Search Results
Edge of Enterprise Architecture in Addressing Cyber Security Threats and Business Risks
Authors: Loso Judijanto, Djarot Hindarto, Sentot Imam Wahjono, Djunarto
View Affiliation Details
Loso Judijanto:
IPOSS Jakarta
Djarot Hindarto:
Nasional University
Sentot Imam Wahjono:
Universitas Muhammadiyah Surabaya
Djunarto:
Universitas Jayabaya
Pages: 386-396
Find this article on:
Constraint Clustering for Promotion Application: Central Java Case Study
Authors: Joni Maulindar, Zalizah Awang Long, Jawahir Che Mustapha, Singgih Purnomo
View Affiliation Details
Joni Maulindar:
University of Kuala Lumpur
Zalizah Awang Long:
University of Kuala Lumpur
Jawahir Che Mustapha:
University of Kuala Lumpur
Singgih Purnomo:
Universitas Duta Bangsa Surakarta
Pages: 625-635
Find this article on:
Financial Risk Management in Indonesian Banking: The Integrative Role of Data Analytics and Predictive Algorithms
Authors: Yulianto Umar Rofi'i
View Affiliation Details
Yulianto Umar Rofi'i:
Institut Teknologi dan Bisnis Muhammadiyah Bali
Pages: 300-309
Find this article on:
1 - 3 of 3 items