Results 31 to 40 of about 43,078,898 (347)

Analysis of The Essential Motivation and Challenge Factors of the Buy Now, Pay Later Service Among Indonesian University Students [PDF]

open access: yesE3S Web of Conferences
New data proves that university students in Indonesia, especially this Gen Z, are increasingly turning to BNPL services. Employment in the BNPL model results from unsupervised spending that significantly affects Generation Z, no previous studies on the ...
Adiprasetyo Albert, Surjandy
doaj   +1 more source

Assessing individual risk and the latent transmission of COVID-19 in a population with an interaction-driven temporal model

open access: yesScientific Reports, 2023
Interaction-driven modeling of diseases over real-world contact data has been shown to promote the understanding of the spread of diseases in communities.
Yanir Marmor   +3 more
doaj   +1 more source

Information requirements for enterprise systems [PDF]

open access: yes, 2012
In this paper, we discuss an approach to system requirements engineering, which is based on using models of the responsibilities assigned to agents in a multi-agency system of systems.
A. Dardenne   +8 more
core   +2 more sources

A bibliometric analysis of self-ordering systems research using vosviewer [PDF]

open access: yesE3S Web of Conferences
In this era of society, various sectors, including the food and beverage industry, are keen on integrating technological systems into their operational workflows to help the growth of the business itself.
Weny Aily Kho   +4 more
doaj   +1 more source

Information systems in the age of pandemics: COVID-19 and beyond

open access: yesEuropean Journal of Information Systems, 2020
This issue of the European Journal of Information Systems (EJIS) is a special issue on Business Process Management and Digital Innovation.
Pär J. Ågerfalk   +2 more
semanticscholar   +1 more source

The LSE identity project. House of Lords : All party briefing : "Nothing to hide, nothing to fear” [PDF]

open access: yes, 2006
The original amendment on cost information, put forward in the House of Lords, sought to address a widely held concern about the government’s unwillingness to be open about the likely costs associated with implementing the identity cards scheme.
Department of Information Systems, LSE
core  

European Standard Clinical Practice Guideline and EXPeRT Recommendations for the Diagnosis and Management of Gastroenteropancreatic Neuroendocrine Neoplasms in Children and Adolescents

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Pediatric gastroenteropancreatic neuroendocrine neoplasms (GEP‐NENs) are extremely rare and clinically heterogeneous. Management has largely been extrapolated from adult practice. This European Standard Clinical Practice Guideline (ESCP), developed by the EXPeRT network in collaboration with adult NEN experts, provides (adult) evidence ...
Michaela Kuhlen   +23 more
wiley   +1 more source

Security and Privacy Controls for Information Systems and Organizations

open access: yes, 2020
52 This publication provides a catalog of security and privacy controls for federal information 53 systems and organizations to protect organizational operations and assets, individuals, other 54 organizations, and the Nation from a diverse set of ...
Joint Task Force
semanticscholar   +1 more source

Why and When Are Evidence‐Based Interventions Adopted in Paediatric Supportive Care? A Qualitative Exploration of the Determinants of Photobiomodulation Implementation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie   +4 more
wiley   +1 more source

The consistency analysis of failure mode and effect analysis (FMEA) in information technology risk assessment

open access: yesHeliyon, 2020
FMEA is as a method for assessing IT risks. This research aimed to examine the consistency of both traditional FMEA and improved FMEA in IT risk assessment. Improved FMEA is the result of a synthesis framework to minimize consistency in traditional FMEA.
Apol Pribadi Subriadi   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy