To see the other types of publications on this topic, follow the link: Business protocol.

Journal articles on the topic 'Business protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Business protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Seguel, Ricardo, Rik Eshuis, and Paul Grefen. "Architecture Support for Flexible Business Chain Integration Using Protocol Adaptors." International Journal of Cooperative Information Systems 23, no. 04 (December 2014): 1450008. http://dx.doi.org/10.1142/s0218843014500087.

Full text
Abstract:
Business chains increasingly rely on the dynamic integration of business processes of different partners. The interaction constraints that result from the business processes are captured in business protocols. Since the business protocols of each partner support its own way of working, the business protocols can easily mismatch, which hinders organizations from forming a business chain. Such mismatches can be resolved by protocol adaptors. In this paper, we show how protocol adaptors can be used to enable the flexible formation of business chains. For different types of business chains, we pre
APA, Harvard, Vancouver, ISO, and other styles
2

Fernández y Vázquez, Jorge Jesús. "Introducción al protocolo turístico-hotelero //Introduction to protocol Tourist & Hospitality." REVISTA ESTUDIOS INSTITUCIONALES 2, no. 3 (December 1, 2015): 201. http://dx.doi.org/10.5944/eeii.vol.2.n.3.2015.18370.

Full text
Abstract:
El Protocolo Turístico y Hotelero una visión desde la perspectiva intercultural. Del Profesional del Turismo y Hotelería que ofrece los servicios del sector y del Profesional de Protocolo que necesita de los servicios del Sector Turístico.Un Protocolo que tiene conexión con el Protocolo de Empresa.¿Por qué el Protocolo en el sector Turístico? Por 5 razones importantes, y más especialmente en el Sector Hotelero El Protocolo en la empresa turística se establece desde 3 componentes.The Tourism and Hospitality Protocol a view from an intercultural perspective. Professional Tourism and Hospitality
APA, Harvard, Vancouver, ISO, and other styles
3

Ott, Hermann E. "The Kyoto Protocol: Unfinished Business." Environment: Science and Policy for Sustainable Development 40, no. 6 (July 1998): 16–20. http://dx.doi.org/10.1080/00139159809604595.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dan, A., D. M. Dias, R. Kearney, T. C. Lau, T. N. Nguyen, F. N. Parr, M. W. Sachs, and H. H. Shaikh. "Business-to-business integration with tpaML and a business-to-business protocol framework." IBM Systems Journal 40, no. 1 (2001): 68–90. http://dx.doi.org/10.1147/sj.401.0068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Botero, Isabel C., Gonzalo Gomez Betancourt, Jose Bernardo Betancourt Ramirez, and Maria Piedad Lopez Vergara. "Family protocols as governance tools." Journal of Family Business Management 5, no. 2 (October 12, 2015): 218–37. http://dx.doi.org/10.1108/jfbm-01-2015-0001.

Full text
Abstract:
Purpose – The purpose of this paper is to focus on the family protocol as a governance policy tool that can help ameliorate intra-family conflict and enhance the probabilities of survivability of the family business. Design/methodology/approach – Using equity theory and organizational justice as theoretical frameworks, the authors explain how and why the development of a protocol can help the family firm and their survivability. The authors combine academic and practitioner knowledge to present a process model for creating family protocols. Findings – Based on four important considerations (i.
APA, Harvard, Vancouver, ISO, and other styles
6

Cortes, Angélica C. "Business protocol: a public relations approach." Corporate Communications: An International Journal 5, no. 3 (September 2000): 140–43. http://dx.doi.org/10.1108/13563280010377527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nourine, L., R. Ragab, and F. Toumani. "Decidability and Complexity of Web Service Business Protocol Synthesis." International Journal of Cooperative Information Systems 25, no. 03 (September 2016): 1650008. http://dx.doi.org/10.1142/s0218843016500088.

Full text
Abstract:
Automatic synthesis of web services business protocols (BPs) aims at solving algorithmically the problem of deriving a mediator that realizes a BP of a target service using a set of specifications of available services. This problem, and its variants, gave rise to a large number of fundamental research work over the last decade. However, existing works considered this problem under the restriction that the number of instances of an available service that can be involved in a composition is bounded by a constant [Formula: see text] which is fixed a priori. This paper investigates the unbounded
APA, Harvard, Vancouver, ISO, and other styles
8

Díaz Gómez, María Angustias, and Elicio Díaz Gómez. "Reflexiones sobre el Real Decreto español 171/2007, de 9 de febrero, por el que se regula la publicidad de los protocolos familiares en las sociedades familiares." Pecvnia : Revista de la Facultad de Ciencias Económicas y Empresariales, Universidad de León, no. 12 (June 1, 2011): 91. http://dx.doi.org/10.18002/pec.v0i12.617.

Full text
Abstract:
El objeto de este trabajo es analizar el Protocolo Familiar, estudiando su concepto, naturaleza jurídica y eficacia, su contenido, publicidad y desarrollo. El protocolo familiar es un instrumento jurídico que pretende organizar la relación entre la familia y la empresa, separando ambas realidades y, especialmente, trata de planificar adecuadamente la sucesión de la empresa familiar. Se trata de reflexionar sobre el Real Decreto español 171/2007, de 9 de febrero, por el que se regula la publicidad de los protocolos familiares en las Sociedades Familiares.<br /><br /><br />The
APA, Harvard, Vancouver, ISO, and other styles
9

Zhi, Huang, Xiang Qun Wang, and Wei Chen. "Application of IEEE802.1x Protocol Based on EPON System." Applied Mechanics and Materials 336-338 (July 2013): 2433–37. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2433.

Full text
Abstract:
IEEE 802.1x is a port-based network access control protocol, the one of the newest authentication protocols. With the MD5 algorithm as an example, this paper introduces the type of protocol packets and the authentication process in detail. The authentication port is apart from the business stream based on the logical port. The business stream is transmitted over the controlled port, but the authentication stream is transmitted over the uncontrolled port. Therefore, the port control and authorization for users can be carried out. In this paper, two authentication methods based on EPON system ar
APA, Harvard, Vancouver, ISO, and other styles
10

Arteaga, Rocio, and Susana Menéndez-Requejo. "Family Constitution and Business Performance: Moderating Factors." Family Business Review 30, no. 4 (September 27, 2017): 320–38. http://dx.doi.org/10.1177/0894486517732438.

Full text
Abstract:
This study analyzes the relationship between implementing a Family Constitution (Protocol) and future family business performance. We analyze a unique sample of 530 Spanish family businesses. Half of these firms received financial aid from the government to implement a Family Protocol during 2003-2013. The analysis reveals that family businesses that implemented a Family Constitution had significantly improved performance within 2 years after the implementation. The positive relationship between the implementation of a Family Constitution and future firm performance is stronger for firms that
APA, Harvard, Vancouver, ISO, and other styles
11

Ding, Xia Jun, Xiao Dan Jiang, and Yue Zhai Zheng. "The Research and Implementation of E-Commerce Secure Payment Protocol." Advanced Materials Research 267 (June 2011): 74–79. http://dx.doi.org/10.4028/www.scientific.net/amr.267.74.

Full text
Abstract:
To implement e-commerce, the key issue is to ensure that the security of system on entire business process, primarily through encryption, security, security agreement to guarantee the e-commerce network security. The security protocol mainly used Secure Sockets Layer Protocol and Secure Electronic Transaction. In this paper, after analysis two kinds of protocol and the security technology used in the protocol, put forward a small scale enterprise e-commerce transaction system design of network security protocols, which play a reference role to small and medium enterprises engaged in electronic
APA, Harvard, Vancouver, ISO, and other styles
12

Arslan, Halil. "Extensible messaging and presence protocol’s adaptation to business applications." Global Journal of Computer Sciences: Theory and Research 6, no. 1 (November 20, 2016): 10. http://dx.doi.org/10.18844/gjcs.v6i1.1210.

Full text
Abstract:
Communication protocols are used for data communication between different parties in computer networks. Research on improvement and generalization of the usage areas of these protocols keeps going. One of these protocols, Extensible Messaging and Presence Protocol (XMPP), draws the attention with the advantages of providing an open communication infrastructure for real-time transmission and usage of XML format along with packet definition, which is also available in other protocols. In this study, a new model was developed making the use of XMPP advantages. The developed model can interoperate
APA, Harvard, Vancouver, ISO, and other styles
13

Arslan, Hasan, Sinan Tuncel, and Osman Gun. "Extensible messaging and presence protocol’s adaptation to business applications." Global Journal of Computer Sciences: Theory and Research 6, no. 1 (April 12, 2016): 10. http://dx.doi.org/10.18844/gjcs.v6i1.1338.

Full text
Abstract:
Communication protocols are used for data communication between different parties in computer networks. Research on improvement and generalization of the usage areas of these protocols keeps going. One of these protocols, Extensible Messaging and Presence Protocol (XMPP), draws the attention with the advantages of providing an open communication infrastructure for real-time transmission and usage of XML format along with packet definition, which is also available in other protocols. In this study, a new model was developed making the use of XMPP advantages. The developed model can interoperate
APA, Harvard, Vancouver, ISO, and other styles
14

LLORET, JAIME, JESUS TOMAS, MIGUEL GARCIA, and RAQUEL LACUESTA. "A B2B ARCHITECTURE AND PROTOCOL FOR RESEARCHERS COOPERATION." International Journal of Cooperative Information Systems 22, no. 02 (June 2013): 1350010. http://dx.doi.org/10.1142/s021884301350010x.

Full text
Abstract:
Some works on the researchers cooperation's literature provide the key lines for building research networks and propose new protocols and standards for business to business (B2B) data exchange, but none of them explains how researchers should contact and the procedure to select the most appropriate partner of a research enterprise, institute or university. In this paper, we propose a B2B architecture and protocol between research entities, that uses ebXML protocol. The contacts for cooperation are established based on some defined parameters and an information retrieval system. We explain the
APA, Harvard, Vancouver, ISO, and other styles
15

Wang, Yi Ran. "Research of E-Business Security Based on SOAP Protocol." Advanced Materials Research 189-193 (February 2011): 4304–7. http://dx.doi.org/10.4028/www.scientific.net/amr.189-193.4304.

Full text
Abstract:
When applied in E-Business, the technology of Web Services based on SOAP protocol can promote integration of E-commerce and distributed application. But it has some potential problems of security. Through research of technology correlated SOAP, combined with E-business safety analysis, the paper designs a kind of secure E-Business application model based on SOAP protocol. It includes SOAP secure disposal and access controller, and is realized by J2EE. The model makes the SOAP messages transmit safely and solves the secure problems of E-Business. It has great significance for popularization and
APA, Harvard, Vancouver, ISO, and other styles
16

LI, Xiang, Jin-Peng HUAI, Xu-Dong LIU, Hai-Long SUN, and Xian-Yang QU. "Web Service Business Protocol Mining Based on Message Logs." Journal of Software 22, no. 7 (July 15, 2011): 1413–25. http://dx.doi.org/10.3724/sp.j.1001.2011.03820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

AlMahmoud, Abdelrahman, Maurizio Colombo, Chan Yeob Yeun, and Hassan Al Muhairi. "Secure communication protocol for real-time business process monitoring." International Journal of Internet Technology and Secured Transactions 5, no. 3 (2014): 223. http://dx.doi.org/10.1504/ijitst.2014.065183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Younas, Muhammad, Barry Eaglestone, and Kuo-Ming Chao. "A low-latency resilient protocol for e-business transactions." International Journal of Web Engineering and Technology 1, no. 3 (2004): 278. http://dx.doi.org/10.1504/ijwet.2004.005234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Tang, Lin, En Jian Bai, and Wen Qiang Wu. "A Secure Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard." Advanced Materials Research 403-408 (November 2011): 1845–48. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1845.

Full text
Abstract:
With the development of e-business market, radio frequency identification (RFID) technology is becoming more and more importance. It is often used to identify object because it can work without manual intervention. Several organizations including EPC global and ISO have been working on the standard of RFID all the time in order to promote it using low-cost tags. In particular, the EPC Class-1 Generation-2 standard was accepted as an international standard by ISO/IEC. However, this standard exists some security vulnerabilities. To resolve these vulnerabilities, some protocols conforming to EPC C
APA, Harvard, Vancouver, ISO, and other styles
20

Trinkaus, John. "Business Manners: An Informal Look." Perceptual and Motor Skills 68, no. 3 (June 1989): 945–46. http://dx.doi.org/10.2466/pms.1989.68.3.945.

Full text
Abstract:
A number of top executives feel that many of their organization's problems are rooted in a lack of proper business etiquette and protocol. Based on an informal inquiry as to the social courtesy displayed by a group of business students, this thinking may well have some merit.
APA, Harvard, Vancouver, ISO, and other styles
21

Zhang, Chao Yi, and Yan Dong Zhao. "Multi-Path Relay Selection Based on Radio and Television Business." Advanced Materials Research 756-759 (September 2013): 1883–88. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1883.

Full text
Abstract:
This paper presents a relay selection method for radio and television business, this method uses nodes time-delay and power information, obtains the value of network interrupt as decision threshold, then selects the relay node. At same time this paper proposes an optimal relay selection strategy which can minimize the network interrupt probability combination with power distributionMulti-Path Relay Routing Protocol, this protocol can change the appropriate route path according to the dynamic network. Simulation results show that this protocol can extend cells coverage area, reduce time-delay a
APA, Harvard, Vancouver, ISO, and other styles
22

Yefremova, Kateryna, and Maryna Lobko. "The art of diplomatic protocol as tool of business communication." Law and innovative society, no. 2 (15) (January 4, 2020): 35–39. http://dx.doi.org/10.37772/2309-9275-2020-2(15)-6.

Full text
Abstract:
Problem setting. At the present stage of development of international relations, more and more diplomatic negotiations are taking place and a large number of international agreements are being concluded, so for the successful and effective functioning of the state foreign policy mechanism many tools are needed, each of which sets the mechanism in motion. However, the issues of gift literacy and their conceptualization of the role as a tool of diplomatic protocol in the implementation of international contacts of bilateral and multilateral nature remain unexplored. Analysis of resent researches
APA, Harvard, Vancouver, ISO, and other styles
23

ESWARAN, P. K., S. PRAKASH, DAVID D. FERGUSON, and KATHLEEN NAASZ. "LEVERAGING IP FOR BUSINESS SUCCESS." International Journal of Information Technology & Decision Making 02, no. 04 (December 2003): 641–50. http://dx.doi.org/10.1142/s0219622003000884.

Full text
Abstract:
Businesses are faced today with the challenge of leveraging existing network infrastructures while evolving to technologies that will provide a positive impact on their business performance. Internet Protocol (IP) is a technology foundation that many companies have begun to leverage, but IP requires a more integrated strategy for seamless migration and the achievement of its full benefits. In this paper, we examine the creation of an Enterprise IP Strategy from a business impact and a technology point of view and provide factors to consider when developing this strategy. A framework considerin
APA, Harvard, Vancouver, ISO, and other styles
24

Moudjari, Abdelkader, Salim Chikhi, and Hamamache Kheddouci. "Latent semantic analysis for business protocol discovery using log files." International Journal of Web Engineering and Technology 9, no. 4 (2014): 365. http://dx.doi.org/10.1504/ijwet.2014.067550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

El Amin, M. H. M., L. N. Chung, and B. G. Evans. "Access protocol performance for on-board processing business satellite systems." International Journal of Satellite Communications 4, no. 4 (October 1986): 203–10. http://dx.doi.org/10.1002/sat.4600040406.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Oya, Makoto, Masahiro Kinoshita, and Yukinori Kakazu. "On dynamic generation of business protocol in autonomous Web services." Systems and Computers in Japan 37, no. 2 (February 2006): 37–45. http://dx.doi.org/10.1002/scj.20352.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ji, Qiang, Shifeng Zhang, and Haoguang Zhao. "Research on Spacecraft Integrated Electronic System Architecture Based on Information Fusion." MATEC Web of Conferences 228 (2018): 01018. http://dx.doi.org/10.1051/matecconf/201822801018.

Full text
Abstract:
This paper has designed the integrated electronic system and protocol architecture based on the standard of Consultative Committee for Space Data Systems (CCSDS) and European Communication Satellite System (ECSS). The application layer, application support layer, transport layer and sub network layer in the architecture can be described in detail, and the functions can be realized through the combination of various business and protocols. The architecture can provide technical support for the intellectualization and networking of spacecraft, standardize the spacecraft interface and protocol, i
APA, Harvard, Vancouver, ISO, and other styles
28

Suminski Jr, Richard Robert, Shannon Robson, Jennie Turner, and Eric Plautz. "Promoting Small Business Support of Youth Physical Activity in Low-Income, Minority Neighborhoods: Protocol for a Randomized Controlled Trial." JMIR Research Protocols 8, no. 7 (July 30, 2019): e13141. http://dx.doi.org/10.2196/13141.

Full text
Abstract:
Background An unacceptably high percentage of our nation’s low-income, minority youth (age<18 years) are not regularly physically active. One reason for this could be their lack of access to quality youth physical activity opportunities (YPAOs). Our previous research found that small businesses (<500 employees), which represent over 99.64% (27.9/28.0 million businesses in United States) of all employers, are powerful resources for creating and improving YPAOs. In accordance with the socioecological model and established philanthropic principles, we developed an alpha version of an interv
APA, Harvard, Vancouver, ISO, and other styles
29

Crawford, William B., and Christopher Engholm. "When Business East Meets Business West: The Guide to Practice and Protocol in the Pacific Rim." Journal of Marketing 57, no. 1 (January 1993): 127. http://dx.doi.org/10.2307/1252062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Elabd, Emad, Emmanuel Coquery, and Mohand-Said Hacid. "From Implicit to Explicit Transitions in Business Protocols." International Journal of Web Services Research 9, no. 4 (October 2012): 69–95. http://dx.doi.org/10.4018/jwsr.2012100104.

Full text
Abstract:
Modeling Web services is a major step towards their automated analysis. One of the important parameters in this modeling, for the majority of Web services, is the time. A Web service can be presented by its behavior which can be described by a business protocol representing the possible sequences of message exchanges. To the best of the authors’ knowledge, automated analysis of timed Web services (e.g., compatibility and replaceability checking) is very difficult and in some cases it is not possible with the presence of implicit transitions (internal transitions) based on time constraints. The
APA, Harvard, Vancouver, ISO, and other styles
31

Tareen, Laraib, Fowzia Menga, Nadeem Zaman, Manzoor Brohi, and Hadi Khan. "Business Motives among Students: A Qualitative Appraisal of Drive Theory." Jinnah Business Review 9, no. 2 (July 1, 2021): 61–74. http://dx.doi.org/10.53369/tcoq8790.

Full text
Abstract:
The main purpose of conducting this exploratory qualitative research was to determine the nature of drive theory among business students, where drive is a motivation for some behavior based on a biological need. The target population of our study was the universitylevel business students. We used the existing literature on drive theory for the development of interview protocol. After the finalization of the interview protocol, six semi-structured interviews were conducted with the business students enrolled in different programs with different fields of specialization. The data were analyzed u
APA, Harvard, Vancouver, ISO, and other styles
32

Matias, Cláudia, and Mário Franco. "Family protocol: how it shapes succession in family firms." Journal of Business Strategy 41, no. 3 (December 20, 2018): 35–44. http://dx.doi.org/10.1108/jbs-09-2018-0167.

Full text
Abstract:
Purpose This study aims to understand the role that family protocol can have in the succession planning process of family businesses. Design/methodology/approach For this purpose, the authors decided on a qualitative approach and performed an exploratory case study in Portugal: one firm with a family protocol. As data collection techniques, interviewing, direct observation and documentary analysis were used. Findings Based on the empirical evidence, it is concluded that a family protocol can help succession planning and favour the continuity and survival of the family business. Practical impli
APA, Harvard, Vancouver, ISO, and other styles
33

BICHLER, MARTIN, ARIE SEGEV, and CARRIE BEAM. "AN ELECTRONIC BROKER FOR BUSINESS-TO-BUSINESS ELECTRONIC COMMERCE ON THE INTERNET." International Journal of Cooperative Information Systems 07, no. 04 (December 1998): 315–29. http://dx.doi.org/10.1142/s0218843098000155.

Full text
Abstract:
Distributed object standards provide a key to building interoperable applications that can run on a range of platforms. The paper describes a CORBA-based research prototype for an electronic broker in business-to-business electronic commerce. High-level IDL specifications are used to achieve interoperability between components of the electronic marketplace. The two key functionalities of the electronic broker are the ability to dynamically gather information from remote electronic catalogs and the support for negotiations through auction mechanisms. The paper discusses the functionality and th
APA, Harvard, Vancouver, ISO, and other styles
34

Simanis, Erik, Stuart Hart, and Duncan Duke. "The Base of the Pyramid Protocol: Beyond “Basic Needs” Business Strategies." Innovations: Technology, Governance, Globalization 3, no. 1 (January 2008): 57–84. http://dx.doi.org/10.1162/itgg.2008.3.1.57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Tao, Xiao Xia, Hong Yang, Rong Chen, and Zhen Jun Du. "An Improvement on Randomly Changed Identification Protocol for Low-Cost Tags." Advanced Materials Research 562-564 (August 2012): 1583–89. http://dx.doi.org/10.4028/www.scientific.net/amr.562-564.1583.

Full text
Abstract:
With the benefits to improve productivity and reduce operation cost, RFID (Radio Frequency Identification) has recently seen a great increase in a wide variety of business information systems. However, the downside in business applications is the problem caused by data security and privacy. Enhancement without extra costs in RFID identification poses new challenges to privacy and security in RFID-driven just-in-time business information systems. In this paper, we propose an unilateral randomly authentication protocol on the basis of one-way hash function for low-cost RFID tags. We illustrate t
APA, Harvard, Vancouver, ISO, and other styles
36

UBERMORGEN, /. "Everything is always (the liquid protocol)." Finance and Society 2, no. 2 (December 19, 2016): 175–79. http://dx.doi.org/10.2218/finsoc.v2i2.1731.

Full text
Abstract:
UBERMORGEN are lizvlx (AT, 1973) and Hans Bernhard (CH/USA, 1971), European artists and net.art pioneers. They tenaciously convert code & language and concept & aesthetics into digital objects, software art, net.art, installation, new painting, videos, press releases and actions. CNN described them as ‘maverick Austrian business people’ and the New York Times called Google Will Eat Itself ‘simply brilliant’. Their main influences are Rammstein, Samantha Fox, Guns N’ Roses & Duran Duran, Olanzapine, LSD & Kentucky Fried Chicken’s Coconut Shrimps Deluxe. Visit their website at ht
APA, Harvard, Vancouver, ISO, and other styles
37

Abdulazeez, Adnan Mohsin, Baraa Wasfi Salim, Diyar Qader Zeebaree, and Dana Doghramachi. "Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 18 (November 10, 2020): 157. http://dx.doi.org/10.3991/ijim.v14i18.16507.

Full text
Abstract:
The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly high charge. Virtual Private Network (VPN) is commonly used in business situations to provide secure communication channels over public infrastructure such as Internet. Virtual Private Networks (VPNs) provide a secure encrypted communication between remote networks worldwide by using Internet Protocol (IP) tunnels and a shared medium like the Int
APA, Harvard, Vancouver, ISO, and other styles
38

Watters, Paul Andrew, and Maya Espinosa Walters. "Implications of Distributed Information Technology for South Pacific Development." South Pacific Journal of Psychology 9 (1997): 75–80. http://dx.doi.org/10.1017/s0257543400001188.

Full text
Abstract:
AbstractThe global digital communications network, colloquially known as the “internet”, has received much attention in recent years from business, media, cultural, and government interests. This paper looks behind the hype and sales-pitches, at the essential features of the medium which have made it (and will continue to make it) the central technology for the dissemination of information in the next century. It is a particularly important technology for remote communities, since all information resources (educational, commercial, and recreational) can be transmitted using a standard set of p
APA, Harvard, Vancouver, ISO, and other styles
39

Kabou, Salheddine, and Sidi Mohamed Benslimane. "A New Distributed Anonymization Protocol with Minimal Loss of Information." International Journal of Organizational and Collective Intelligence 7, no. 1 (January 2017): 1–19. http://dx.doi.org/10.4018/ijoci.2017010101.

Full text
Abstract:
Cloud computing represents a new business model which enables diverse benefits such as the sharing of computing resources containing personal information across multiple distributed and private databases. However, privacy and security concerns are a significant obstacle that is preventing the extensive adoption of this new technology. Anonymization is one of the solutions methods that can be used to preserve the privacy of data while still allowing the data to be used.. Most of the existing works use a k-anonymity model for preserving privacy for data subject that offers lower utility. Motivat
APA, Harvard, Vancouver, ISO, and other styles
40

Wang, Yichuan, Han Yu, Xinhong Hei, Binbin Bai, and Wenjiang Ji. "From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT." Security and Communication Networks 2021 (August 2, 2021): 1–13. http://dx.doi.org/10.1155/2021/9179286.

Full text
Abstract:
Internet of Things (IoT) is the development and extension of computer, Internet, and mobile communication network and other related technologies, and in the new era of development, it increasingly shows its important role. To play the role of the Internet of Things, it is especially important to strengthen the network communication information security system construction, which is an important foundation for the Internet of Things business relying on Internet technology. Therefore, the communication protocol between IoT devices is a point that cannot be ignored, especially in recent years; th
APA, Harvard, Vancouver, ISO, and other styles
41

Ocenasek, Pavel. "Effective Design and Implementation of Distributed Business Information Systems." Applied Mechanics and Materials 307 (February 2013): 451–54. http://dx.doi.org/10.4028/www.scientific.net/amm.307.451.

Full text
Abstract:
This paper deals with the effective design and implementation aspects of distributed business information systems. After a short introduction to the state of the art, it proposes a study on a payment protocol design, which is based on the composition method.
APA, Harvard, Vancouver, ISO, and other styles
42

Jägers, Nicola. "National Human Rights Institutions: The Missing Link in Business and Human Rights Governance?" ICL Journal 14, no. 3 (November 25, 2020): 289–325. http://dx.doi.org/10.1515/icl-2020-0006.

Full text
Abstract:
AbstractIn 2014, the United Nations established a working group to elaborate an international treaty on business and human rights. In October 2018, negotiations on a first draft of the actually text took place. Besides this zero-draft, the working group released the draft text of an Optional Protocol containing several institutional arrangements. The Optional Protocol carves out a key role for national implementation mechanisms to promote compliance with, monitor and implement the treaty on business and human rights. With such an institutional arrangement, the future treaty would join the rank
APA, Harvard, Vancouver, ISO, and other styles
43

Ahmed, Ajaz, and Aneel Salman. "Clean Development Mechanism (CDM) Business in Pakistan: Perceptions and Realities." Pakistan Development Review 51, no. 4II (December 1, 2012): 303–16. http://dx.doi.org/10.30541/v51i4iipp.303-316.

Full text
Abstract:
Climate change is the biggest challenge human family has ever faced in world history. It has local as well as global impacts and almost all the ethnic groups, communities, and geographical locations are exposed to it [Stern (2006)]. But comparatively developing countries are more exposed to the changes which are taking places due to climate [Stern (2006) and Barker (2008)]. The degree of their exposure which has a number of determinants varies across different regions [Karen, et al. (2004)]. Climate experts so far have proposed two broader solutions for this problem; mitigation of climate chan
APA, Harvard, Vancouver, ISO, and other styles
44

Shin, Sora, Hae-Hyun Choi, Yung Bin Kim, Byung-Hee Hong, and Joo-Young Lee. "Evaluation of body heating protocols with graphene heated clothing in a cold environment." International Journal of Clothing Science and Technology 29, no. 6 (November 6, 2017): 830–44. http://dx.doi.org/10.1108/ijcst-03-2017-0026.

Full text
Abstract:
Purpose The purpose of this paper is to evaluate the effects of intermittent and continuous heating protocols using graphene-heated clothing and identify more effective body region for heating in a cold environment. Design/methodology/approach Eight males participated in five experimental conditions at an air temperature of 0.6°C with 40 percent relative humidity: no heating, continuous heating the chest, continuous heating the back, intermittent heating the chest, and intermittent heating the back. Findings The results showed that the electric power consumption of the intermittent heating pro
APA, Harvard, Vancouver, ISO, and other styles
45

Hunter, M. Gordon. "Creating Qualitative Interview Protocols." International Journal of Sociotechnology and Knowledge Development 4, no. 3 (July 2012): 1–16. http://dx.doi.org/10.4018/jskd.2012070101.

Full text
Abstract:
This manuscript describes a technique which facilitates the documentation of research participant stories interpreting their experiences in response to a research question. From a Narrative Inquiry approach interview protocols were developed based upon the exploration of a research question. The technique may be applied when gathering qualitative data in one-on-one interviews. Each interview protocol provided consistency across a number of interviews; but also allowed for flexibility of responses by the research participant within their respective interviews. This document provides a descripti
APA, Harvard, Vancouver, ISO, and other styles
46

Atienza, Mabelle A., and Almighty C. Tabuena. "The Impact of COVID-19 Pandemic on Managerial Accounting and Its Adjustments in Financial Markets." International Journal of Business, Technology and Organizational Behavior (IJBTOB) 1, no. 4 (August 12, 2021): 287–96. http://dx.doi.org/10.52218/ijbtob.v1i4.109.

Full text
Abstract:
This study aimed to identify the impact of the COVID-19 pandemic on managerial accounting and its adjustments in financial markets to help business society deal with their businesses and companies during the pandemic. This study was conducted in one of the cities in the Metropolitan Manila in Quezon City, Philippines, employing the descriptive design under the qualitative research method through an interview protocol and online form methods with accountants, managers, and business owners using Fiedler’s Contingency Theory. This research initiative is a great help for those who are suffering in
APA, Harvard, Vancouver, ISO, and other styles
47

Zinkhan, George M., and William B. Crawford. "Book Review: When Business East Meets Business West: The Guide to Practice and Protocol in the Pacific Rim." Journal of Marketing 57, no. 1 (January 1993): 127–28. http://dx.doi.org/10.1177/002224299305700109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Levä, Tapio, Mahya Ilaghi, Vilen Looga, Miika Komu, Nicklas Beijar, and Oleksiy Mazhelis. "Adoption of Constrained Application Protocol." International Journal of Innovation in the Digital Economy 7, no. 1 (January 2016): 38–53. http://dx.doi.org/10.4018/ijide.2016010104.

Full text
Abstract:
Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. The
APA, Harvard, Vancouver, ISO, and other styles
49

Martin, Angela H., George Eckert, Gary W. Lemmon, Alan Sawchuk, and Michael C. Dalsing. "A vascular laboratory protocol for improving and managing after-hours suspected acute deep venous thrombosis." Vascular 22, no. 2 (May 13, 2013): 127–33. http://dx.doi.org/10.1177/1708538112474258.

Full text
Abstract:
This study reviews the clinical and workforce impact of a suggested protocol designed for the management of suspected acute deep venous thrombosis (DVT) in patients seen after standard vascular laboratory business hours. The protocol included the use of Wells score, D-dimer and a single dose of therapeutic anticoagulant to defer venous duplex ultrasound (VDU) testing until routine business hours unless contraindicated. Information was collected on medical history, physical exam and the timing of any diagnostic studies and treatment provided. Over 15% of studies done after-hours were deemed unn
APA, Harvard, Vancouver, ISO, and other styles
50

Wu, Min, Ru Chuan Wang, Jing Li, and Zhi Jie Han. "A Novel P2P Business Traffic Prediction Algorithm." Key Engineering Materials 467-469 (February 2011): 1339–44. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.1339.

Full text
Abstract:
The increasing P2P network traffic on the Internet has leaded to the problem of network congestion. In the consequence of the diversification of the P2P business and protocol, research on the management of P2P traffic has many problems to resolve. Prediction of the P2P traffic is the kernel problem in the P2P traffic management. Based on the existed P2P traffic characters, this paper structures a P2P traffic model, gives a traffic prediction algorithm bases on wavelet-analysis, and proves the accuracy of the algorithm. Simulation experiment figures that the algorithm has a high prediction prec
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!