Results 81 to 90 of about 5,088 (260)
Consequences for Culpable Auditors
ABSTRACT We present the first comprehensive descriptive evidence on the labor market and personal consequences for audit professionals in the United States who are named in SEC or PCAOB enforcement actions. Three key findings emerge. First, between 38% and 73% of culpable auditors depart from their firms within one year after the enforcement event ...
Jagan Krishnan+3 more
wiley +1 more source
Meta‐Virtuality: Strategies of Disembeddedness in Virtual Interiorities
ABSTRACT To reclaim their seat in the rapidly growing market of virtual space, designers of the built environment can benefit from reevaluating theories that see the virtual as a mere extension/reflection of the physical. By claiming ontological autonomy from external worlds, the virtual is liberated from the hegemonic control of the physical.
Vahid Vahdat
wiley +1 more source
Performance evaluation of deceptive and noise jamming on SAR focused image [PDF]
Mohamed Hanafy+3 more
openalex +1 more source
Advancing Stepped-Waveform Radar Jamming Techniques for Robust False-Target Generation against LFM-CFAR Systems. [PDF]
Wang Y, Wang C, Shi Q, Huang J, Yuan N.
europepmc +1 more source
Eleanor Coade and Horace Walpole's Gothic Gateway: A Study in Eighteenth‐Century Business Practice
Abstract Artificial stone manufacturer Eleanor Coade (1733–1821) was the outstanding female entrepreneur of the eighteenth century, running her own successful business for some fifty years. Her name became a nationally recognized brand, and her firm's architectural and sculptural stoneware products are still ubiquitous.
Caroline Stanford
wiley +1 more source
Reactive Synthesis of Sensor Revealing Strategies in Hypergames on Graphs [PDF]
In many security applications of cyber-physical systems, a system designer must guarantee that critical missions are satisfied against attacks in the sensors and actuators of the CPS. Traditional security design of CPSs often assume that attackers have complete knowledge of the system.
arxiv
Multi-Agent Modeling and Jamming-Aware Routing Protocols for Movable-Jammer-Affected WSNs. [PDF]
Xu B, Lu M, Zhang H.
europepmc +1 more source
This study examines how firms’ adoption of corporate social responsibility frameworks (CSRFs) that follow different user orientation approaches affects information asymmetry in capital markets. We draw on novel hand‐collected adoption data from seven established CSRFs for a sample of STOXX Europe 600 firms from 2017–2020. Our findings reveal that CSRFs
Andreas Altendorfer+2 more
wiley +1 more source
Two-dimensional deceptive jamming mitigation algorithm for SAR imaging using frequency diverse array [PDF]
Chenchen Lin+3 more
openalex +1 more source