Segui questo link per vedere altri tipi di pubblicazioni sul tema: Business protocol.

Articoli di riviste sul tema "Business protocol"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Business protocol".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Seguel, Ricardo, Rik Eshuis e Paul Grefen. "Architecture Support for Flexible Business Chain Integration Using Protocol Adaptors". International Journal of Cooperative Information Systems 23, n. 04 (dicembre 2014): 1450008. http://dx.doi.org/10.1142/s0218843014500087.

Testo completo
Abstract (sommario):
Business chains increasingly rely on the dynamic integration of business processes of different partners. The interaction constraints that result from the business processes are captured in business protocols. Since the business protocols of each partner support its own way of working, the business protocols can easily mismatch, which hinders organizations from forming a business chain. Such mismatches can be resolved by protocol adaptors. In this paper, we show how protocol adaptors can be used to enable the flexible formation of business chains. For different types of business chains, we present formation cases that describe which partners are responsible for the construction and operation of protocol adaptors. Next, we present for each formation case an accompanying concrete software architecture that realizes the case. The presented software architectures support the flexible formation of business chains and use protocol adaptation as a key component. We show the feasibility of the approach by discussing a prototype implementation, which we apply to a case study from the healthcare domain.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Fernández y Vázquez, Jorge Jesús. "Introducción al protocolo turístico-hotelero //Introduction to protocol Tourist & Hospitality". REVISTA ESTUDIOS INSTITUCIONALES 2, n. 3 (1 dicembre 2015): 201. http://dx.doi.org/10.5944/eeii.vol.2.n.3.2015.18370.

Testo completo
Abstract (sommario):
El Protocolo Turístico y Hotelero una visión desde la perspectiva intercultural. Del Profesional del Turismo y Hotelería que ofrece los servicios del sector y del Profesional de Protocolo que necesita de los servicios del Sector Turístico.Un Protocolo que tiene conexión con el Protocolo de Empresa.¿Por qué el Protocolo en el sector Turístico? Por 5 razones importantes, y más especialmente en el Sector Hotelero El Protocolo en la empresa turística se establece desde 3 componentes.The Tourism and Hospitality Protocol a view from an intercultural perspective. Professional Tourism and Hospitality offering services sector and Professional Protocol need the services of the Tourism Sector.A protocol that has connection with the Business Protocol. Why the Protocol on Tourism sector? For 5 important reasons, and especially in the Hospitality Industry. The Protocol on the tourist business is set for 3 components.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Ott, Hermann E. "The Kyoto Protocol: Unfinished Business". Environment: Science and Policy for Sustainable Development 40, n. 6 (luglio 1998): 16–20. http://dx.doi.org/10.1080/00139159809604595.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Dan, A., D. M. Dias, R. Kearney, T. C. Lau, T. N. Nguyen, F. N. Parr, M. W. Sachs e H. H. Shaikh. "Business-to-business integration with tpaML and a business-to-business protocol framework". IBM Systems Journal 40, n. 1 (2001): 68–90. http://dx.doi.org/10.1147/sj.401.0068.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Botero, Isabel C., Gonzalo Gomez Betancourt, Jose Bernardo Betancourt Ramirez e Maria Piedad Lopez Vergara. "Family protocols as governance tools". Journal of Family Business Management 5, n. 2 (12 ottobre 2015): 218–37. http://dx.doi.org/10.1108/jfbm-01-2015-0001.

Testo completo
Abstract (sommario):
Purpose – The purpose of this paper is to focus on the family protocol as a governance policy tool that can help ameliorate intra-family conflict and enhance the probabilities of survivability of the family business. Design/methodology/approach – Using equity theory and organizational justice as theoretical frameworks, the authors explain how and why the development of a protocol can help the family firm and their survivability. The authors combine academic and practitioner knowledge to present a process model for creating family protocols. Findings – Based on four important considerations (i.e. process view, deep knowledge about the family business, dynamic environment, and the need for change and adaptation) the authors develop a process model for the development of family tailored protocols. Originality/value – This paper integrates the work of practitioners and academics to help understand what is a family protocol, why and how the protocol affects the family and business relationships and presents a procedural model for the development of a family protocol that can help govern the relationship between the family and the business.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Cortes, Angélica C. "Business protocol: a public relations approach". Corporate Communications: An International Journal 5, n. 3 (settembre 2000): 140–43. http://dx.doi.org/10.1108/13563280010377527.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Nourine, L., R. Ragab e F. Toumani. "Decidability and Complexity of Web Service Business Protocol Synthesis". International Journal of Cooperative Information Systems 25, n. 03 (settembre 2016): 1650008. http://dx.doi.org/10.1142/s0218843016500088.

Testo completo
Abstract (sommario):
Automatic synthesis of web services business protocols (BPs) aims at solving algorithmically the problem of deriving a mediator that realizes a BP of a target service using a set of specifications of available services. This problem, and its variants, gave rise to a large number of fundamental research work over the last decade. However, existing works considered this problem under the restriction that the number of instances of an available service that can be involved in a composition is bounded by a constant [Formula: see text] which is fixed a priori. This paper investigates the unbounded variant of this problem using a formal framework in which web service BPs are described by means of finite state machines (FSM). We show that in this context, the protocol synthesis problem can be reduced to that of testing simulation preorder between an FSM and an (infinitely) iterated product of FSMs. Existing results regarding close decision problems in the context of the so-called shuffle languages are rather negative and cannot be directly exploited in our context. In this paper, we develop a novel technique to prove the decidability of testing simulation in our case of interest. We provide complexity bounds for the general protocol synthesis problem and identify two cases of particular interest, namely loop-free target services and hybrid states-free component services, for which protocol synthesis is shown to be respectively NP-COMPETE and EXPTIME-COMPLETE.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Díaz Gómez, María Angustias, e Elicio Díaz Gómez. "Reflexiones sobre el Real Decreto español 171/2007, de 9 de febrero, por el que se regula la publicidad de los protocolos familiares en las sociedades familiares". Pecvnia : Revista de la Facultad de Ciencias Económicas y Empresariales, Universidad de León, n. 12 (1 giugno 2011): 91. http://dx.doi.org/10.18002/pec.v0i12.617.

Testo completo
Abstract (sommario):
El objeto de este trabajo es analizar el Protocolo Familiar, estudiando su concepto, naturaleza jurídica y eficacia, su contenido, publicidad y desarrollo. El protocolo familiar es un instrumento jurídico que pretende organizar la relación entre la familia y la empresa, separando ambas realidades y, especialmente, trata de planificar adecuadamente la sucesión de la empresa familiar. Se trata de reflexionar sobre el Real Decreto español 171/2007, de 9 de febrero, por el que se regula la publicidad de los protocolos familiares en las Sociedades Familiares.<br /><br /><br />The object of this work is to analyze the Family Protocol, studying his concept, juridical nature and effectiveness, his content, advertising and development. The family protocol is a legal instrument that, intends to organize the interaction between a family and their family-owned business, separating both realities and, specially, it tries to plan adequately the succession of the family business. It is a question of thinking about the Spanish Royal decree 171/2007, of February 9rd, by which there is regulated the advertising of the family protocols in the Familiar Companies.<br />
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Zhi, Huang, Xiang Qun Wang e Wei Chen. "Application of IEEE802.1x Protocol Based on EPON System". Applied Mechanics and Materials 336-338 (luglio 2013): 2433–37. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2433.

Testo completo
Abstract (sommario):
IEEE 802.1x is a port-based network access control protocol, the one of the newest authentication protocols. With the MD5 algorithm as an example, this paper introduces the type of protocol packets and the authentication process in detail. The authentication port is apart from the business stream based on the logical port. The business stream is transmitted over the controlled port, but the authentication stream is transmitted over the uncontrolled port. Therefore, the port control and authorization for users can be carried out. In this paper, two authentication methods based on EPON system are studied in detail. The 802.1x authentication protocol has many advantages, such as low-cost, simply and so on. It can satisfy the requirement of intelligent distribution network communication system.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Arteaga, Rocio, e Susana Menéndez-Requejo. "Family Constitution and Business Performance: Moderating Factors". Family Business Review 30, n. 4 (27 settembre 2017): 320–38. http://dx.doi.org/10.1177/0894486517732438.

Testo completo
Abstract (sommario):
This study analyzes the relationship between implementing a Family Constitution (Protocol) and future family business performance. We analyze a unique sample of 530 Spanish family businesses. Half of these firms received financial aid from the government to implement a Family Protocol during 2003-2013. The analysis reveals that family businesses that implemented a Family Constitution had significantly improved performance within 2 years after the implementation. The positive relationship between the implementation of a Family Constitution and future firm performance is stronger for firms that had a nonfamily CEO, had multiple family owners, or were controlled by later generations.
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Ding, Xia Jun, Xiao Dan Jiang e Yue Zhai Zheng. "The Research and Implementation of E-Commerce Secure Payment Protocol". Advanced Materials Research 267 (giugno 2011): 74–79. http://dx.doi.org/10.4028/www.scientific.net/amr.267.74.

Testo completo
Abstract (sommario):
To implement e-commerce, the key issue is to ensure that the security of system on entire business process, primarily through encryption, security, security agreement to guarantee the e-commerce network security. The security protocol mainly used Secure Sockets Layer Protocol and Secure Electronic Transaction. In this paper, after analysis two kinds of protocol and the security technology used in the protocol, put forward a small scale enterprise e-commerce transaction system design of network security protocols, which play a reference role to small and medium enterprises engaged in electronic commerce and transaction security.
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Arslan, Halil. "Extensible messaging and presence protocol’s adaptation to business applications". Global Journal of Computer Sciences: Theory and Research 6, n. 1 (20 novembre 2016): 10. http://dx.doi.org/10.18844/gjcs.v6i1.1210.

Testo completo
Abstract (sommario):
Communication protocols are used for data communication between different parties in computer networks. Research on improvement and generalization of the usage areas of these protocols keeps going. One of these protocols, Extensible Messaging and Presence Protocol (XMPP), draws the attention with the advantages of providing an open communication infrastructure for real-time transmission and usage of XML format along with packet definition, which is also available in other protocols. In this study, a new model was developed making the use of XMPP advantages. The developed model can interoperate with the software using other protocols and is intended for efficient, location-independent communication of people and business applications with each other. To verify the constructed model, a new enterprise application including an instant messaging service was developed that is able to interoperate with business applications. A new area was added to the usage areas of XMPP that contributes to the generalization of the protocol.Keywords: XMPP, business application, instant messaging, presence management
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Arslan, Hasan, Sinan Tuncel e Osman Gun. "Extensible messaging and presence protocol’s adaptation to business applications". Global Journal of Computer Sciences: Theory and Research 6, n. 1 (12 aprile 2016): 10. http://dx.doi.org/10.18844/gjcs.v6i1.1338.

Testo completo
Abstract (sommario):
Communication protocols are used for data communication between different parties in computer networks. Research on improvement and generalization of the usage areas of these protocols keeps going. One of these protocols, Extensible Messaging and Presence Protocol (XMPP), draws the attention with the advantages of providing an open communication infrastructure for real-time transmission and usage of XML format along with packet definition, which is also available in other protocols. In this study, a new model was developed making the use of XMPP advantages. The developed model can interoperate with the software using other protocols and is intended for efficient, location-independent communication of people and business applications with each other. To verify the constructed model, a new enterprise application including an instant messaging service was developed that is able to interoperate with business applications. A new area was added to the usage areas of XMPP that contributes to the generalization of the protocol.Keywords: XMPP, business application, instant messaging, presence management
Gli stili APA, Harvard, Vancouver, ISO e altri
14

LLORET, JAIME, JESUS TOMAS, MIGUEL GARCIA e RAQUEL LACUESTA. "A B2B ARCHITECTURE AND PROTOCOL FOR RESEARCHERS COOPERATION". International Journal of Cooperative Information Systems 22, n. 02 (giugno 2013): 1350010. http://dx.doi.org/10.1142/s021884301350010x.

Testo completo
Abstract (sommario):
Some works on the researchers cooperation's literature provide the key lines for building research networks and propose new protocols and standards for business to business (B2B) data exchange, but none of them explains how researchers should contact and the procedure to select the most appropriate partner of a research enterprise, institute or university. In this paper, we propose a B2B architecture and protocol between research entities, that uses ebXML protocol. The contacts for cooperation are established based on some defined parameters and an information retrieval system. We explain the information retrieval system, the researcher selection procedure, the XML-based protocol and the workflow of our proposal. We also show the information that has to be exchanged to contact other researchers. Several simulations demonstrate that our proposal is a feasible architecture and may be used to promote the research cooperation. The main purpose of this paper is to propose an efficient procedure for searching project partners.
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Wang, Yi Ran. "Research of E-Business Security Based on SOAP Protocol". Advanced Materials Research 189-193 (febbraio 2011): 4304–7. http://dx.doi.org/10.4028/www.scientific.net/amr.189-193.4304.

Testo completo
Abstract (sommario):
When applied in E-Business, the technology of Web Services based on SOAP protocol can promote integration of E-commerce and distributed application. But it has some potential problems of security. Through research of technology correlated SOAP, combined with E-business safety analysis, the paper designs a kind of secure E-Business application model based on SOAP protocol. It includes SOAP secure disposal and access controller, and is realized by J2EE. The model makes the SOAP messages transmit safely and solves the secure problems of E-Business. It has great significance for popularization and application of E-commerce.
Gli stili APA, Harvard, Vancouver, ISO e altri
16

LI, Xiang, Jin-Peng HUAI, Xu-Dong LIU, Hai-Long SUN e Xian-Yang QU. "Web Service Business Protocol Mining Based on Message Logs". Journal of Software 22, n. 7 (15 luglio 2011): 1413–25. http://dx.doi.org/10.3724/sp.j.1001.2011.03820.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
17

AlMahmoud, Abdelrahman, Maurizio Colombo, Chan Yeob Yeun e Hassan Al Muhairi. "Secure communication protocol for real-time business process monitoring". International Journal of Internet Technology and Secured Transactions 5, n. 3 (2014): 223. http://dx.doi.org/10.1504/ijitst.2014.065183.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Younas, Muhammad, Barry Eaglestone e Kuo-Ming Chao. "A low-latency resilient protocol for e-business transactions". International Journal of Web Engineering and Technology 1, n. 3 (2004): 278. http://dx.doi.org/10.1504/ijwet.2004.005234.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Tang, Lin, En Jian Bai e Wen Qiang Wu. "A Secure Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard". Advanced Materials Research 403-408 (novembre 2011): 1845–48. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1845.

Testo completo
Abstract (sommario):
With the development of e-business market, radio frequency identification (RFID) technology is becoming more and more importance. It is often used to identify object because it can work without manual intervention. Several organizations including EPC global and ISO have been working on the standard of RFID all the time in order to promote it using low-cost tags. In particular, the EPC Class-1 Generation-2 standard was accepted as an international standard by ISO/IEC. However, this standard exists some security vulnerabilities. To resolve these vulnerabilities, some protocols conforming to EPC Class 1 Generation 2 was proposed. In this paper, we show the weaknesses which exist in RFID system’s security protocols conforming to EPC Class-1 Generation-2 and submit a new security protocol suitable to the standard, then validate the whole security performance of the new protocol. The safety performance of the new protocol and existing protocols are also compared in this paper .The result shows that the the new protocol could be used in the low-cost tag because of its high security and low communication complexity.
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Trinkaus, John. "Business Manners: An Informal Look". Perceptual and Motor Skills 68, n. 3 (giugno 1989): 945–46. http://dx.doi.org/10.2466/pms.1989.68.3.945.

Testo completo
Abstract (sommario):
A number of top executives feel that many of their organization's problems are rooted in a lack of proper business etiquette and protocol. Based on an informal inquiry as to the social courtesy displayed by a group of business students, this thinking may well have some merit.
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Zhang, Chao Yi, e Yan Dong Zhao. "Multi-Path Relay Selection Based on Radio and Television Business". Advanced Materials Research 756-759 (settembre 2013): 1883–88. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1883.

Testo completo
Abstract (sommario):
This paper presents a relay selection method for radio and television business, this method uses nodes time-delay and power information, obtains the value of network interrupt as decision threshold, then selects the relay node. At same time this paper proposes an optimal relay selection strategy which can minimize the network interrupt probability combination with power distributionMulti-Path Relay Routing Protocol, this protocol can change the appropriate route path according to the dynamic network. Simulation results show that this protocol can extend cells coverage area, reduce time-delay and increase system throughput, improve system spectral efficiency, and enhance Qos of radio and television business.
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Yefremova, Kateryna, e Maryna Lobko. "The art of diplomatic protocol as tool of business communication". Law and innovative society, n. 2 (15) (4 gennaio 2020): 35–39. http://dx.doi.org/10.37772/2309-9275-2020-2(15)-6.

Testo completo
Abstract (sommario):
Problem setting. At the present stage of development of international relations, more and more diplomatic negotiations are taking place and a large number of international agreements are being concluded, so for the successful and effective functioning of the state foreign policy mechanism many tools are needed, each of which sets the mechanism in motion. However, the issues of gift literacy and their conceptualization of the role as a tool of diplomatic protocol in the implementation of international contacts of bilateral and multilateral nature remain unexplored. Analysis of resent researches and publications. The following scientists were engaged in research of the specified question: Ukrainian scientists – O. Sagaidak, G. Rudenko, Polish – L. Ikanovich, J. Picarsky, T. Orlovsky, English – John Wood, Jean Serre and others. The target of research is to study the essence of diplomatic protocol and etiquette on the example of gift literacy as a special tool for establishing relations in international cooperation, as well as outlining the realities of regulating this procedure and determining the practical side of the gift process in the context of diplomatic relations. Article’s main body. In the article investigated the essence and genesis of the practice of applying the diplomatic protocol in multilateral diplomacy for political purposes. It is argued that some protocol aspects of a multilateral meeting may be subject to political manipulation, and their behavioral influence on decision-makers is used. The importance of using gifts at the present stage of diplomacy development as one of the political tools that is subordinated to foreign policy goals is determined. The gifts received during the working trips of the presidents of the countries reflect the current state of development of the states, cover meetings and communication with the population, outline the professional and political interests and priorities of the states. The exchange of memorable gifts and souvenirs is carried out in the protocol order or by agreement of the parties in a solemn atmosphere as a separate protocol event within the framework of the state visit of the head of a foreign state. Examining the gifts, you can determine the geography of official visits of high-ranking officials, the current state of development of states, assess the outcome of meetings and communication with the population, learn about professional and political interests and priorities of states. In the protocol practice of most countries, strict cost limits have been introduced for gifts given or received by senior officials. Conclusions and prospects for the development. Gift literacy is one of the modern tools of diplomatic protocol, and the rules for choosing diplomatic gifts are a science, the basic principles of which have changed and improved over the centuries and to this day. Gifts from foreign heads of state, representatives of international organizations and business circles represent the donor country, reflecting customs, culture, government.
Gli stili APA, Harvard, Vancouver, ISO e altri
23

ESWARAN, P. K., S. PRAKASH, DAVID D. FERGUSON e KATHLEEN NAASZ. "LEVERAGING IP FOR BUSINESS SUCCESS". International Journal of Information Technology & Decision Making 02, n. 04 (dicembre 2003): 641–50. http://dx.doi.org/10.1142/s0219622003000884.

Testo completo
Abstract (sommario):
Businesses are faced today with the challenge of leveraging existing network infrastructures while evolving to technologies that will provide a positive impact on their business performance. Internet Protocol (IP) is a technology foundation that many companies have begun to leverage, but IP requires a more integrated strategy for seamless migration and the achievement of its full benefits. In this paper, we examine the creation of an Enterprise IP Strategy from a business impact and a technology point of view and provide factors to consider when developing this strategy. A framework considering business perspective and technology umbrella is presented to guide businesses to make the right choice for networking needs. IP is a common thread that runs through various systems and networks comprising enterprise IT infrastructure. In the last five years, virtually everyone from shipping clerks to CEOs has been touched by IP's influence. Hence, IP provides a strategic vantage point for building a sound enterprise networking strategy.
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Moudjari, Abdelkader, Salim Chikhi e Hamamache Kheddouci. "Latent semantic analysis for business protocol discovery using log files". International Journal of Web Engineering and Technology 9, n. 4 (2014): 365. http://dx.doi.org/10.1504/ijwet.2014.067550.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
25

El Amin, M. H. M., L. N. Chung e B. G. Evans. "Access protocol performance for on-board processing business satellite systems". International Journal of Satellite Communications 4, n. 4 (ottobre 1986): 203–10. http://dx.doi.org/10.1002/sat.4600040406.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Oya, Makoto, Masahiro Kinoshita e Yukinori Kakazu. "On dynamic generation of business protocol in autonomous Web services". Systems and Computers in Japan 37, n. 2 (febbraio 2006): 37–45. http://dx.doi.org/10.1002/scj.20352.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Ji, Qiang, Shifeng Zhang e Haoguang Zhao. "Research on Spacecraft Integrated Electronic System Architecture Based on Information Fusion". MATEC Web of Conferences 228 (2018): 01018. http://dx.doi.org/10.1051/matecconf/201822801018.

Testo completo
Abstract (sommario):
This paper has designed the integrated electronic system and protocol architecture based on the standard of Consultative Committee for Space Data Systems (CCSDS) and European Communication Satellite System (ECSS). The application layer, application support layer, transport layer and sub network layer in the architecture can be described in detail, and the functions can be realized through the combination of various business and protocols. The architecture can provide technical support for the intellectualization and networking of spacecraft, standardize the spacecraft interface and protocol, it can promote the generalization of spacecraft equipment and software, and provide more flexible and powerful functions for the spacecraft.
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Suminski Jr, Richard Robert, Shannon Robson, Jennie Turner e Eric Plautz. "Promoting Small Business Support of Youth Physical Activity in Low-Income, Minority Neighborhoods: Protocol for a Randomized Controlled Trial". JMIR Research Protocols 8, n. 7 (30 luglio 2019): e13141. http://dx.doi.org/10.2196/13141.

Testo completo
Abstract (sommario):
Background An unacceptably high percentage of our nation’s low-income, minority youth (age<18 years) are not regularly physically active. One reason for this could be their lack of access to quality youth physical activity opportunities (YPAOs). Our previous research found that small businesses (<500 employees), which represent over 99.64% (27.9/28.0 million businesses in United States) of all employers, are powerful resources for creating and improving YPAOs. In accordance with the socioecological model and established philanthropic principles, we developed an alpha version of an intervention (alpha-i) for increasing small businesses’ involvement with YPAOs. Objective The aims of this proposed study are to (1) create a beta version (beta-i) of the intervention and (2) conduct a pilot study of its impact on small business support for YPAOs and YPAO utilization by the youth in low-income, minority neighborhoods. Methods The alpha-i will be refined using information from focus groups and surveys conducted with small business owners and managers, YPAO providers, and parents and guardians of the youths from low-income, predominantly minority neighborhoods. A cluster randomized controlled trial will then be conducted for 1 year to examine the effects of the refined intervention (beta-i) on small business support for YPAOs in 10 low-income, minority neighborhoods. The control group of neighborhoods (n=10) will be provided with a standard practice intervention. The primary outcome for aim 2 will be the percentage of small businesses not supporting YPAOs at baseline that subsequently provide support for YPAOs at follow-up. We also will consider the US dollar equivalent of all types of support (monetary, goods/services, and time) donated for YPAOs by small businesses. In addition, we will examine the impact of the increased small business support for YPAOs on YPAO utilization by the youth. Results As of May 1, 2019, all YPAOs and small businesses in the study neighborhoods have been identified, and surveys have begun with these groups. In addition, 9 focus groups were completed, and the data have been transcribed. We anticipate that manuscripts regarding these aspects of the study will be submitted in fall 2019. Conclusions The proposed study is significant because it will provide evidence that an easily replicated approach can be used to increase small business support for YPAOs and that this support results in greater use of the YPAOs by youth. A logical next step will be to determine if YPAO changes resulting from increased small business support positively influence youth physical activity levels. ClinicalTrial ClinicalTrials.gov NCT03936582; https://clinicaltrials.gov/ct2/show/NCT03936582. International Registered Report Identifier (IRRID) DERR1-10.2196/13141
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Crawford, William B., e Christopher Engholm. "When Business East Meets Business West: The Guide to Practice and Protocol in the Pacific Rim". Journal of Marketing 57, n. 1 (gennaio 1993): 127. http://dx.doi.org/10.2307/1252062.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Elabd, Emad, Emmanuel Coquery e Mohand-Said Hacid. "From Implicit to Explicit Transitions in Business Protocols". International Journal of Web Services Research 9, n. 4 (ottobre 2012): 69–95. http://dx.doi.org/10.4018/jwsr.2012100104.

Testo completo
Abstract (sommario):
Modeling Web services is a major step towards their automated analysis. One of the important parameters in this modeling, for the majority of Web services, is the time. A Web service can be presented by its behavior which can be described by a business protocol representing the possible sequences of message exchanges. To the best of the authors’ knowledge, automated analysis of timed Web services (e.g., compatibility and replaceability checking) is very difficult and in some cases it is not possible with the presence of implicit transitions (internal transitions) based on time constraints. The semantics of the implicit transitions is the source of this difficulty because most of well-known modeling tools do not express this semantics (e.g., epsilon transition on the timed automata has a different semantics). This paper presents an approach for converting any protocol containing implicit transitions to an equivalent one without implicit transitions before performing analysis.
Gli stili APA, Harvard, Vancouver, ISO e altri
31

Tareen, Laraib, Fowzia Menga, Nadeem Zaman, Manzoor Brohi e Hadi Khan. "Business Motives among Students: A Qualitative Appraisal of Drive Theory". Jinnah Business Review 9, n. 2 (1 luglio 2021): 61–74. http://dx.doi.org/10.53369/tcoq8790.

Testo completo
Abstract (sommario):
The main purpose of conducting this exploratory qualitative research was to determine the nature of drive theory among business students, where drive is a motivation for some behavior based on a biological need. The target population of our study was the universitylevel business students. We used the existing literature on drive theory for the development of interview protocol. After the finalization of the interview protocol, six semi-structured interviews were conducted with the business students enrolled in different programs with different fields of specialization. The data were analyzed using ATLAS.ti version 8. We found that business-related motivation was created by six drivers including aggressiveness, acquisition, achievement, social recognition, personal goals and desire for power.
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Matias, Cláudia, e Mário Franco. "Family protocol: how it shapes succession in family firms". Journal of Business Strategy 41, n. 3 (20 dicembre 2018): 35–44. http://dx.doi.org/10.1108/jbs-09-2018-0167.

Testo completo
Abstract (sommario):
Purpose This study aims to understand the role that family protocol can have in the succession planning process of family businesses. Design/methodology/approach For this purpose, the authors decided on a qualitative approach and performed an exploratory case study in Portugal: one firm with a family protocol. As data collection techniques, interviewing, direct observation and documentary analysis were used. Findings Based on the empirical evidence, it is concluded that a family protocol can help succession planning and favour the continuity and survival of the family business. Practical implications This study shows the relevance of a family protocol for the succession process that seems to be at the basis of family firms’ continuity, survival and minimising their failure. Originality/value Although family firms are many in number and central in the dynamics of the world economy, the family protocol has not been approached as a determinant of a successful succession process. This holds particularly for the realm of family firms.
Gli stili APA, Harvard, Vancouver, ISO e altri
33

BICHLER, MARTIN, ARIE SEGEV e CARRIE BEAM. "AN ELECTRONIC BROKER FOR BUSINESS-TO-BUSINESS ELECTRONIC COMMERCE ON THE INTERNET". International Journal of Cooperative Information Systems 07, n. 04 (dicembre 1998): 315–29. http://dx.doi.org/10.1142/s0218843098000155.

Testo completo
Abstract (sommario):
Distributed object standards provide a key to building interoperable applications that can run on a range of platforms. The paper describes a CORBA-based research prototype for an electronic broker in business-to-business electronic commerce. High-level IDL specifications are used to achieve interoperability between components of the electronic marketplace. The two key functionalities of the electronic broker are the ability to dynamically gather information from remote electronic catalogs and the support for negotiations through auction mechanisms. The paper discusses the functionality and the design of the electronic broker and gives an overview of current extensions of the prototype. As application-level interoperability is a crucial precondition for many brokerage services, we put special emphasis on electronic commerce protocol standards.
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Simanis, Erik, Stuart Hart e Duncan Duke. "The Base of the Pyramid Protocol: Beyond “Basic Needs” Business Strategies". Innovations: Technology, Governance, Globalization 3, n. 1 (gennaio 2008): 57–84. http://dx.doi.org/10.1162/itgg.2008.3.1.57.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Tao, Xiao Xia, Hong Yang, Rong Chen e Zhen Jun Du. "An Improvement on Randomly Changed Identification Protocol for Low-Cost Tags". Advanced Materials Research 562-564 (agosto 2012): 1583–89. http://dx.doi.org/10.4028/www.scientific.net/amr.562-564.1583.

Testo completo
Abstract (sommario):
With the benefits to improve productivity and reduce operation cost, RFID (Radio Frequency Identification) has recently seen a great increase in a wide variety of business information systems. However, the downside in business applications is the problem caused by data security and privacy. Enhancement without extra costs in RFID identification poses new challenges to privacy and security in RFID-driven just-in-time business information systems. In this paper, we propose an unilateral randomly authentication protocol on the basis of one-way hash function for low-cost RFID tags. We illustrate the whole operating procedure of the proposed protocol in a typical RFID system. Experimental results show that the proposed protocol has some security improvements in data consistency and can work against some attacks like eavesdropping and DoS, compared with several existing methods.
Gli stili APA, Harvard, Vancouver, ISO e altri
36

UBERMORGEN, /. "Everything is always (the liquid protocol)". Finance and Society 2, n. 2 (19 dicembre 2016): 175–79. http://dx.doi.org/10.2218/finsoc.v2i2.1731.

Testo completo
Abstract (sommario):
UBERMORGEN are lizvlx (AT, 1973) and Hans Bernhard (CH/USA, 1971), European artists and net.art pioneers. They tenaciously convert code & language and concept & aesthetics into digital objects, software art, net.art, installation, new painting, videos, press releases and actions. CNN described them as ‘maverick Austrian business people’ and the New York Times called Google Will Eat Itself ‘simply brilliant’. Their main influences are Rammstein, Samantha Fox, Guns N’ Roses & Duran Duran, Olanzapine, LSD & Kentucky Fried Chicken’s Coconut Shrimps Deluxe. Visit their website at http://ubermorgen.com
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Abdulazeez, Adnan Mohsin, Baraa Wasfi Salim, Diyar Qader Zeebaree e Dana Doghramachi. "Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol". International Journal of Interactive Mobile Technologies (iJIM) 14, n. 18 (10 novembre 2020): 157. http://dx.doi.org/10.3991/ijim.v14i18.16507.

Testo completo
Abstract (sommario):
The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly high charge. Virtual Private Network (VPN) is commonly used in business situations to provide secure communication channels over public infrastructure such as Internet. Virtual Private Networks (VPNs) provide a secure encrypted communication between remote networks worldwide by using Internet Protocol (IP) tunnels and a shared medium like the Internet. The paper follows and sets standards for different types of protocols and techniques, the VPN (Virtual Private Network) architectural feature is made to deliver dependable and safe network that is not in line with regular networks that provide a higher trust and a higher secure channel between user and organization. The current study took place to summaries the usage of existing VPNs protocol and to show the strength of every VPN. Through different studies that have been made by other researchers as well as an extra focus on the state of art protocol, Wire guard. It is also worthy to mention that wire guard compared with other protocols such as IPsec and GRE. The studies show the WireGuard being a better choice in terms of other well-known procedures to inaugurate a secure and trusted VPN.
Gli stili APA, Harvard, Vancouver, ISO e altri
38

Watters, Paul Andrew, e Maya Espinosa Walters. "Implications of Distributed Information Technology for South Pacific Development". South Pacific Journal of Psychology 9 (1997): 75–80. http://dx.doi.org/10.1017/s0257543400001188.

Testo completo
Abstract (sommario):
AbstractThe global digital communications network, colloquially known as the “internet”, has received much attention in recent years from business, media, cultural, and government interests. This paper looks behind the hype and sales-pitches, at the essential features of the medium which have made it (and will continue to make it) the central technology for the dissemination of information in the next century. It is a particularly important technology for remote communities, since all information resources (educational, commercial, and recreational) can be transmitted using a standard set of protocols (Hypertext Transfer Protocol, File Transfer Protocol, Network News Transfer Protocol), over any physical medium (packet radio, satellite, phone-line, and optic fibre), in any data format that can be digitised (radio, television, text, graphics, and sound). The implications of this non-coercive technology are explored in the context of the impact on development in the physically distant communities of the South Pacific.
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Kabou, Salheddine, e Sidi Mohamed Benslimane. "A New Distributed Anonymization Protocol with Minimal Loss of Information". International Journal of Organizational and Collective Intelligence 7, n. 1 (gennaio 2017): 1–19. http://dx.doi.org/10.4018/ijoci.2017010101.

Testo completo
Abstract (sommario):
Cloud computing represents a new business model which enables diverse benefits such as the sharing of computing resources containing personal information across multiple distributed and private databases. However, privacy and security concerns are a significant obstacle that is preventing the extensive adoption of this new technology. Anonymization is one of the solutions methods that can be used to preserve the privacy of data while still allowing the data to be used.. Most of the existing works use a k-anonymity model for preserving privacy for data subject that offers lower utility. Motivated by this, the authors develop a new distributed anonymization protocol to satisfy multiple data providers privacy requirements based on a k-concealment model that offers a higher utility with less generalisation. The experimental results show that their proposal protocol outperforms the commonly used protocols.
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Wang, Yichuan, Han Yu, Xinhong Hei, Binbin Bai e Wenjiang Ji. "From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT". Security and Communication Networks 2021 (2 agosto 2021): 1–13. http://dx.doi.org/10.1155/2021/9179286.

Testo completo
Abstract (sommario):
Internet of Things (IoT) is the development and extension of computer, Internet, and mobile communication network and other related technologies, and in the new era of development, it increasingly shows its important role. To play the role of the Internet of Things, it is especially important to strengthen the network communication information security system construction, which is an important foundation for the Internet of Things business relying on Internet technology. Therefore, the communication protocol between IoT devices is a point that cannot be ignored, especially in recent years; the emergence of a large number of botnet and malicious communication has seriously threatened the communication security between connected devices. Therefore, it is necessary to identify these unknown protocols by reverse analysis. Although the development of protocol analysis technology has been quite mature, it is impossible to identify and analyze the unknown protocols of pure bitstreams with zero a priori knowledge using existing protocol analysis tools. In this paper, we make improvements to the existing protocol analysis algorithm, summarize and learn from the experience and knowledge of our predecessors, improve the algorithm ideas based on the Apriori algorithm idea, and perform feature string finding under the idea of composite features of CFI (Combined Frequent Items) algorithm. The advantages of existing algorithm ideas are combined together to finally propose a more efficient OFS (Optimal Feature Strings) algorithm with better performance in the face of bitstream protocol feature extraction problems.
Gli stili APA, Harvard, Vancouver, ISO e altri
41

Ocenasek, Pavel. "Effective Design and Implementation of Distributed Business Information Systems". Applied Mechanics and Materials 307 (febbraio 2013): 451–54. http://dx.doi.org/10.4028/www.scientific.net/amm.307.451.

Testo completo
Abstract (sommario):
This paper deals with the effective design and implementation aspects of distributed business information systems. After a short introduction to the state of the art, it proposes a study on a payment protocol design, which is based on the composition method.
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Jägers, Nicola. "National Human Rights Institutions: The Missing Link in Business and Human Rights Governance?" ICL Journal 14, n. 3 (25 novembre 2020): 289–325. http://dx.doi.org/10.1515/icl-2020-0006.

Testo completo
Abstract (sommario):
AbstractIn 2014, the United Nations established a working group to elaborate an international treaty on business and human rights. In October 2018, negotiations on a first draft of the actually text took place. Besides this zero-draft, the working group released the draft text of an Optional Protocol containing several institutional arrangements. The Optional Protocol carves out a key role for national implementation mechanisms to promote compliance with, monitor and implement the treaty on business and human rights. With such an institutional arrangement, the future treaty would join the ranks of what can be called a new generation of human right treaties which institutionalize a top down with a bottom up approach aiming to address the disjuncture between rules and practice. The Optional Protocol indicates that this role of national implementation mechanism could be taken up by National Human Rights Institutions (NHRIs). This follows an increased recognition of NHRIs as significant actors in the business and human rights domain. Yet, the role of NHRIs in human rights governance in general, and in the business and human rights field in particular, is not yet well understood and undertheorized. The aim of this article is to add insight into the role of NHRIs in business and human rights by, first, describing some of the current activities undertaken by NHRIs in this field in order to analyze whether the role ascribed to them is actually being taken up and what challenges NHRIs face. From this perspective, it will be discussed whether the role foreseen in the Optional Protocol of the future business and human rights treaty holds promise.
Gli stili APA, Harvard, Vancouver, ISO e altri
43

Ahmed, Ajaz, e Aneel Salman. "Clean Development Mechanism (CDM) Business in Pakistan: Perceptions and Realities". Pakistan Development Review 51, n. 4II (1 dicembre 2012): 303–16. http://dx.doi.org/10.30541/v51i4iipp.303-316.

Testo completo
Abstract (sommario):
Climate change is the biggest challenge human family has ever faced in world history. It has local as well as global impacts and almost all the ethnic groups, communities, and geographical locations are exposed to it [Stern (2006)]. But comparatively developing countries are more exposed to the changes which are taking places due to climate [Stern (2006) and Barker (2008)]. The degree of their exposure which has a number of determinants varies across different regions [Karen, et al. (2004)]. Climate experts so far have proposed two broader solutions for this problem; mitigation of climate change by reducing the amount of emitted carbon from atmosphere, and adaptation to climate changes [Tompkins and Adger (2005) and Becken (2005)]. Kyoto Protocol of the United Nations Framework Convention on Climate Change (UNFCCC) is dealing with climate change mitigation. It is the milestone towards global carbon mitigation efforts [Miriam, et al. (2007)]. This protocol has resulted in the establishment of carbon markets by adopting the Clean Development Mechanism (CDM). Pakistan ratified the Kyoto Protocol in 1997 and implemented it in 2005. To ensure the smooth functioning of carbon trading business in Pakistan, CDM related infrastructure was developed. Mainly this includes the establishment of CDM Cell in Pakistan, but a number of private consultancies also came into being with the emergence of this mechanism.
Gli stili APA, Harvard, Vancouver, ISO e altri
44

Shin, Sora, Hae-Hyun Choi, Yung Bin Kim, Byung-Hee Hong e Joo-Young Lee. "Evaluation of body heating protocols with graphene heated clothing in a cold environment". International Journal of Clothing Science and Technology 29, n. 6 (6 novembre 2017): 830–44. http://dx.doi.org/10.1108/ijcst-03-2017-0026.

Testo completo
Abstract (sommario):
Purpose The purpose of this paper is to evaluate the effects of intermittent and continuous heating protocols using graphene-heated clothing and identify more effective body region for heating in a cold environment. Design/methodology/approach Eight males participated in five experimental conditions at an air temperature of 0.6°C with 40 percent relative humidity: no heating, continuous heating the chest, continuous heating the back, intermittent heating the chest, and intermittent heating the back. Findings The results showed that the electric power consumption of the intermittent heating protocol (2.49 W) was conserved by 71 percent compared to the continuous protocol (8.58 W). Rectal temperature, cardiovascular and respiratory responses showed no significant differences among the four heating conditions, while heating the back showed more beneficial effects on skin temperatures than heating the chest. Originality/value First of all, this study was the first report to evaluate cold protective clothing with graphene heaters. Second, the authors provided effective intermittent heating protocols in terms of reducing power consumption, which was able to be evaluated with the characteristics of fast-responsive graphene heaters. Third, an intermittent heating protocol on the back was recommended to keep a balance between saving electric power and minimizing thermal discomfort in cold environments.
Gli stili APA, Harvard, Vancouver, ISO e altri
45

Hunter, M. Gordon. "Creating Qualitative Interview Protocols". International Journal of Sociotechnology and Knowledge Development 4, n. 3 (luglio 2012): 1–16. http://dx.doi.org/10.4018/jskd.2012070101.

Testo completo
Abstract (sommario):
This manuscript describes a technique which facilitates the documentation of research participant stories interpreting their experiences in response to a research question. From a Narrative Inquiry approach interview protocols were developed based upon the exploration of a research question. The technique may be applied when gathering qualitative data in one-on-one interviews. Each interview protocol provided consistency across a number of interviews; but also allowed for flexibility of responses by the research participant within their respective interviews. This document provides a description of a technique which addresses the conundrum of consistency and flexibility. Four different research projects are described in this manuscript. The specific interview protocol is presented and it is shown how the protocol serves to address the project’s research question. This document concludes with a description of how these techniques may be employed, in general, to contribute to the exploratory investigation of a research topic in business and management studies.
Gli stili APA, Harvard, Vancouver, ISO e altri
46

Atienza, Mabelle A., e Almighty C. Tabuena. "The Impact of COVID-19 Pandemic on Managerial Accounting and Its Adjustments in Financial Markets". International Journal of Business, Technology and Organizational Behavior (IJBTOB) 1, n. 4 (12 agosto 2021): 287–96. http://dx.doi.org/10.52218/ijbtob.v1i4.109.

Testo completo
Abstract (sommario):
This study aimed to identify the impact of the COVID-19 pandemic on managerial accounting and its adjustments in financial markets to help business society deal with their businesses and companies during the pandemic. This study was conducted in one of the cities in the Metropolitan Manila in Quezon City, Philippines, employing the descriptive design under the qualitative research method through an interview protocol and online form methods with accountants, managers, and business owners using Fiedler’s Contingency Theory. This research initiative is a great help for those who are suffering in their business, especially managers, accountants, and business owners. Managerial accounting in the financial markets has had a lot of difficulties since this pandemic occurred. In this case, businesses were not prepared for the advent of the COVID-19 pandemic. Some business owners had to close their businesses for three months because of the outbreak. Business owners are taking steps to become affable and open to the consumers that might purchase their products. Despite the pandemic, company owners are determined to stay open. They knew how to cope with scammers, especially those who ran an online company during this pandemic crisis. Keywords: adjustment, contingency theory, COVID-19, financial market, impact, managerial accounting
Gli stili APA, Harvard, Vancouver, ISO e altri
47

Zinkhan, George M., e William B. Crawford. "Book Review: When Business East Meets Business West: The Guide to Practice and Protocol in the Pacific Rim". Journal of Marketing 57, n. 1 (gennaio 1993): 127–28. http://dx.doi.org/10.1177/002224299305700109.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
48

Levä, Tapio, Mahya Ilaghi, Vilen Looga, Miika Komu, Nicklas Beijar e Oleksiy Mazhelis. "Adoption of Constrained Application Protocol". International Journal of Innovation in the Digital Economy 7, n. 1 (gennaio 2016): 38–53. http://dx.doi.org/10.4018/ijide.2016010104.

Testo completo
Abstract (sommario):
Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodological framework. Based on eleven expert interviews complemented with a literature survey, the paper identifies potential deployment challenges for CoAP, both technical and business-related, and suggests approaches to overcome them. The findings should facilitate the uptake of CoAP by supporting the potential adopters of the protocol in their decision-making.
Gli stili APA, Harvard, Vancouver, ISO e altri
49

Martin, Angela H., George Eckert, Gary W. Lemmon, Alan Sawchuk e Michael C. Dalsing. "A vascular laboratory protocol for improving and managing after-hours suspected acute deep venous thrombosis". Vascular 22, n. 2 (13 maggio 2013): 127–33. http://dx.doi.org/10.1177/1708538112474258.

Testo completo
Abstract (sommario):
This study reviews the clinical and workforce impact of a suggested protocol designed for the management of suspected acute deep venous thrombosis (DVT) in patients seen after standard vascular laboratory business hours. The protocol included the use of Wells score, D-dimer and a single dose of therapeutic anticoagulant to defer venous duplex ultrasound (VDU) testing until routine business hours unless contraindicated. Information was collected on medical history, physical exam and the timing of any diagnostic studies and treatment provided. Over 15% of studies done after-hours were deemed unnecessary by our protocol and in every individual the results were negative for an acute DVT. There were no adverse events from a one-time dose of anticoagulant. Limiting emergency VDU coverage to evaluate for acute DVT based on a management protocol can eliminate unnecessary after-hours VDU testing without having a negative impact on patient care.
Gli stili APA, Harvard, Vancouver, ISO e altri
50

Wu, Min, Ru Chuan Wang, Jing Li e Zhi Jie Han. "A Novel P2P Business Traffic Prediction Algorithm". Key Engineering Materials 467-469 (febbraio 2011): 1339–44. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.1339.

Testo completo
Abstract (sommario):
The increasing P2P network traffic on the Internet has leaded to the problem of network congestion. In the consequence of the diversification of the P2P business and protocol, research on the management of P2P traffic has many problems to resolve. Prediction of the P2P traffic is the kernel problem in the P2P traffic management. Based on the existed P2P traffic characters, this paper structures a P2P traffic model, gives a traffic prediction algorithm bases on wavelet-analysis, and proves the accuracy of the algorithm. Simulation experiment figures that the algorithm has a high prediction precision and a superior real-time performance.
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia