiting, but we also need to acknowledge that it is geographical locationality which becomes disadvantageous to overcome racial, cultural, and gender biases — and here are few examples.Nomenclatures: Global-North and Global South ParadigmThe global North/South terminology differentiating the two regions according to means of trade and relative wealth emerged from the Brandt Report’s delineation of the North as wealthy and South as impoverished in 1980s. Initially, these terms were a welcome repudiation of the hierarchical nomenclature of “developed” and “developing” nations. Nevertheless, the categories of North and South are problematic because of increased socio-economic heterogeneity causing erasure of local specificities without reflecting microscopic conflicts among feminists within the global North and the global South. Some feminist terms such as “Third World feminism” (Narayan), “global feminism” (Morgan), or “local feminisms” (Basu) aim to centre women's movements originating outside the West or in the postcolonial context, other labels attempt to making feminism more inclusive or reflective of cross-border linkages. These include “transnational feminism” (Grewal and Kaplan) and “feminism without borders” (Mohanty). In the 1980s, Kimberlé Williams Crenshaw’s concept of intersectionality garnered attention in the US along with Gloria Anzaldúa’s Borderlands/La Frontera: The New Mestiza (1987), which raised feminists’ awareness of educational, healthcare, and financial disparities among women and the experiences of marginalised people across the globe, leading to an interrogation of the aims and purposes of mainstream feminism. In general, global North feminism refers to white middle class feminist movements further expanded by concerns about civil rights and contemporary queer theory while global South feminism focusses on decolonisation, economic justice, and disarmament. However, the history of colonialism demonstrates that this paradigm is inadequate because the oppression and marginalisation of Black, Indigenous, and Queer activists have been avoided purposely in the homogenous models of women’s oppression depicted by white radical and liberal feminists. A poignant example is from Audre Lorde’s personal account:I wheeled my two-year-old daughter in a shopping cart through a supermarket in Eastchester in 1967, and a little white girl riding past in her mother’s cart calls out excitedly, ‘oh look, Mommy, a baby maid!’ And your mother shushes you, but does not correct you, and so fifteen years later, at a conference on racism, you can still find that story humorous. But I hear your laughter is full of terror and disease. (Lorde)This exemplifies how the terminology global North/South is a problem because there are inequities within the North that are parallel to the division of power and resources between North and South. Additionally, Susan Friedman in Planetary Modernisms observes that although the terms “Global North” and “Global South” are “rhetorically spatial” they are “as geographically imprecise and ideologically weighted as East/West” because “Global North” signifies “modern global hegemony” and “Global South” signifies the “subaltern, … —a binary construction that continues to place the West at the controlling centre of the plot” (Friedman, 123).Focussing on research-activism debate among US feminists, Sondra Hale takes another tack, emphasising that feminism in the global South is more pragmatic than the theory-oriented feminist discourse of the North (Hale). Just as the research-scholarship binary implies myopic assumption that scholarship is a privileged activity, Hale’s observations reveal a reductive assumption in the global North and global South nomenclature that feminism at the margins is theoretically inadequate. In other words, recognising the “North” as the site of theoretical processing is a euphemism for Northern feminists’ intellectual supremacy and the inferiority of Southern feminist praxis. To wit, theories emanating from the South are often overlooked or rejected outright for not aligning with Eurocentric framings of knowledge production, thereby limiting the scope of feminist theories to those that originate in the North. For example, while discussing Indigenous women’s craft-autobiography, the standard feminist approach is to apply Susan Sontag’s theory of gender and photography to these artefacts even though it may not be applicable given the different cultural, social, and class contexts in which they are produced. Consequently, Moroccan feminist Fatima Mernissi’s Islamic methodology (Mernissi), the discourse of land rights, gender equality, kinship, and rituals found in Bina Agarwal’s A Field of One’s Own, Marcia Langton’s “Grandmothers’ Law”, and the reflection on military intervention are missing from Northern feminist theoretical discussions. Moreover, “outsiders within” feminist scholars fit into Western feminist canonical requirements by publishing their works in leading Western journals or seeking higher degrees from Western institutions. In the process, Northern feminists’ intellectual hegemony is normalised and regularised. An example of the wealth of the materials outside of mainstream Western feminist theories may be found in the work of Girindrasekhar Bose, a contemporary of Sigmund Freud, founder of the Indian Psychoanalytic Society and author of the book Concept of Repression (1921). Bose developed the “vagina envy theory” long before the neo-Freudian psychiatrist Karen Horney proposed it, but it is largely unknown in the West. Bose’s article “The Genesis and Adjustment of the Oedipus Wish” discarded Freud’s theory of castration and explained how in the Indian cultural context, men can cherish an unconscious desire to bear a child and to be castrated, implicitly overturning Freud’s correlative theory of “penis envy.” Indeed, the case of India shows that the birth of theory can be traced back to as early as eighth century when study of verbal ornamentation and literary semantics based on the notion of dbvani or suggestion, and the aesthetic theory of rasa or "sentiment" is developed. If theory means systematic reasoning and conceptualising the structure of thought, methods, and epistemology, it exists in all cultures but unfortunately non-Western theory is largely invisible in classroom courses.In the recent book Queer Activism in India, Naisargi Dev shows that the theory is rooted in activism. Similarly, in her essay “Seed and Earth”, Leela Dube reveals how Eastern theories are distorted as they are Westernised. For instance, the “Purusha-Prakriti” concept in Hinduism where Purusha stands for pure consciousness and Prakriti stands for the entire phenomenal world is almost universally misinterpreted in terms of Western binary oppositions as masculine consciousness and feminine creative principle which has led to disastrous consequences including the legitimisation of male control over female sexuality. Dube argues how heteropatriarchy has twisted the Purusha-Prakriti philosophy to frame the reproductive metaphor of the male seed germinating in the female field for the advantage of patrilineal agrarian economies and to influence a homology between reproductive metaphors and cultural and institutional sexism (Dube 22-24). Attempting to reverse such distortions, ecofeminist Vandana Shiva rejects dualistic and exploitative “contemporary Western views of nature” (37) and employs the original Prakriti-Purusha cosmology to construct feminist vision and environmental ethics. Shiva argues that unlike Cartesian binaries where nature or Prakriti is inert and passive, in Hindu Philosophy, Purusha and Prakriti are inseparable and inviolable (Shiva 37-39). She refers to Kalika Purana where it is explained how rivers and mountains have a dual nature. “A river is a form of water, yet is has a distinct body … . We cannot know, when looking at a lifeless shell, that it contains a living being. Similarly, within the apparently inanimate rivers and mountains there dwells a hidden consciousness. Rivers and mountains take the forms they wish” (38).Scholars on the periphery who never migrated to the North find it difficult to achieve international audiences unless they colonise themselves, steeping their work in concepts and methods recognised by Western institutions and mimicking the style and format that western feminist journals follow. The best remedy for this would be to interpret border relations and economic flow between countries and across time through the prism of gender and race, an idea similar to what Sarah Radcliffe, Nina Laurie and Robert Andolina have called the “transnationalization of gender” (160).Migration between Global North and Global SouthReformulation of feminist epistemology might reasonably begin with a focus on migration and gender politics because international and interregional migration have played a crucial role in the production of feminist theories. While some white mainstream feminists acknowledge the long history of feminist imperialism, they need to be more assertive in centralising non-Western theories, scholarship, and institutions in order to resist economic inequalities and racist, patriarchal global hierarchies of military and organisational power. But these possibilities are stymied by migrants’ “de-skilling”, which maintains unequal power dynamics: when migrants move from the global South to global North, many end up in jobs for which they are overqualified because of their cultural, educational, racial, or religious alterity.In the face of a global trend of movement from South to North in search of a “better life”, visual artist Naiza Khan chose to return to Pakistan after spending her childhood in Lebanon before being trained at the University of Oxford. Living in Karachi over twenty years, Khan travels globally, researching, delivering lectures, and holding exhibitions on her art work. Auj Khan’s essay “Peripheries of Thought and Practise in Naiza Khan’s Work” argues: “Khan seems to be going through a perpetual diaspora within an ownership of her hybridity, without having really left any of her abodes. This agitated space of modern hybrid existence is a rich and ripe ground for resolution and understanding. This multiple consciousness is an edge for anyone in that space, which could be effectively made use of to establish new ground”. Naiza Khan’s works embrace loss or nostalgia and a sense of choice and autonomy within the context of unrestricted liminal geographical boundaries.Early work such as “Chastity Belt,” “Heavenly Ornaments”, “Dream”, and “The Skin She Wears” deal with the female body though Khan resists the “feminist artist” category, essentially because of limited Western associations and on account of her paradoxical, diasporic subjectivity: of “the self and the non-self, the doable and the undoable and the anxiety of possibility and choice” (Khan Webpage). Instead, Khan theorises “gender” as “personal sexuality”. The symbolic elements in her work such as corsets, skirts, and slips, though apparently Western, are purposely destabilised as she engages in re-constructing the cartography of the body in search of personal space. In “The Wardrobe”, Khan establishes a path for expressing women’s power that Western feminism barely acknowledges. Responding to the 2007 Islamabad Lal Masjid siege by militants, Khan reveals the power of the burqa to protect Muslim men by disguising their gender and sexuality; women escape the Orientalist gaze. For Khan, home is where her art is—beyond the global North and South dichotomy.In another example of de-centring Western feminist theory, the Indian-British sitar player Anoushka Shankar, who identifies as a radical pro-feminist, in her recent musical album “Land of Gold” produces what Chilla Bulbeck calls “braiding at the borderlands”. As a humanitarian response to the trauma of displacement and the plight of refugees, Shankar focusses on women giving birth during migration and the trauma of being unable to provide stability and security to their children. Grounded in maternal humility, Shankar’s album, composed by artists of diverse background as Akram Khan, singer Alev Lenz, and poet Pavana Reddy, attempts to dissolve boundaries in the midst of chaos—the dislocation, vulnerability and uncertainty experienced by migrants. The album is “a bit of this, and a bit of that” (borrowing Salman Rushdie’s definition of migration in Satanic Verses), both in terms of musical genre and cultural identities, which evokes emotion and subjective fluidity. An encouraging example of truly transnational feminist ethics, Shankar’s album reveals the chasm between global North and global South represented in the tension of a nascent friendship between a white, Western little girl and a migrant refugee child. Unlike mainstream feminism, where migration is often sympathetically feminised and exotified—or, to paraphrase bell hooks, difference is commodified (hooks 373) — Shankar’s album simultaneously exhibits regional, national, and transnational elements. The album inhabits multiple borderlands through musical genres, literature and politics, orality and text, and ethnographic and intercultural encounters. The message is: “the body is a continent / But may your heart always remain the sea" (Shankar). The human rights advocate and lawyer Randa Abdel-Fattah, in her autobiographical novel Does My Head Look Big in This?, depicts herself as “colourful adjectives” (such as “darkies”, “towel-heads”, or the “salami eaters”), painful identities imposed on her for being a Muslim woman of colour. These ultimately empower her to embrace her identity as a Palestinian-Egyptian-Australian Muslim writer (Abdel-Fattah 359). In the process, Abdel-Fattah reveals how mainstream feminism participates in her marginalisation: “You’re constantly made to feel as you’re commenting as a Muslim, and somehow your views are a little bit inferior or you’re somehow a little bit more brainwashed” (Abdel-Fattah, interviewed in 2015).With her parental roots in the global South (Egyptian mother and Palestinian father), Abdel-Fattah was born and brought up in the global North, Australia (although geographically located in global South, Australia is categorised as global North for being above the world average GDP per capita) where she embraced her faith and religious identity apparently because of Islamophobia:I refuse to be an apologist, to minimise this appalling state of affairs… While I'm sick to death, as a Muslim woman, of the hypocrisy and nonsensical fatwas, I confess that I'm also tired of white women who think the answer is flashing a bit of breast so that those "poor," "infantilised" Muslim women can be "rescued" by the "enlightened" West - as if freedom was the sole preserve of secular feminists. (Abdel-Fattah, "Ending Oppression")Abdel-Fattah’s residency in the global North while advocating for justice and equality for Muslim women in both the global North and South is a classic example of the mutual dependency between the feminists in global North and global South, and the need to recognise and resist neoliberal policies applied in by the North to the South. In her novel, sixteen-year-old Amal Mohamed chooses to become a “full-time” hijab wearer in an elite school in Melbourne just after the 9/11 tragedy, the Bali bombings which killed 88 Australians, and the threat by Algerian-born Abdel Nacer Benbrika, who planned to attack popular places in Sydney and Melbourne. In such turmoil, Amal’s decision to wear the hijab amounts to more than resistance to Islamophobia: it is a passionate search for the true meaning of Islam, an attempt to embrace her hybridity as an Australian Muslim girl and above all a step towards seeking spiritual self-fulfilment. As the novel depicts Amal’s challenging journey amidst discouraging and painful, humiliating experiences, the socially constructed “bloody confusing identity hyphens” collapse (5). What remains is the beautiful veil that stands for Amal’s multi-valence subjectivity. The different shades of her hijab reflect different moods and multiple “selves” which are variously tentative, rebellious, romantic, argumentative, spiritual, and ambitious: “I am experiencing a new identity, a new expression of who I am on the inside” (25).In Griffith Review, Randa-Abdel Fattah strongly criticises the book Nine Parts of Desire by Geraldine Brooks, a Wall-Street Journal reporter who travelled from global North to the South to cover Muslim women in the Middle East. Recognising the liberal feminist’s desire to explore the Orient, Randa-Abdel calls the book an example of feminist Orientalism because of the author’s inability to understand the nuanced diversity in the Muslim world, Muslim women’s purposeful downplay of agency, and, most importantly, Brooks’s inevitable veil fetishism in her trip to Gaza and lack of interest in human rights violations of Palestinian women or their lack of access to education and health services. Though Brooks travelled from Australia to the Middle East, she failed to develop partnerships with the women she met and distanced herself from them. This underscores the veracity of Amal’s observation in Abdel Fattah’s novel: “It’s mainly the migrants in my life who have inspired me to understand what it means to be an Aussie” (340). It also suggests that the transnational feminist ethic lies not in the global North and global South paradigm but in the fluidity of migration between and among cultures rather than geographical boundaries and military borders. All this argues that across the imperial cartography of discrimination and oppression, women’s solidarity is only possible through intercultural and syncretistic negotiation that respects the individual and the community.ReferencesAbdel-Fattah, Randa. Does My Head Look Big in This? Sydney: Pan MacMillan Australia, 2005.———. “Ending Oppression in the Middle East: A Muslim Feminist Call to Arms.” ABC Religion and Ethics, 29 April 2013. <http://www.abc.net.au/religion/articles/2013/04/29/3747543.htm>.———. “On ‘Nine Parts Of Desire’, by Geraldine Brooks.” Griffith Review. <https://griffithreview.com/on-nine-parts-of-desire-by-geraldine-brooks/>.Agarwal, Bina. A Field of One’s Own: Gender and Land Rights in South Asia. Cambridge: Cambridge University, 1994.Amissah, Edith Kohrs. Aspects of Feminism and Gender in the Novels of Three West African Women Writers. Nairobi: Africa Resource Center, 1999.Andolina, Robert, Nina Laurie, and Sarah A. Radcliffe. Indigenous Development in the Andes: Culture, Power, and Transnationalism. Durham, NC: Duke University Press, 2009.Anzaldúa, Gloria E. Borderlands/La Frontera: The New Mestiza. San Francisco: Aunt Lute Books, 1987.Bakare-Yusuf, Bibi. “Fabricating Identities: Survival and the Imagination in Jamaican Dancehall Culture.” Fashion Theory 10.3 (2006): 1–24.Basu, Amrita (ed.). Women's Movements in the Global Era: The Power of Local Feminisms. Philadelphia: Westview Press, 2010.Bulbeck, Chilla. Re-Orienting Western Feminisms: Women's Diversity in a Postcolonial World. Cambridge: Cambridge University Press, 1998.Connell, Raewyn. “Meeting at the Edge of Fear: Theory on a World Scale.” Feminist Theory 16.1 (2015): 49–66.———. “Rethinking Gender from the South.” Feminist Studies 40.3 (2014): 518-539.Daniel, Eniola. “I Work toward the Liberation of Women, But I’m Not Feminist, Says Buchi Emecheta.” The Guardian, 29 Jan. 2017. <https://guardian.ng/art/i-work-toward-the-liberation-of-women-but-im-not-feminist-says-buchi-emecheta/>.Devi, Mahasveta. "Draupadi." Trans. Gayatri Chakravorty Spivak. Critical Inquiry 8.2 (1981): 381-402.Friedman, Susan Stanford. Planetary Modernisms: Provocations on Modernity across Time. New York: Columbia University Press, 2015.Grewal, Inderpal, and Caren Kaplan. Scattered Hegemonies: Postmodernity and Transnational Feminist. Minneapolis: University of Minnesota Press, 1994.Hale, Sondra. “Transnational Gender Studies and the Migrating Concept of Gender in the Middle East and North Africa.” Cultural Dynamics 21.2 (2009): 133-52.hooks, bell. “Eating the Other: Desire and Resistance.” Black Looks: Race and Representation. Boston: South End Press, 1992.Langton, Marcia. “‘Grandmother’s Law’, Company Business and Succession in Changing Aboriginal Land Tenure System.” Traditional Aboriginal Society: A Reader. Ed. W.H. Edward. 2nd ed. Melbourne: Macmillan, 2003.Lazreg, Marnia. “Feminism and Difference: The Perils of Writing as a Woman on Women in Algeria.” Feminist Studies 14.1 (Spring 1988): 81-107.Liew, Stephanie. “Subtle Racism Is More Problematic in Australia.” Interview. music.com.au 2015. <http://themusic.com.au/interviews/all/2015/03/06/randa-abdel-fattah/>.Lorde, Audre. “The Uses of Anger: Women Responding to Racism.” Keynoted presented at National Women’s Studies Association Conference, Storrs, Conn., 1981.Mernissi, Fatima. The Veil and the Male Elite: A Feminist Interpretation of Women’s Rights in Islam. Trans. Mary Jo Lakeland. New York: Basic Books, 1991.Moghadam, Valentine. Modernizing Women: Gender and Social Change in the Middle East. London: Lynne Rienner Publishers, 2003.Mohanty, Chandra Talpade. Feminism without Borders: Decolonizing Theory, Practicing Solidarity. Durham, NC: Duke University Press, 2003.Moreton-Robinson, Aileen. Talkin' Up to the White Woman: Aboriginal Women and Feminism. St Lucia: Queensland University Press, 2000.Morgan, Robin (ed.). Sisterhood Is Global: The International Women's Movement Anthology. New York: The Feminist Press, 1984.Narayan, Uma. Dislocating Cultures: Identities, Traditions, and Third World Feminism, 1997.
APA, Harvard, Vancouver, ISO, and other styles
5

Al Khoufi, Emad. "Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector. Symmetry, 12(9), 1544. DOI: 10.3390/sym12091544 Alateyah, S.A., Crowder, R.M. and Wills, G.B. (2013). Identified factors affecting the citizen’s intention to adopt e-government in Saudi Arabia. World Academy of Science, Engineering and Technology, 7(8), 904–12. Antonino, P., Duszynski, S., Jung, C. and Rudolph, M. (2010). Indicator-based architecture-level security evaluation in a service-oriented environment. In: The Fourth European Conference on Software Architecture: Copenhagen, Denmark, 23–26/08/2010. DOI: 10.1145/1842752.1842795. Chaturvedi, M., Gupta, M. and Bhattacharya, J. (2008). Cyber Security Infrastructure in India: A Study, Emerging Technologies in E-Government. Available at: http://www.csi-sigegov.org/emerging_pdf/9_70-84.pdf (Accessed on 15/11/2020). Dalol, M.H. (2018). Effectiveness of Accounting Information Systems in Light of Development of IT Infrastructure and Information Security. Master’s Dissertation, The Islamic University of Gaza, Gaza, Palestine. Dooley, K. (2001). Designing Large Scale LANs: Help for Network Designers. USA: O'Reilly Media. Ebad, S. (2018a) An exploratory study of ICT projects failure in emerging markets. Journal of Global Information Technology Management, 21(2), 139–60. DOI: 10.1080/1097198X.2018.1462071. Ebad, S. (2018b). The influencing causes of software unavailability: A case study from industry. Software Practice and Experience, 48(5), 1056–76. DOI: 10.1002/spe.2569. Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), n/a. DOI: 10.1186/1869-0238-4-5. Kirby, L. (2015). Beyond Cyber Security: Protecting Your IT Infrastructure. Available at https://uptimeinstitute.com/images/Documents/ProtectingYourITInfrastructure.pdf (accessed on 15/11/2020). Lethbridge, T.C., Sim, S.E. and Singer, J. (2005). Studying software engineers: Data collection techniques for software field studies. Empirical Software Engineering, 10(3), 311–41. Marrone, M. and Kolbe, L.M. (2011). Impact of IT service management frameworks on the IT organization. Business and Information Systems Engineering, 3(1), 5–18. Mastelic, T. and Brandic, I. (2013). TimeCap: Methodology for comparing IT infrastructures based on time and capacity metrics. In: The IEEE 6th International Conference on Cloud Computing, 131–8, Santa Clara, CA, USA, 28/06–03/07/2013. Mimura, M. and Suga, Y. (2019). Filtering malicious JavaScript code with Doc2Vec on an imbalanced dataset. In: The 14th Asia Joint Conference on Information Security (AsiaJCIS), Kobe, Japan, 24–31/08/2019. Pearlson, K.E., Saunders, C.S. and Galletta, D.F. (2019). Managing and Using Information Systems. 5th edition, USA: Wiley. Popp, K. and Meyer, R. (2011). Profit from Software Ecosystems Models, Ecosystems and Partnerships in the Software Industry. Norderstedt, Germany: Books on Demand. Priem, R. (2020). Distributed ledger technology for securities clearing and settlement: Benefits, risks, and regulatory implications. Financial Innovation, 6(11), n/a. DOI: 10.1186/s40854-019-0169-6. Rabii, L. and Abdelaziz, D. (2015). Comparison of e-readiness composite indicators, The 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakech, Morocco, 14–16/12/2015. Sanchez-Nielsen, E., Padron-Ferrer, A. and Marreo-Estevez, F. (2011). A multi-agent system for incident management solutions on IT infrastructures. In: The 14th Conference of the Spanish Association for Artificial Intelligence (CAEPIA 2011), La Laguna, Spain, 07–11/11/2011. Schoenfisch, J, Meilicke, C., Stülpnagel, J.V. and Ortmann, J (2018). Root cause analysis in IT infrastructures using ontologies and abduction in Markov logic networks. Information Systems, 74(2), 103–16. Shang, S. and Seddon, P.B. (2000). A comprehensive framework for classifying the benefits of ERP systems. In: The 2000 American Conference of Information Systems, Long Beach, California, 10–13/08/2000. Shoffner, M., Owen, P., Mostafa, J., Lamm, B., Wang, X., Schmitt, C.P. and Ahalt S.C. (2013). The secure medical research workspace: An IT infrastructure to enable secure research on clinical data. Clinical and Translational Science, 6 (3), 222–5. Shrivastava, A.K. (2015). The impact assessment of IT Infrastructure on information security: a survey report. In: International Conference on Information Security and Privacy (ICISP2015), Nagpur, India, 11–12/12/2015. Sommerville, I. (2015). Software Engineering. 10th edition, UK: Pearson. Sousa, K.J. and Oz, E. (2015). Management Information Systems. 7th edition, USA: Cengage Learning. Teymourlouei, H., and Harris, V. (2019). Effective methods to monitor IT infrastructure security for small business. In: The 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 5–7/12/2019. Topper, J. (2018). Compliance is not security. Computer Fraud and Security, 2018(3), 5–8. DOI: 10.1016/S1361-3723(18)30022-8. Wohlin, C., Runeson, P., Host, M., Ohlsson, M.C., Regnell, B. and Wesslen, A. (2012). Experimentation in Software Engineering. Germany: Springer. Yasasin, E., Prester, J., Wagner, G. and Schryen, G. (2020). Forecasting IT security vulnerabilities –an empirical analysis. Computers and Security, 88(n/a), n/a. DOI: 10.1016/j.cose.2019.101610. Zambon, E., Etalle, S., Wieringa, R.J. and Hartel, P. (2010). Model-based qualitative risk assessment for availability of IT infrastructures. Software and Systems Modeling, 10(4), 553–80." Basic and Applied Sciences - Scientific Journal of King Faisal University 22, no. 1 (2021). http://dx.doi.org/10.37575/b/med/0038.

Full text
Abstract:
Few epidemiological studies have discussed the gender-specific prevalence of ischemic heart disease (IHD). We aimed to investigate the gender-specific prevalence of IHD among Saudi patients visiting the emergency department and if it is affected by diabetes mellitus and/or hypertension. Three hundred patients were recruited from Prince Sultan Cardiac Center in Al Ahsa, KSA. Hypertension was identified as systolic pressure equal to or more than 140 mmHg and/or diastolic pressure equal to or more than 90 mmHg or by the patient currently being on antihypertensive medication, and coronary artery disease (CAD) was diagnosed by electrocardiogram, cardiac markers, cardiac exercise testing or coronary angiography. Hypertension was found in 80% of males and 72% of females. A significantly higher rate of diabetes was noted in females (62%) compared to males (48%) (p<0.012). Co-existing diabetes and hypertension was found in 70% of females as compared to 38% of males. The occurrence of IHD in males was significantly higher than that in females (p<0.001). However, the incidence of myocardial infarction was greater in females (52%) compared to males (38%) (p<0.035). Co-existing hypertension and diabetes may affect the gender prevalence of myocardial infarction among emergency department patients, with more infarctions being noted among females. This finding helps to guide the treatment strategy for both genders.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography