Preferences help
enabled [disable] Abstract
Number of results
2019 | 123 | 208-219
Article title

Supervision and security over the production process as well as machines and devices

Title variants
Languages of publication
Production processes and their proper identification depend to a large extent on properly prepared quality and technological documentation as well as its proper supervision over the production process as well as machinery and equipment. Proper packaging significantly affects food safety.
  • Faculty of Command and Naval Operations, Polish Naval Academy of the Heroes of Westerplatte, Gdynia, Poland
  • [1] Lüthje, Christian, and Cornelius Herstatt. The Lead User method: an outline of empirical findings and issues for future research. R & D Management 34.5 (2004) 553-568
  • [2] Batt, Rosemary, and Lisa Moynihan. The viability of alternative call centre production models. Human Resource Management Journal 12.4 (2002) 14-34
  • [3] Guest, David E. Human resource management and performance: a review and research agenda. International journal of human resource management 8.3 (1997) 263-276
  • [4] Huff, Anne Sigismund. 1999 Presidential address: Changes in organizational knowledge production. Academy of management Review 25.2 (2000) 288-293
  • [5] Hallikas, Jukka, et al. Risk management processes in supplier networks. International Journal of Production Economics 90.1 (2004) 47-58
  • [6] Huckett, J. D. An outline of the quality improvement process at Rank Xerox. International Journal of Quality & Reliability Management 2.2 (1985) 5-14.
  • [7] Jüttner, Uta, Helen Peck, and Martin Christopher. Supply chain risk management: outlining an agenda for future research. International Journal of Logistics: Research and Applications 6.4 (2003) 197-210
  • [8] Seuring, Stefan, and Martin Müller. From a literature review to a conceptual framework for sustainable supply chain management. Journal of cleaner production 16.15 (2008): 1699-1710
  • [9] Saini, Kalpana, and M. L. Dewal. Designing of a Virtual System with Fingerprint Security by considering many Security threats. International Journal of Computer Applications 3.2 (2010) 25-31
  • [10] Singh, Gurjeet, and Jatinder Singh. Security Issues in Wireless Broadband Networks. Global Journal of Research In Engineering 12.5-F (2012)
  • [11] Pasupathinathan, Vijayakrishnan, Josef Pieprzyk, and Huaxiong Wang. Security analysis of Australian and EU e-passport implementation. Journal of Research and Practice in Information Technology 40.3 (2008) 187
  • [12] Alshehri, Ali, and Steve Schneider. A formal framework for security analysis of NFC mobile coupon protocols. Journal of Computer Security 23.6 (2015) 685-707
Document Type
Publication order reference
YADDA identifier
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.