Academic literature on the topic 'Business-books=2017-10-08'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Business-books=2017-10-08.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Business-books=2017-10-08"

1

Khan, Muhammad Kabir, and Adnan Ullah. "Exploring the Elements That Influence Postgraduate Students' Reading Trends in University Libraries in Islamabad." Inverge Journal of Social Sciences 3, no. 3 (2024): 54–67. https://doi.org/10.63544/ijss.v3i3.93.

Full text
Abstract:
Purpose: The purpose of this study was to investigate factors influencing post-graduate students' reading trends at university libraries in Islamabad as well as students' reading trends and their effects on academic achievement. Methodology: To accomplish the study's objectives, a quantitative research technique was used, and a survey based on a questionnaire was undertaken. For the purpose of gathering information from the respondents, a structured questionnaire was created. Data was gathered from the libraries of Islamabad-based HEC-recognized universities using a purposive sampling techniqu
APA, Harvard, Vancouver, ISO, and other styles
2

.., Mais, Fayez .., and Sanaa AL Mezawy. "Developing a Model to Improve the Efficiency of Maintenance Management for Service Buildings Using BIM and Power BI: A Case Study." International Journal of BIM and Engineering Science 8, no. 1 (2024): 18–30. http://dx.doi.org/10.54216/ijbes.080102.

Full text
Abstract:
[1] Seely, I.H.1987. Building Maintenance. London, Second Edition.470p. [2] Hawass, Zaki. Building diseases.(1992). Egypt, World of Books, first edition, 54 pages. (Arabic version) [3] Abu Al-Majd, Sharif. (1993). Cracking in concrete structures and methods of treating them. Egyptian Universities Publishing House - Al-Wafaa Library, Egypt, 143 pages. (Arabic version) [4] - Menoun, Muhammad Suleiman. (1996). Residential building maintenance. Master's thesis, Egypt, 150 pages. (Arabic version) [5] Saladin, Wael. (1997). An approach to improving maintenance efficiency in hotels through evaluating
APA, Harvard, Vancouver, ISO, and other styles
3

Anggun Adilah Maharani and Tika Widiastuti. "Determinants of Crowdfunder Intention on Using The Crowdfunding-Waqf Model: A Case Study of Kitabisa.Com Applications." Jurnal Ekonomi Syariah Teori dan Terapan 10, no. 3 (2023): 290–304. http://dx.doi.org/10.20473/vol10iss20233pp290-304.

Full text
Abstract:
ABSTRACT This study aimed to analyze the influence of variable factors in the UTAUT2 (Unified Theory of Acceptance and Use of Technology) model on behavioral intention to use CWM (Crowdfunding-Waqf Model) in the Kitabisa.com application. The population used in this study were active users of the Kitabisa.com application, which are spread throughout Indonesia. Data collection techniques in this study used survey techniques by distributing questionnaires online to 174 respondents. The sampling technique used in this study was purposive sampling, which is a sampling technique with certain criteri
APA, Harvard, Vancouver, ISO, and other styles
4

Poutoglidou, Frideriki, Marios Stavrakas, Nikolaos Tsetsos, et al. "Fraud and Deceit in Medical Research." Voices in Bioethics 8 (January 26, 2022). http://dx.doi.org/10.52214/vib.v8i.8940.

Full text
Abstract:
Photo by Agni B on Unsplash ABSTRACT The number of scientific articles published per year has been steadily increasing; so have the instances of misconduct in medical research. While increasing scientific knowledge is beneficial, it is imperative that research be authentic and bias-free. This article explores why fraud and other misconduct occur, presents the consequences of the phenomenon, and proposes measures to eliminate unethical practices in medical research. The main reason scientists engage in unethical practices is the pressure to publish which is directly related to their academic ad
APA, Harvard, Vancouver, ISO, and other styles
5

DeCook, Julia Rose. "Trust Me, I’m Trolling: Irony and the Alt-Right’s Political Aesthetic." M/C Journal 23, no. 3 (2020). http://dx.doi.org/10.5204/mcj.1655.

Full text
Abstract:
In August 2017, a white supremacist rally marketed as “Unite the Right” was held in Charlottesville, Virginia. In participation were members of the alt-right, including neo-nazis, white nationalists, neo-confederates, and other hate groups (Atkinson). The rally swiftly erupted in violence between white supremacists and counter protestors, culminating in the death of a counter-protester named Heather Heyer, who was struck by a car driven by white supremacist James Alex Fields, and leaving dozens injured. Terry McQuliffe, the Governor of Virginia, declared a state of emergency on August 12, and
APA, Harvard, Vancouver, ISO, and other styles
6

Al Khoufi, Emad. "Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector. Symmetry, 12(9), 1544. DOI: 10.3390/sym12091544 Alateyah, S.A., Crowder, R.M. and Wills, G.B. (2013). Identified factors affecting the citizen’s intention to adopt e-government in Saudi Arabia. World Academy of Science, Engineering and Technology, 7(8), 904–12. Antonino, P., Duszynski, S., Jung, C. and Rudolph, M. (2010). Indicator-based architecture-level security evaluation in a service-oriented environment. In: The Fourth European Conference on Software Architecture: Copenhagen, Denmark, 23–26/08/2010. DOI: 10.1145/1842752.1842795. Chaturvedi, M., Gupta, M. and Bhattacharya, J. (2008). Cyber Security Infrastructure in India: A Study, Emerging Technologies in E-Government. Available at: http://www.csi-sigegov.org/emerging_pdf/9_70-84.pdf (Accessed on 15/11/2020). Dalol, M.H. (2018). Effectiveness of Accounting Information Systems in Light of Development of IT Infrastructure and Information Security. Master’s Dissertation, The Islamic University of Gaza, Gaza, Palestine. Dooley, K. (2001). Designing Large Scale LANs: Help for Network Designers. USA: O'Reilly Media. Ebad, S. (2018a) An exploratory study of ICT projects failure in emerging markets. Journal of Global Information Technology Management, 21(2), 139–60. DOI: 10.1080/1097198X.2018.1462071. Ebad, S. (2018b). The influencing causes of software unavailability: A case study from industry. Software Practice and Experience, 48(5), 1056–76. DOI: 10.1002/spe.2569. Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), n/a. DOI: 10.1186/1869-0238-4-5. Kirby, L. (2015). Beyond Cyber Security: Protecting Your IT Infrastructure. Available at https://uptimeinstitute.com/images/Documents/ProtectingYourITInfrastructure.pdf (accessed on 15/11/2020). Lethbridge, T.C., Sim, S.E. and Singer, J. (2005). Studying software engineers: Data collection techniques for software field studies. Empirical Software Engineering, 10(3), 311–41. Marrone, M. and Kolbe, L.M. (2011). Impact of IT service management frameworks on the IT organization. Business and Information Systems Engineering, 3(1), 5–18. Mastelic, T. and Brandic, I. (2013). TimeCap: Methodology for comparing IT infrastructures based on time and capacity metrics. In: The IEEE 6th International Conference on Cloud Computing, 131–8, Santa Clara, CA, USA, 28/06–03/07/2013. Mimura, M. and Suga, Y. (2019). Filtering malicious JavaScript code with Doc2Vec on an imbalanced dataset. In: The 14th Asia Joint Conference on Information Security (AsiaJCIS), Kobe, Japan, 24–31/08/2019. Pearlson, K.E., Saunders, C.S. and Galletta, D.F. (2019). Managing and Using Information Systems. 5th edition, USA: Wiley. Popp, K. and Meyer, R. (2011). Profit from Software Ecosystems Models, Ecosystems and Partnerships in the Software Industry. Norderstedt, Germany: Books on Demand. Priem, R. (2020). Distributed ledger technology for securities clearing and settlement: Benefits, risks, and regulatory implications. Financial Innovation, 6(11), n/a. DOI: 10.1186/s40854-019-0169-6. Rabii, L. and Abdelaziz, D. (2015). Comparison of e-readiness composite indicators, The 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakech, Morocco, 14–16/12/2015. Sanchez-Nielsen, E., Padron-Ferrer, A. and Marreo-Estevez, F. (2011). A multi-agent system for incident management solutions on IT infrastructures. In: The 14th Conference of the Spanish Association for Artificial Intelligence (CAEPIA 2011), La Laguna, Spain, 07–11/11/2011. Schoenfisch, J, Meilicke, C., Stülpnagel, J.V. and Ortmann, J (2018). Root cause analysis in IT infrastructures using ontologies and abduction in Markov logic networks. Information Systems, 74(2), 103–16. Shang, S. and Seddon, P.B. (2000). A comprehensive framework for classifying the benefits of ERP systems. In: The 2000 American Conference of Information Systems, Long Beach, California, 10–13/08/2000. Shoffner, M., Owen, P., Mostafa, J., Lamm, B., Wang, X., Schmitt, C.P. and Ahalt S.C. (2013). The secure medical research workspace: An IT infrastructure to enable secure research on clinical data. Clinical and Translational Science, 6 (3), 222–5. Shrivastava, A.K. (2015). The impact assessment of IT Infrastructure on information security: a survey report. In: International Conference on Information Security and Privacy (ICISP2015), Nagpur, India, 11–12/12/2015. Sommerville, I. (2015). Software Engineering. 10th edition, UK: Pearson. Sousa, K.J. and Oz, E. (2015). Management Information Systems. 7th edition, USA: Cengage Learning. Teymourlouei, H., and Harris, V. (2019). Effective methods to monitor IT infrastructure security for small business. In: The 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 5–7/12/2019. Topper, J. (2018). Compliance is not security. Computer Fraud and Security, 2018(3), 5–8. DOI: 10.1016/S1361-3723(18)30022-8. Wohlin, C., Runeson, P., Host, M., Ohlsson, M.C., Regnell, B. and Wesslen, A. (2012). Experimentation in Software Engineering. Germany: Springer. Yasasin, E., Prester, J., Wagner, G. and Schryen, G. (2020). Forecasting IT security vulnerabilities –an empirical analysis. Computers and Security, 88(n/a), n/a. DOI: 10.1016/j.cose.2019.101610. Zambon, E., Etalle, S., Wieringa, R.J. and Hartel, P. (2010). Model-based qualitative risk assessment for availability of IT infrastructures. Software and Systems Modeling, 10(4), 553–80." Basic and Applied Sciences - Scientific Journal of King Faisal University 22, no. 1 (2021). http://dx.doi.org/10.37575/b/med/0038.

Full text
Abstract:
Few epidemiological studies have discussed the gender-specific prevalence of ischemic heart disease (IHD). We aimed to investigate the gender-specific prevalence of IHD among Saudi patients visiting the emergency department and if it is affected by diabetes mellitus and/or hypertension. Three hundred patients were recruited from Prince Sultan Cardiac Center in Al Ahsa, KSA. Hypertension was identified as systolic pressure equal to or more than 140 mmHg and/or diastolic pressure equal to or more than 90 mmHg or by the patient currently being on antihypertensive medication, and coronary artery d
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Business-books=2017-10-08"

1

Kim, W. Chan. Blue ocean shift: Beyond competing : proven steps to inspire confidence and seize new growth. 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gates, Bill. Hit Refresh: The Quest to Rediscover Microsoft's Soul and Imagine a Better Future for Everyone. Harper Business, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hit refresh: The quest to rediscover Microsoft's soul and imagine a better future for everyone. Harper Business, an imprint of HarperCollinsPublishers, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hit Refresh. Harper Business, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nadella, Satya. Hit Refresh: A Memoir by Microsoft's CEO. HarperCollins Publishers Limited, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shaw, Greg, Satya Nadella, and Jill Tracie Nichols. Hit Refresh: Wie Microsoft sich neu erfunden hat und die Zukunft verändert. Plassen Verlag, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shaw, Greg, Bill Gates, Satya Nadella, and Jill Tracie Nichols. Hit Refresh: The Quest to Rediscover Microsoft's Soul and Imagine a Better Future for Everyone. HarperCollins Publishers, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nadella, Satya. Hit Refresh: The Quest to Rediscover Microsoft's Soul and Imagine a Better Future for Everyone. HarperCollins Publishers and Blackstone Audio, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nadella, Satya. Hit Refresh: The Quest to Rediscover Microsoft's Soul and Imagine a Better Future for Everyone. HarperCollins Publishers and Blackstone Audio, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hit Refresh: The Quest to Rediscover Microsoft's Soul and Imagine a Better Future for Everyone. HARPER COLLINS, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!