Showing 7,221 - 7,240 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 7221

    Modern Diplomacy and the Changing Nature of International Politics in the 21st Century by Marc E. Oosthuizen

    Published 2024-08-01
    “…[i] This intricacy is because the post-Cold War international era requires diplomacy to move from being foremost about high politics such as security, military and geopolitical issues to incorporating a wider and growing scope of issues outside of a state’s national borders like migration, gender, global warming, desertification and diseases. …”
    Get full text
    Article
  2. 7222

    Defending Against Advanced Persistent Threats Using Game-Theory. by Stefan Rass, Sandra König, Stefan Schauer

    Published 2017-01-01
    “…The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. …”
    Get full text
    Article
  3. 7223

    Cultural Tourism Management: Advanced Tools and Technologies by Bojana Milenović

    Published 2025-01-01
    “…On the other hand, the blockchain technology could offer numerous advantages in the field of cultural tourism, from enhanced security and transparency to process automation and the creation of innovative visitor experiences. …”
    Get full text
    Article
  4. 7224

    NAVIGATING CLIMATE CHALLENGES: STRATEGIC DIRECTIONS FOR A SUSTAINABLE FUTURE by Krzysztof Goniewicz, Amir Khorram-Manesh, Frederick Burkle

    Published 2024-06-01
    “…This paper delves into six critical pathways to effectively address the climate crisis: (1) reinventing food systems, (2) preparing for population shifts, (3) upholding human rights, (4) investing in clean energy, (5) educating for a climate-conscious society, and (6) securing financial and political support. It underscores the need to make food systems resource-efficient and biodiversity-conscious. …”
    Get full text
    Article
  5. 7225

    SERVICE QUALITY AND CUSTOMER SATISFACTION THROUGH AIRQUAL DIMENSIONS: AN EMPIRICAL INVESTIGATION ON IRAQI AIRWAYS by Alaa S. Jameel

    Published 2025-01-01
    “…The results indicate that five service quality dimensions—airline tangibles, terminal tangibles, security and safety, personnel services, and airline image—have a positive and significant effect on customer satisfaction. …”
    Get full text
    Article
  6. 7226

    Fra armesterke bondesønner til akademikerbarn by Paul Larsson

    Published 2010-08-01
    “…The most common reason for wanting to become a police officer is that it is an occupation with multiple and varying tasks, that it allows work with people, and that it is seen as a stable, secure Job. There is little if any indication that the students today are more "academic" in their perceptions of the work than before. …”
    Get full text
    Article
  7. 7227

    OTN+5G education private network empowers digital transformation--taking the construction of education private network in Bao’an District, Shenzhen as an example by XIAO Chunguang

    Published 2024-11-01
    “…Empower the digital transformation of regional education through the standardization guidelines and standards of the education private network, the establishment of a strong security system, and the promotion of educational development.…”
    Get full text
    Article
  8. 7228

    GOVERNMENTAL SUPPORT MECHANISM OF THE RENEWABLE ENERGY IN GERMANY by N. V. Kozaeva

    Published 2016-06-01
    “…Energy reform is intended to increase the energy security level by increasing the share of renewables in its energy portfolio, environmental protection by decreasing the emission into the atmosphere and the level of energy consumption. …”
    Get full text
    Article
  9. 7229

    Implementation of an Android-Based Attendance Application with Geofence Method for Employee Monitoring Efficiency by Arlan Leon Allacsta, T. Yudi Hadiwandra

    Published 2024-11-01
    “…Application testing was conducted based on the ISO 25010 standard, covering eight aspects: functionality, reliability, efficiency, portability, maintainability, compatibility, security, and usability. The test results indicate that this application performs well in all these aspects. …”
    Get full text
    Article
  10. 7230

    Flexibility in Power Systems of Integrating Variable Renewable Energy Sources by Wojciech Lewicki, Hasan Huseyin Coban

    Published 2023-03-01
    “…The issue of energy security is addressed in many publications and by specialists in many fields. …”
    Get full text
    Article
  11. 7231

    Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks by Vinod Namboodiri, Abtin Keshavarzian

    Published 2011-01-01
    “…This is particularly important for security-related applications like intrusion detection and fire alarm systems. …”
    Get full text
    Article
  12. 7232

    Analysis of bottleneck technology identification and development characteristics in the electronic manufacturing industry. by Lei Zhou

    Published 2024-01-01
    “…It underscored the significance of promptly analyzing the evolutionary traits of these technologies within the industry and engaging in research and development endeavors to safeguard national technological security. To address this issue, the study initially extracted pertinent industry enterprises from the Orbis database. …”
    Get full text
    Article
  13. 7233

    Determinants of digital bank transformation: a systematic literature review with prisma and bibliometrics by Wahyu Avianto, Hermanto Siregar, Anny Ratnawati, Mulya E Siregar

    Published 2024-11-01
    “…The determinants in the digital bank transformation process include the level of digitalization, application user growth, IT investment, IT committee, cyber security, and ecosystem stocks. The results of this literature review will be a reference for further research related to digital banks, in line with the rapid digital transformation process in banking.…”
    Get full text
    Article
  14. 7234
  15. 7235

    Analysis of Climate Change from the Aliguodarz Region Farmers’ Viewpoint with an Emphasis on the Central District by Mohammad Tavakoli, Bohlol Alijani, Reza Borna, Hosain Mohammadi

    Published 2013-11-01
    “…Therefore, it is necessary to predict or simulate this effect using various available tools in the field of management, to ensure consumer food security and the maximum welfare of producers, with the necessary planning and policy making. …”
    Get full text
    Article
  16. 7236

    COLLATERAL DETERMINATS IN BANK RISK MANANAGEMENT: THE REGIONAL CASE by A. M. Karminsky, O. D. Khon

    Published 2018-05-01
    “…This study is based on linear regression models evaluated by the least square method. Private data of secured small and medium business loans is used.  …”
    Get full text
    Article
  17. 7237

    Amerika Birleşik Devletleri’nin NSC-68 Çerçevesinde Uyguladığı Soğuk Savaş Stratejisi ve Türkiye’ye Yansımaları by Serpil GÜDÜL

    Published 2021-12-01
    “…In order to fight with this threat, the report number 68 (NSC-68) was prepared and implemented by the American National Security Council in 1950. In this study, in addition to the analysis of the NSC-68 which was one of the most significiant documents of the Cold War, its Cold War strategy implemented against the USSR and its relations with Turkey are examined accordingly. …”
    Get full text
    Article
  18. 7238
  19. 7239
  20. 7240