|
|
|
Azli Abdul Aziz
Due to the increasing cost of higher education continues to grow from year to year and the numbers of students in Malaysia are eligible to enter the public universities and private colleges increasingly favorable. The Malaysian government is always alert...
ver más
|
|
|
|
|
|
|
Martin Wynn and Christian Weber
The development and implementation of information systems strategy in multi-national corporations (MNCs) faces particular challenges?cultural differences and variations in work values and practices across different countries, numerous technology landscap...
ver más
|
|
|
|
|
|
|
Alexios Lekidis, Angelos Georgakis, Christos Dalamagkas and Elpiniki I. Papageorgiou
The scheduled maintenance of industrial equipment is usually performed with a low frequency, as it usually leads to unpredicted downtime in business operations. Nevertheless, this confers a risk of failure in individual modules of the equipment, which ma...
ver más
|
|
|
|
|
|
|
Ioana Branescu, Octavian Grigorescu and Mihai Dascalu
Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a devastating effect on the entire system. Given the increasingly massive number of threats and the size of...
ver más
|
|
|
|
|
|
|
Ali Mahmoud Alrabei
The purpose of this research is to examine the impact of green electronic auditing on accounting information reliability and the mediating role of cloud computing in the Jordanian Social Security Corporation. A survey of 500 employees in the Jordanian So...
ver más
|
|
|
|
|
|
|
Shouq Alrobaian, Saif Alshahrani and Abdulaziz Almaleh
People are the weakest link in the cybersecurity chain when viewed in the context of technological advancement. People become vulnerable to trickery through contemporary technical developments such as social media platforms. Information accessibility and...
ver más
|
|
|
|
|
|
|
Sergey Ananyev and Andrei Kukushkin
The research was carried out within the framework of the federal project Development of technologies for controlled fusion and innovative plasma technologies of the comprehensive program of the State Corporation Rosatom, Development of equipment, technol...
ver más
|
|
|
|
|
|
|
Yuefei Sun, Xianbo Sun, Tao Hu and Li Zhu
Despite the widespread use of artificial intelligence-based methods in detecting electricity theft by smart grid customers, current methods suffer from two main flaws: a limited amount of data on electricity theft customers compared to that on normal cus...
ver más
|
|
|
|
|
|
|
Martin Wynn and Jose Irizar
This article examines how digital twins have been used in a multi-national corporation, what technologies have been used, what benefits have been delivered, and the significance of people- and process-related issues in achieving successful implementation...
ver más
|
|
|
|
|
|
|
Bintang Noor Prabowo, Alenka Temeljotov Salaj and Jardar Lohne
Whether public sectors or private institutions, in-house or outsourced, building-level or urban-scale, the critical role of facility management (FM) is to support the core business activities of an organization in accomplishing its objectives. Through th...
ver más
|
|
|
|