Showing 4,301 - 4,320 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 4301

    Identifying and prioritizing cultural factors affecting the physical structure of the city with emphasis on indigenous architecture (Case study: Sarab city) by Mohammad Golmohammadi, Mohammad Adalatkhah, Akbar Abdollahzadeh Tarf

    Published 2020-12-01
    “…The results of the BMW model showed that among the identified factors, the privacy factor with a final score of 0.298 in the first place, the security quality factor with a final score of 0.273 in the second place, the nature connection factor and social interactions with a final score of 220 / 0 is in the third place and the hierarchical factor is in the fourth place with a final score of 0.209.…”
    Get full text
    Article
  2. 4302

    E-Municipality and Public Relations in Digitalized Cities: An Interpretive Content Analysis on TR42 Region Municipalities by İlayda Uzun, Hasan Tutar

    Published 2024-06-01
    “…The websites of the municipalities in question in the research were analyzed with interpretive content analysis techniques regarding Security/Privacy, Citizen and Social Interaction, and operational-formal informational and Strategic Skill variables and various suggestions were made. …”
    Get full text
    Article
  3. 4303

    Modern State and civil society: promising directions and forms of interaction in the field of public administration by O. M. Muzychuk, K. L. Buhaichuk

    Published 2023-10-01
    “…The promising directions of interaction between the modern State and civil society, which are divided into separate forms, include interaction of the State with members of diasporas through various institutions and practices, interaction of the State with civil society institutions formed by higher education students, interaction of the State with civil society in the field of environmental security of the State.…”
    Get full text
    Article
  4. 4304

    Decision making about increased building automation – barriers, drivers and motivation factors by Anna-Lena Lane, Anna-Lena Lane, Andreas Selhammer, Patrik Thollander, Patrik Thollander, Mathias Cehlin

    Published 2025-01-01
    “…An important knowledge barrier was found as knowledge is needed for decisions about investments, use of BMS and decisions regarding IT security, such as handling of data. A key conclusion is the need for a facilitator, as knowledge is needed for decisions about BMS investments and for its use. …”
    Get full text
    Article
  5. 4305

    Practical skills of psychology bachelors in working with automated HR platforms by P. Bleshmudt, O. Fil

    Published 2024-12-01
    “…Particular attention should be paid to improving data security, which is becoming critical when working with HR platforms, as employees’ personal data needs to be protected from unauthorized access. …”
    Get full text
    Article
  6. 4306

    Analysis of the Energy Complex Member of the EАEU Countries and the Formation of Groups-Technologies of its Digitalization by M. I. Rusetskaya, T. F. Mancerova, E. P. Korsak

    Published 2023-04-01
    “…It is concluded that digitalization of the electric power system on the technical side increases the energy security of the state and the competitiveness of the energy system on the world market, and on the economic side it helps to reduce costs at all stages of the entire technological cycle.…”
    Get full text
    Article
  7. 4307

    Determining The Need for Fire Stations by Backup Double Covering Approach and Location Selection: The Case of Trabzon City by Şeyda Kuku, Ersin Türk

    Published 2021-07-01
    “…Fire stations are emergency service units that serve for the security of lives and property in urban areas. It is critical for public safety to ensure the highest level of service ensuring a prompt response to the need. …”
    Get full text
    Article
  8. 4308

    Digital literacy model to improve the marketing skills of micro, small, and medium enterprises women with a community-based educational approach by Trisninawati Trisninawati, Dewi Sartika

    Published 2024-07-01
    “…The main challenges faced are difficulties adapting to digital technology and concerns about digital security. Most respondents still rely on conventional marketing methods and feel less confident managing digital marketing campaigns. …”
    Get full text
    Article
  9. 4309
  10. 4310

    Application and Thinking of Deep Learning in Predicting Lateral Cervical Lymph Node Metastasis of Papillary Thyroid Cancer by Shengli SHAO, Jiheng WANG, Shanting LIU

    Published 2025-01-01
    “…With the establishment and sharing of large datasets, automated annotation, algorithm optimization, and resolution of data security issues, deep learning is expected to accurately predict lateral neck lymph node metastasis in PTC. …”
    Get full text
    Article
  11. 4311

    Employee Performance Evaluation Using A New Preferential Voting Process by Mehdi Soltanifar, Seyed Abdullah Heidariyeh

    Published 2020-11-01
    “…Twelve performance evaluation indicators extracted from the research background by experts in four categories with the titles of service compensation system in the first category; Job security, perceived organizational justice, perceived organizational support, and physical working conditions in the second category; Job characteristics, job clarity and ability of employees in the third category and job feedback, job stress, organizational citizen behaviour and motivation in the fourth category were ranked and documented using a linear optimization model based on the goal programming and policy. …”
    Get full text
    Article
  12. 4312

    Farmers and Agricultural Extension Officers Perception of Striga gesnerioides (Willd.) Vatke Parasitism on Cowpea in the Upper East Region of Ghana by Peter Haruna, Aaron T. Asare, Elvis Asare-Bediako, Francis Kusi

    Published 2018-01-01
    “…Walp] is an important food security crop in Sub-Saharan Africa. However, cowpea production in some parts of this region is constrained by Striga gesnerioides (Willd.) …”
    Get full text
    Article
  13. 4313

    Limitation of the constitutional rights and freedoms of a person and a citizen in connection with the military aggression of the russian federation by Shevchuk L.

    Published 2024-06-01
    “…In the course of this study, an analysis of the application of restrictions on the constitutional rights and freedoms of a person and a citizen in connection with the military aggression of the russian federation, as well as the effect of these restrictions on the ordinary life of an ordinary Ukrainian, their effectiveness in relation to the security of the state as a whole, was carried out. …”
    Get full text
    Article
  14. 4314

    Effective factors on variations of wheat production in climatic regions of Fars province by leyla sharifi, saeed bazgeer, hosain mohmmadi, alireza darbaneh astaneh, mostafa karimi ahmadabad

    Published 2020-06-01
    “…Therefore, a deeper understanding of the impact of regional climate change on production ensures global food security. Wheat is one of the most strategic crops and examining different aspects of its production is a necessity of every agricultural community. …”
    Get full text
    Article
  15. 4315

    Geography of Sand and Gravel Mining in the Lower Mekong River by Jean-Paul Bravard, Marc Goichot, Stéphane Gaillot

    Published 2013-12-01
    “…Currently, the most important issue in the Mekong basin is certainly the threat to the delta coastline because of its importance in terms of food security for the growing populations of Vietnam and Cambodia. …”
    Get full text
    Article
  16. 4316

    Addressing technology-mediated stigma in sexual health-related digital platforms: Insights from design team members. by Abdul-Fatawu Abdulai, Amanda Fuchsia Howard, Paul J Yong, Leanne M Currie

    Published 2025-02-01
    “…., pop-up notifications, infographics, and video-based testimonials, and avoiding the use of cookies or other security-risk features) and non-functional design considerations (i.e., adopting an interprofessional and collaborative approach to design, educating software designers on domain knowledge about stigma, and ensuring consistent user testing of content). …”
    Get full text
    Article
  17. 4317

    Human drone interaction in delivery of medical supplies: A scoping review of experimental studies. by Franziska Stephan, Nicole Reinsperger, Martin Grünthal, Denny Paulicke, Patrick Jahn

    Published 2022-01-01
    “…Users must become integral part of the whole development process of medical drone services to reduce concerns, and to improve security, usability and usefulness of the system. Human drone interaction should be developed according to the identified categories of human drone interaction by using demand- and technology-driven approaches.…”
    Get full text
    Article
  18. 4318

    Advancing Sustainable Development Goals through Earth Observation Satellite Data: Current Insights and Future Directions by Qiang Zhao, Le Yu

    Published 2025-01-01
    “…For example, Sentinel data support both marine ecosystem monitoring (SDG 14) and climate adaptation (SDG 13), while Landsat data contribute to food security (SDG 2) and water resource management (SDG 6). …”
    Get full text
    Article
  19. 4319

    Factors influencing academic staff satisfaction and continuous usage of generative artificial intelligence (GenAI) in higher education by Maria Ijaz Baig, Elaheh Yadegaridehkordi

    Published 2025-02-01
    “…The social influence did not correlate positively with the use of GenAI. Security and privacy were positively associated with staff satisfaction. …”
    Get full text
    Article
  20. 4320

    Process of effective management of the Eurasian transport system on the terms of integration by E. V. Pustynnikova

    Published 2023-12-01
    “…Ensuring stability, security and prosperity in the Eurasian region meets interests of many states, primarily Russia and China, as well as their closest partners. …”
    Get full text
    Article