Results 91 to 100 of about 27,643,949 (408)

Understanding Management Accounting Changes in a Family-Owned Company: A Greek Case Study [PDF]

open access: yes, 2010
This study seeks to understand the changes to management accounting controls in a large Greek company in the context of the rapidly changing socio-economic environment. The paper investigates the case of FA (here anonymised), a Greek dairy company, as it
Ashraf, J, Konstantinidis, S, Uddin, S
core  

Possibilistic Information Flow Control for Workflow Management Systems

open access: yes, 2014
In workflows and business processes, there are often security requirements on both the data, i.e. confidentiality and integrity, and the process, e.g. separation of duty.
Bauereiss, Thomas, Hutter, Dieter
core   +2 more sources

Cellular liquid biopsy provides unique chances for disease monitoring, preclinical model generation and therapy adjustment in rare salivary gland cancer patients

open access: yesMolecular Oncology, EarlyView.
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić   +31 more
wiley   +1 more source

Holistic Cyber-Physical Management for Dependable Wireless Control Systems [PDF]

open access: yesarXiv, 2017
Wireless sensor-actuator networks (WSANs) are gaining momentum in industrial process automation as a communication infrastructure for lowering deployment and maintenance costs. In traditional wireless control systems the plant controller and the network manager operate in isolation, which ignore the significant influence of network reliability on plant
arxiv  

Cyber Risk Assessment for Capital Management [PDF]

open access: yesarXiv, 2022
This paper introduces a two-pillar cyber risk management framework to address the pervasive challenges in managing cyber risk. The first pillar, cyber risk assessment, combines insurance frequency-severity models with cybersecurity cascade models to capture the unique nature of cyber risk.
arxiv  

Power Systems Monitoring and Control using Telecom Network Management Standards [PDF]

open access: yes, 2005
Historically, different solutions have been developed for power systems control and telecommunications network management environments. The former was characterized by proprietary solutions, while the latter has been involved for years in a strong ...
Díaz Ruiz, Sergio   +3 more
core  

A modern day panopticon: using power and control theory to manage volunteer tourists in Bolivia [PDF]

open access: yes, 2017
Volunteer tourism literature is yet to examine the impact of power and control practices on volunteer tourist compliancy. This paper contributes to closing this research gap by proposing and testing a new theoretical model of power and control practices.
Curran, Ross   +2 more
core   +3 more sources

MANAGEMENT CONTROL SYST: THE NATURE OF MANAGEMENT CONTROL SYSTEMS

open access: yes, 2023
Catatan terkait dengan subjek Sistem Pengendalian Manajemen (Management Control System) mengenai The Nature of Management Control ...
openaire   +1 more source

Circulating tumor DNA (ctDNA) trajectories predict survival in trifluridine/tipiracil‐treated metastatic colorectal cancer patients

open access: yesMolecular Oncology, EarlyView.
The authors applied joint/mixed models that predict mortality of trifluridine/tipiracil‐treated metastatic colorectal cancer patients based on circulating tumor DNA (ctDNA) trajectories. Patients at high risk of death could be spared aggressive therapy with the prospect of a higher quality of life in their remaining lifetime, whereas patients with a ...
Matthias Unseld   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy