Results 91 to 100 of about 2,457,982 (249)
Pandemic Influenza: Ethics, Law, and the Public\u27s Health [PDF]
Highly pathogenic Influenza (HPAI) has captured the close attention of policy makers who regard pandemic influenza as a national security threat. Although the prevalence is currently very low, recent evidence that the 1918 pandemic was caused by an avian
Berkman, Benjamin E. +1 more
core +1 more source
Green Hunter or Green Detractor? Strategic Orientations and Green Revenues
Abstract We bridge a research gap concerning whether varying strategic orientations can be aligned with the transition to greener business practices. Drawing on resource‐based theory and stakeholder theory, we investigate how growth‐ and profit‐oriented strategic orientations shape firms’ capacity to generate green revenues that integrate economic ...
June Cao +2 more
wiley +1 more source
Intelligent ECCM technology via cognition and agility for the airborne radar
The electronic counter countermeasures (ECCM) technology is crucial to the modern airborne radar. In this study, opposed to the intelligent electronic countermeasure system, an intelligent anti-jamming technology is developed, which adjusts the working ...
Luo Meifang, Hao Zhimei, Zhu Yimin
doaj +1 more source
De‐Dollarization Is a Plausible Outcome of the New Washington Consensus
ABSTRACT A trend towards de‐dollarization of the global economy in which the US dollar ceases to be used as the world's reserve currency for international transactions confronts some of the existing structures of international economic law, built upon the rules set out by US‐led organizations like the WTO, the IMF, and the World Bank. This article will
David Collins
wiley +1 more source
Password Cracking and Countermeasures in Computer Security: A Survey
With the rapid development of internet technologies, social networks, and other related areas, user authentication becomes more and more important to protect the data of the users.
Chao, Lidia S. +2 more
core
ABSTRACT This article examines what is known at this stage, before the envisaged publication of the legislative proposal by the European Commission in March/April 2025, about the European Union's Space Act, focusing on its potential application to non‐EU operators.
Ingo Baumann, Katharina Prall
wiley +1 more source
Summary Background This study aimed to assess the acceptance of Germany's adoption of digital health interventions (DHI) among dermatology patientsand to identify patient clusters. Patients and Methods A cross‐sectional, quantitative survey on acceptability and (future) usage of DHIs was conducted among patients with chronic dermatological conditions ...
Patrick Reinders +2 more
wiley +1 more source
Usable Security: Why Do We Need It? How Do We Get It? [PDF]
Security experts frequently refer to people as “the weakest link in the chain” of system security. Famed hacker Kevin Mitnick revealed that he hardly ever cracked a password, because it “was easier to dupe people into revealing it” by employing a range
Flechais, I, Sasse, MA
core
Learning Through Co‐opetition: How Knowledge Sharing Builds Supply Chain Resilience
ABSTRACT This study explores how knowledge sharing among competing firms (co‐opetition) influences risk management and enhances supply chain resilience. Grounded in organizational learning theory, the study examines how co‐opetition enhances firms' visibility into the emerging challenges of tomorrow's world, enabling proactive risk management that can ...
Jacob C. Jensen +4 more
wiley +1 more source
Offline and online task allocation algorithms for multiple UAVs in wireless sensor networks
In recent years, UAV techniques are developing very fast, and UAVs are becoming more and more popular in both civilian and military fields. An important application of UAVs is rescue and disaster relief.
Liang Ye +5 more
doaj +1 more source

