Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7221
Modern Diplomacy and the Changing Nature of International Politics in the 21st Century
Published 2024-08-01“…[i] This intricacy is because the post-Cold War international era requires diplomacy to move from being foremost about high politics such as security, military and geopolitical issues to incorporating a wider and growing scope of issues outside of a state’s national borders like migration, gender, global warming, desertification and diseases. …”
Get full text
Article -
7222
Defending Against Advanced Persistent Threats Using Game-Theory.
Published 2017-01-01“…The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. …”
Get full text
Article -
7223
Cultural Tourism Management: Advanced Tools and Technologies
Published 2025-01-01“…On the other hand, the blockchain technology could offer numerous advantages in the field of cultural tourism, from enhanced security and transparency to process automation and the creation of innovative visitor experiences. …”
Get full text
Article -
7224
NAVIGATING CLIMATE CHALLENGES: STRATEGIC DIRECTIONS FOR A SUSTAINABLE FUTURE
Published 2024-06-01“…This paper delves into six critical pathways to effectively address the climate crisis: (1) reinventing food systems, (2) preparing for population shifts, (3) upholding human rights, (4) investing in clean energy, (5) educating for a climate-conscious society, and (6) securing financial and political support. It underscores the need to make food systems resource-efficient and biodiversity-conscious. …”
Get full text
Article -
7225
SERVICE QUALITY AND CUSTOMER SATISFACTION THROUGH AIRQUAL DIMENSIONS: AN EMPIRICAL INVESTIGATION ON IRAQI AIRWAYS
Published 2025-01-01“…The results indicate that five service quality dimensions—airline tangibles, terminal tangibles, security and safety, personnel services, and airline image—have a positive and significant effect on customer satisfaction. …”
Get full text
Article -
7226
Fra armesterke bondesønner til akademikerbarn
Published 2010-08-01“…The most common reason for wanting to become a police officer is that it is an occupation with multiple and varying tasks, that it allows work with people, and that it is seen as a stable, secure Job. There is little if any indication that the students today are more "academic" in their perceptions of the work than before. …”
Get full text
Article -
7227
OTN+5G education private network empowers digital transformation--taking the construction of education private network in Bao’an District, Shenzhen as an example
Published 2024-11-01“…Empower the digital transformation of regional education through the standardization guidelines and standards of the education private network, the establishment of a strong security system, and the promotion of educational development.…”
Get full text
Article -
7228
GOVERNMENTAL SUPPORT MECHANISM OF THE RENEWABLE ENERGY IN GERMANY
Published 2016-06-01“…Energy reform is intended to increase the energy security level by increasing the share of renewables in its energy portfolio, environmental protection by decreasing the emission into the atmosphere and the level of energy consumption. …”
Get full text
Article -
7229
Implementation of an Android-Based Attendance Application with Geofence Method for Employee Monitoring Efficiency
Published 2024-11-01“…Application testing was conducted based on the ISO 25010 standard, covering eight aspects: functionality, reliability, efficiency, portability, maintainability, compatibility, security, and usability. The test results indicate that this application performs well in all these aspects. …”
Get full text
Article -
7230
Flexibility in Power Systems of Integrating Variable Renewable Energy Sources
Published 2023-03-01“…The issue of energy security is addressed in many publications and by specialists in many fields. …”
Get full text
Article -
7231
Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks
Published 2011-01-01“…This is particularly important for security-related applications like intrusion detection and fire alarm systems. …”
Get full text
Article -
7232
Analysis of bottleneck technology identification and development characteristics in the electronic manufacturing industry.
Published 2024-01-01“…It underscored the significance of promptly analyzing the evolutionary traits of these technologies within the industry and engaging in research and development endeavors to safeguard national technological security. To address this issue, the study initially extracted pertinent industry enterprises from the Orbis database. …”
Get full text
Article -
7233
Determinants of digital bank transformation: a systematic literature review with prisma and bibliometrics
Published 2024-11-01“…The determinants in the digital bank transformation process include the level of digitalization, application user growth, IT investment, IT committee, cyber security, and ecosystem stocks. The results of this literature review will be a reference for further research related to digital banks, in line with the rapid digital transformation process in banking.…”
Get full text
Article -
7234
Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment
Published 2014-01-01Get full text
Article -
7235
Analysis of Climate Change from the Aliguodarz Region Farmers’ Viewpoint with an Emphasis on the Central District
Published 2013-11-01“…Therefore, it is necessary to predict or simulate this effect using various available tools in the field of management, to ensure consumer food security and the maximum welfare of producers, with the necessary planning and policy making. …”
Get full text
Article -
7236
COLLATERAL DETERMINATS IN BANK RISK MANANAGEMENT: THE REGIONAL CASE
Published 2018-05-01“…This study is based on linear regression models evaluated by the least square method. Private data of secured small and medium business loans is used. …”
Get full text
Article -
7237
Amerika Birleşik Devletleri’nin NSC-68 Çerçevesinde Uyguladığı Soğuk Savaş Stratejisi ve Türkiye’ye Yansımaları
Published 2021-12-01“…In order to fight with this threat, the report number 68 (NSC-68) was prepared and implemented by the American National Security Council in 1950. In this study, in addition to the analysis of the NSC-68 which was one of the most significiant documents of the Cold War, its Cold War strategy implemented against the USSR and its relations with Turkey are examined accordingly. …”
Get full text
Article -
7238
Estimating energy consumption and GHG emissions in the U.S. food supply chain for net-zero
Published 2025-02-01Get full text
Article -
7239
The Impact of Collaboration Patterns and Network Centrality on Long-Term Contribution in GitHub Project
Published 2025-01-01Get full text
Article -
7240