Heritage branding orientation: The case of Ach. Brito and the dynamics between corporate and product heritage brands [PDF]
The notion of heritage branding orientation is introduced and explicated. Heritage branding orientation is designated as embracing both product and corporate brands and differs from corporate heritage brand orientation which has an explicit corporate ...
A Bargenda+67 more
core +2 more sources
Encoding Power Traces as Images for Efficient Side-Channel Analysis [PDF]
Side-Channel Attacks (SCAs) are a powerful method to attack implementations of cryptographic algorithms. State-of-the-art techniques such as template attacks and stochastic models usually require a lot of manual preprocessing and feature extraction by the attacker.
arxiv
Spread of decisions in the corporate board network [PDF]
Boards of large corporations sharing some of their directors are connected in complex networks. Boards are responsible for corporations' long-term strategy and are often involved in decisions about a common topic related to the belief in economical growth or recession.
arxiv
An Overview of Computer Supported Query Formulation [PDF]
Most present day organisations make use of some automated information system. This usually means that a large body of vital corporate information is stored in these information systems. As a result, an essential function of information systems should be the support of disclosure of this information.
arxiv
Narrative environments: how do they matter? [PDF]
The significance and possible senses of the phrase 'narrative environment' are explored. It is argued that 'narrative environment' is not only polysemous but also paradoxical; not only representational but also performative; and not just performatively ...
Parsons, Allan
core
The golden circle: A way of arguing and acting about technology in the London ambulance service [PDF]
This paper analyses the way in which the London Ambulance Service recovered from the events of October 1992, when it implemented a computer-aided despatch system (LASCAD) that remained in service for less than two weeks.
A Giddens+37 more
core +2 more sources
Distributed-Ledger-based Authentication with Decentralized Identifiers and Verifiable Credentials [PDF]
Authentication with username and password is becoming an inconvenient process for the user. End users typically have little control over their personal privacy, and data breaches effecting millions of users have already happened several times. We have implemented a proof of concept decentralized OpenID Connect Provider by marrying it with Self ...
arxiv
Evaluation of Embedding Models for Automatic Extraction and Classification of Acknowledged Entities in Scientific Documents [PDF]
Acknowledgments in scientific papers may give an insight into aspects of the scientific community, such as reward systems, collaboration patterns, and hidden research trends. The aim of the paper is to evaluate the performance of different embedding models for the task of automatic extraction and classification of acknowledged entities from the ...
arxiv
Beyond and beneath the hierarchical market economy: global production and working-class conflict in Argentina's automobile industry [PDF]
This paper argues that the hierarchical market economy (HME) category does not provide an adequate starting point for addressing capitalist diversity in Latin America.
Boschi R+14 more
core +1 more source
Latent Dirichlet Allocation with Residual Convolutional Neural Network Applied in Evaluating Credibility of Chinese Listed Companies [PDF]
This project demonstrated a methodology to estimating cooperate credibility with a Natural Language Processing approach. As cooperate transparency impacts both the credibility and possible future earnings of the firm, it is an important factor to be considered by banks and investors on risk assessments of listed firms.
arxiv