Suggested Topics within your search.
Suggested Topics within your search.
- Sales 1
-
281
The impact of health information seeking and social influence on functional food purchase intention
Published 2025-02-01Get full text
Article -
282
Features of democratic reforms in Jordan
Published 2013-04-01“…In this context the possibility of mass anti-monarchy protests can’t be excluded. At the same time King Abdullah and his political proponents are well aware of this challenge and the dependence on the development of the situation in the Middle East, as well as financial and military support of powerful Western States and the Golf oil-producing monarchies. …”
Get full text
Article -
283
Navigating Privacy: A Global Comparative Analysis of Data Protection Laws
Published 2025-01-01Get full text
Article -
284
Capable design or designing capabilities? An exploration of service design as an emerging organizational capability in Telenor – Martinkenaite
Published 2017-01-01“…This empirical paper examines a process, starting with the managerial decision to make service design an organizational capability, and follows it as it unfolds over time within one organization. Service design has become an established business practice of how firms create new products and services to promote differentiation in an increasingly uncertain business landscape. …”
Get full text
Article -
285
Designing a cyber insurance implementation model using foundational data theory
Published 2024-05-01“…With the expansion of the Internet in the business of organizations, a space called cyber was created, which boosted business activities and interactions (Swiss Re, 2014; Chief Risk Officers Forum, 2014). …”
Get full text
Article -
286
THE SOCIAL PROTEST «WITH CHINESE PARTICULARITY»: THE SHIFTING VECTOR
Published 2015-08-01Get full text
Article -
287
Generative AI, IoT, and blockchain in healthcare: application, issues, and solutions
Published 2025-01-01Get full text
Article -
288
Integrating landscape ecological risk with ecosystem services in the Republic of Tatarstan, Russia
Published 2024-04-01Get full text
Article -
289
MIGRATION, REMITTANCES, AND LOCAL DEVELOPMENT IN MOLDOVA
Published 2023-12-01“…The results revealed that remittances often support the household's budget, covering the salary gap, and contribution on initiation of the local businesses. To encourage the investment of remittances in local infrastructure and entrepreneurship, the government launched several programs that aim to subsidize migrants’ business incentives. …”
Get full text
Article -
290
Knowledge Graph Entity Similarity Calculation under Active Learning
Published 2021-01-01Get full text
Article -
291
-
292
Competitive strategies of differentiation and cost minimization
Published 2019-09-01“…It is unsufficient the single of cost minimization in the international competing, it is necessary the complex and creative decision of the compound problems, associated with differentiation of products and services.Product differentiation is a business strategy, whereby firms attempt to gain a competitive advantage by increasing the perceived value of their products/services relative to perceived value the other products/services firms; with recording dissatisfied inquiring the customers. …”
Get full text
Article -
293
-
294
LEGAL MIGRATION – RIGHTS AND BENEFITS IN THE EUROPEAN SOCIAL SECURITY SYSTEM
Published 2024-12-01Get full text
Article -
295
Review of cryptographic application security evaluation techniques for new critical infrastructures
Published 2023-12-01“…The construction of new critical infrastructure, represented by high-speed full-time signal coverage, intelligent and fine-grained urban management, and deep space and deep sea scientific innovation experimental fields, has entered a new stage with the deep integration and development of new technologies such as 5G/6G, artificial intelligence, and blockchain in various fields.The security evaluation of cryptography applications, as a key technological resource for ensuring the security of national information, integration, and innovation infrastructure, has risen to the level of international law and national development strategy.It is urgent to construct a comprehensive, fine-grained, and self-evolving cryptography security evaluation system throughout the data lifecycle.The typical APT attacks and ransomware attacks faced by new critical infrastructure in industries such as energy, medicine, and transportation in recent years were considered.And then the growing demand for security evaluation of cryptography applications was analyzed in the face of new business requirements such as preventing endogenous data security risks, achieving differentiated privacy protection, and supporting authenticated attack traceability.The new challenges were also examined, which were brought by new information infrastructure (including big data, 5G communication, fundamental software, etc.), integration infrastructure (including intelligent connected vehicles, intelligent connected industrial control systems, etc.), and innovation infrastructure (including big data, artificial intelligence, blockchain, etc.) to the security evaluation of cryptography applications.Furthermore, the new requirements were revealed about domestically produced cryptography algorithms and protocols deployed on high-performance computing chips, ultra-high-speed communication modules, and large-capacity storage media for cryptography application security evaluation technology.Finally, the development of automated and intelligent cryptography application security evaluation technology was explored.…”
Get full text
Article -
296
Research on evolution and security risk of Metaverse
Published 2022-04-01“…Recently, the Metaverse boom has swept the world.To improve the voice in the future digital field, major countries and well-known enterprises have accelerated arrangement of this emerging industry.However, there is no unified definition and ultimate form description of Metaverse.It is urgent to understand the essential characteristics, evolution trend and security risks of Metaverse scientifically, which can promote the high-quality development of China’s electronic information industry and ensure the cyberspace security.With literature research and related information analysis, the definition of Metaverse was put forward based on the core concepts such as technology and application iteration, economic and business model and the role of social relations.Additionally, the development and evolution of Metaverse were divided into four stages (data creation, digital bionics, virtual mirror and virtual-real symbiosis) according to the evolution degree of space category, space-time dimension, key technology and virtual real interaction.And the characteristics and corresponding forms of each stage were expounded.Then it analyzed the main reasons for the popularity of the Metaverse from the perspectives of innovative application demand, virtual life transformation, commercial value driving and political power driving.Focusing on the problems of challenging the national governance system, impacting the mainstream ideology, manipulating the capital market, causing potential social problems and misleading the layout of technology industry, it analyzed the multiple security risks and threats brought by the Metaverse wave from perspectives including politics, culture, economy, society and technology.It is suggested that the Metaverse is still in the stage of concept improvement and product exploration now.China should rationally grasp the development opportunities of the Metaverse based on the current situation of the electronic information industry, prepare for risks in advance, build a digital governance supervision system, stimulate industrial innovation and open development, consolidate the support of network information security, and create a healthy and orderly international environment.…”
Get full text
Article -
297
Quantitative Detection of Financial Fraud Based on Deep Learning with Combination of E-Commerce Big Data
Published 2020-01-01Get full text
Article -
298
Decision Process Analysis on Project Priority Strategy: A Case Study of an ICT Design Firm
Published 2014-01-01“…The findings indicate that a profit-driven project can dominate the firm’s strategic operations and management from the resource-based view and analytic hierarchy process technique perspectives. At the same time, the analysis results contribute significant values to project decision management, which is highly recommended for small-medium enterprises conducting product/project development, project portfolio management, and strategic business management.…”
Get full text
Article -
299
Integrated Planning for Shared Electric Vehicle System Considering Carbon Emission Reduction
Published 2024-12-01Get full text
Article -
300