Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5641
-
5642
-
5643
REPRODUCTION OF BUSINESS POTENTIAL IN UKRAINE
Published 2025-01-01“…The article examines the impact of Ukraine’s EU candidate status on the innovative component of business economic security. It emphasizes the importance of innovation for business and the role of the EU in promoting innovative practices. …”
Get full text
Article -
5644
Biochemical and Histopathological Studies of Key Tissues in Healthy Male Wistar Rats Fed on African Yam Bean Seed and Tuber Meals
Published 2020-01-01“…To mitigate this effect, focus is being given to orphan or underutilized crops with immense potentials to boost food and nutrition security in Africa, such as the African yam bean (AYB) Sphenostylis stenocarpa. …”
Get full text
Article -
5645
Ex-ante impact of pest des petits ruminant control on micro and macro socioeconomic indicators in Senegal: A system dynamics modelling approach.
Published 2023-01-01“…Also, the consequences of PPR control on socioeconomic indicators like food and nutrition security at a macro-national level have not been explored thoroughly. …”
Get full text
Article -
5646
Effectiveness of Health Management Information System in Selected Sub-Counties of Ryakarimira Town Council and Rubaya Sub-County.
Published 2024“…The study recommended enhancing infrastructure, providing comprehensive training, investing in updated technology, and securing additional resources.…”
Get full text
Thesis -
5647
Investigating the Factors Affecting the Growth of Tourism in Kabale Municipality.
Published 2024“…Based on results from the study, 100% of the respondents agreed that potential factors that have led to the growth in the Kabale district include; environment and events, community perception, accessibility of infrastructure, good reception, lodge owners and managers, natural attraction, perceived safety and security and Perceived safety and security. The study findings revealed how government policy has contributed to tourism in Kabale district were presented in the table and these included consolidating and streamlining the law relating to tourism. …”
Get full text
Thesis -
5648
Effect of Household Income on Household Welfare in Kitumba Sub-County Kabale District.
Published 2024“…The objectives of the study were; to find out the effect of household income on the level of education in Kitumba sub-county Kabale District, to investigate the effect of household income on health accessibility in Kitumba sub-county Kabale District and to establish the effect of household income on food security in Kitumba sub-county Kabale District. A cross-sectional study design was used and data was collected using interviews and questionnaires. …”
Get full text
Thesis -
5649
Simple power analysis attack against cryptosystems based on Montgomery algorithm
Published 2013-08-01“…The SPA (simple power analysis) attacks against public-key cryptosystems based on Montgomery algo-rithm implementation were presented by exploitation of the inherent security vulnerability which that sensitive informa-tion leakage could be used by side-channel attack. …”
Get full text
Article -
5650
Safe Harbor Agreement: A Regulatory Assurance under the Endangered Species Act
Published 2016-02-01“… The involvement of the private sector is critical for the conservation and recovery of many species, but landowners’ fears that increased management restrictions could keep them from enjoying their land can present a challenge to securing their trust and assistance in conservation efforts. …”
Get full text
Article -
5651
Water in the Chartreuse, a mirror reflecting a renewal of relationships between mountains areas and their surrounding towns
Published 2016-03-01“…In so doing, it analyses the new management strategies that communities have adopted and explores possible synergies against a backdrop of the power relationship between private and public management in order to move towards an approach that embraces solidarity and security of supply.…”
Get full text
Article -
5652
Human rights in procedural democracies: a contribution to the debate
Published 2021-12-01“…Liberal democracy – descriptive, procedural and to some extent minimalist, primarily concerned with formally securing classic individual freedoms – now faces an acute crisis, with its historic achievements threatened by populist and undemocratic ideas. …”
Get full text
Article -
5653
«Save the Man». In way of documentary and exhibition project
Published 2020-02-01“…The article, thanks to documents from the Pantyukhov family archive, the archives of the Federal Security Service of Russia in the Omsk Region and the Ministry of Internal Affairs of Russia in the Magadan Region, the Historical Archive of the Omsk Region and the archive of the Omsk State Medical University, for the first time put into scientific circulation, makes it possible to find out the details of the biography of Pantyukhov, who devoted himself to serving the most humane from professions…”
Get full text
Article -
5654
Scheme of Attribute-Based Disclosure Mobile Trust Negotiation
Published 2013-10-01“…For it is difficult to use traditional trust negotiation on the mobile environment,which has large communication overhead,storage overhead and computational overhead,an attribute-based disclosure mobile trust negotiation scheme was proposed.In the negotiation process,two sides in trust negotiation exchange certificate which contains encrypted credential attributes firstly,then,one side in trust negotiation can selectively dispose the sensitive attributes to the other side in trust negotiation procedure based on the trust evaluation result of the other,next,two sides in trust negotiation exchange attribute encryption key based on personal security policy until the trust negotiation was completed.The implementation procedure was given in concrete application instances and the scheme was analyzed.…”
Get full text
Article -
5655
Cost Share Programs for Florida's Agricultural Producers and Landowners
Published 2009-01-01“… SL-264, a 4-page fact sheet by Rao Mylavarapu, Kelly Hines, and Alyssa Dodd, describes several conservation programs included in the 2008 Farm Bill — the Environmental Quality Incentives Program (EQIP), Wetlands Reserve Program (WRP), Grassland Reserve Program (GRP), Wildlife Habitats Incentive Program (WHIP), and the Conservation Security Program (CRP) — which may be of high interest to farmers, ranchers, land owners, agricultural consultants, local decision-makers and extension agents. …”
Get full text
Article -
5656
The Art of Storytelling in Science: A Personal Journey
Published 2025-02-01“…Drawing from my experiences across Brazil, the United States of America, India, and South Africa, I explore how crafting compelling narratives enhances scientific communication, increasing the likelihood of publishing, securing funding, and building collaborations. Reflecting on formative “hot seat” sessions at the National Institutes of Health, in the United States, I emphasize the importance of structuring ideas clearly, regardless of language fluency. …”
Get full text
Article -
5657
Flat Experience Curve Profiles of Foreign Employees in Germany
Published 2021-11-01“…Abstract This paper sheds light on the wage structure of foreign and German employees who are subject to social security contributions in fulltime employment and focuses on the experience structure. …”
Get full text
Article -
5658
« Peurs » et pratiques répressives : mobilisations musulmanes et pouvoir éthiopien (2011-2014)
Published 2015-04-01“…But conjunctures should be taken into account in a region marked by real security threats. Above all, recent religious tensions are deriving from concrete political authoritative practices of the regime’s leadership.…”
Get full text
Article -
5659
Scenario Building by Design: Pathways Towards Anticipative Collaborative Governance by Design
Published 2025-01-01“…In focus is the use of scenario building that is communicated through conceptual and process diagrams, as well as contextual situations of people participating with designed artefacts to illustrate how scenario building can encourage community engagement to address challenges like water security and stewardship. By building on established design practices and literature on scenarios in design, the article proposes ‘Anticipative Collaborative Governance’ as a model for creating long-term, systemic solutions through design. …”
Get full text
Article -
5660
Legislative reflection on critical information infrastructure protection in China
Published 2016-03-01“…To speed up the formulation and promulgation of critical information infrastructure protection legislation, the organization system and its working mechanism of critical information infrastructure protection should be clearly defined, and early warning and monitoring mechanism, emergency response and recovery mechanisms, security supervision system, accountability system and basic safeguard system should be built.…”
Get full text
Article