Search Results - secret service
-
1
-
2
Emotional labour: a case study of secret recipe’s employees at Kota Bharu, Kelantan / Nurbaitie Natasha Mohd Ghani & Nurzatil Aqmar Mohd Wajiah
Published 2017“…In hospitality service industries, emotional labour is the exertion needed to give organisationally desired emotion during communication. …”
Get full text
-
3
Emotional labour: a case study of secret recipe’s employees atKota Bharu, Kelantan / Nurbaitie Natasha Mohd Ghani & Nurzatil Aqmar Mohd Wajiah
Published 2017“…All customers expect good service prepared for them. So, employees must have intention to fulfill their needs. …”
Get full text
-
4
-
5
-
6
-
7
-
8
-
9
Proposed new interior design scheme of Secret Garden Spa for The World Of Secret Garden Sdn Shd at 5.07, Level 2, Block D, Sunway Giza, No.2, Jalan Pju5/14, Pju5,Kota Damansara, 47...
Published 2011“…The objective of this design is to bring the image of Secret Garden Spa together with their services provided. …”
Get full text
-
10
Emotional labour: a case study of secret recipe’s employees at Kota Bharu, Kelantan / Nurbaitie Natasha Mohd Ghani and Nurzatil Aqmar Mohd Wajiah
Published 2017“…All customers expect good service prepared for them. So, employees must have intention to fulfill their needs. …”
Get full text
-
11
A secure data outsourcing scheme based on Asmuth–Bloom secret sharing
Published 2016“…Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers.One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate.Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users’ queries at the server side have to be addressed in the data outsourcing paradigm. …”
Get full text
-
12
-
13
-
14
‘Gross inefficiency and criminal negligence’: the Services Reconnaissance Department in Timor in 1943–45 and the Darwin war crimes trials in 1946
Published 2017“…Circumstantial evidence suggests that, in relation to a trial held in Darwin in March 1946 for war crimes committed in Timor, the secretive Special Operations Australia, otherwise known as the Services Reconnaissance Department (SRD), took advantage of the rule. …”
Get full text
-
15
Use of mechanical airway clearance devices in the home by people with neuromuscular disorders: effects on health service use and lifestyle benefits
Published 2015“…Mechanical insufflation-exsufflation (MI-E) devices are a non-invasive method of increasing peak cough flow, improving cough efficacy, the clearance of secretion and overcoming atelectasis. There is limited published evidence on the impact of home use MI-E devices on health service utilisation. …”
Get full text
-
16
Turkey and Western intelligence cooperation, 1945-1960
Published 2017“…This thesis examines secret intelligence cooperation between three asymmetric partners – specifically the UK, US and Turkey – from the end of the Second World War until Turkey’s first military coup d'état on 27 May 1960. …”
Get full text
-
17
Soaring High Into The Blue Sky-AirAsia, The First Low-Fares, No-Frills Airline In Malaysia
Published 2003“…This case study will take a closer look at the low-fares, no frills concept and find out how it differs from the conventional full-service carrier. It will further uncover the secret behind AirAsia's success and explore the future strategies for AirAsia to win the competition and achieve competitive advantage.…”
Get full text
-
18
CaFriend Cafe / Norhadymanshah Lim... [et al.]
Published 2013“…CaFriend plans to provide a service that meets the needs and demands of our consumers which is the local people and tourists. …”
Get full text
-
19
-
20
And now for something completely different: looking ahead to new encryption and secrecy protocols
Published 2001“…Transmitting sensitive data over non-secret channels has always required encryption technologies to ensure that the data arrives without exposure to eavesdroppers. …”
Get full text