Results 91 to 100 of about 2,457,982 (249)

Pandemic Influenza: Ethics, Law, and the Public\u27s Health [PDF]

open access: yes, 2007
Highly pathogenic Influenza (HPAI) has captured the close attention of policy makers who regard pandemic influenza as a national security threat. Although the prevalence is currently very low, recent evidence that the 1918 pandemic was caused by an avian
Berkman, Benjamin E.   +1 more
core   +1 more source

Green Hunter or Green Detractor? Strategic Orientations and Green Revenues

open access: yesBritish Journal of Management, EarlyView.
Abstract We bridge a research gap concerning whether varying strategic orientations can be aligned with the transition to greener business practices. Drawing on resource‐based theory and stakeholder theory, we investigate how growth‐ and profit‐oriented strategic orientations shape firms’ capacity to generate green revenues that integrate economic ...
June Cao   +2 more
wiley   +1 more source

Intelligent ECCM technology via cognition and agility for the airborne radar

open access: yesThe Journal of Engineering, 2019
The electronic counter countermeasures (ECCM) technology is crucial to the modern airborne radar. In this study, opposed to the intelligent electronic countermeasure system, an intelligent anti-jamming technology is developed, which adjusts the working ...
Luo Meifang, Hao Zhimei, Zhu Yimin
doaj   +1 more source

De‐Dollarization Is a Plausible Outcome of the New Washington Consensus

open access: yesGlobal Policy, EarlyView.
ABSTRACT A trend towards de‐dollarization of the global economy in which the US dollar ceases to be used as the world's reserve currency for international transactions confronts some of the existing structures of international economic law, built upon the rules set out by US‐led organizations like the WTO, the IMF, and the World Bank. This article will
David Collins
wiley   +1 more source

Password Cracking and Countermeasures in Computer Security: A Survey

open access: yes, 2017
With the rapid development of internet technologies, social networks, and other related areas, user authentication becomes more and more important to protect the data of the users.
Chao, Lidia S.   +2 more
core  

The EU Space Act's Global Reach: Legal Considerations on the Envisaged Application to Non‐EU Operators

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article examines what is known at this stage, before the envisaged publication of the legislative proposal by the European Commission in March/April 2025, about the European Union's Space Act, focusing on its potential application to non‐EU operators.
Ingo Baumann, Katharina Prall
wiley   +1 more source

Attitudes of dermatological patients towards digital health interventions: a cross‐sectional survey and cluster analysis

open access: yesJDDG: Journal der Deutschen Dermatologischen Gesellschaft, EarlyView.
Summary Background This study aimed to assess the acceptance of Germany's adoption of digital health interventions (DHI) among dermatology patientsand to identify patient clusters. Patients and Methods A cross‐sectional, quantitative survey on acceptability and (future) usage of DHIs was conducted among patients with chronic dermatological conditions ...
Patrick Reinders   +2 more
wiley   +1 more source

Usable Security: Why Do We Need It? How Do We Get It? [PDF]

open access: yes, 2005
Security experts frequently refer to people as “the weakest link in the chain” of system security. Famed hacker Kevin Mitnick revealed that he hardly ever cracked a password, because it “was easier to dupe people into revealing it” by employing a range
Flechais, I, Sasse, MA
core  

Learning Through Co‐opetition: How Knowledge Sharing Builds Supply Chain Resilience

open access: yesJournal of Supply Chain Management, EarlyView.
ABSTRACT This study explores how knowledge sharing among competing firms (co‐opetition) influences risk management and enhances supply chain resilience. Grounded in organizational learning theory, the study examines how co‐opetition enhances firms' visibility into the emerging challenges of tomorrow's world, enabling proactive risk management that can ...
Jacob C. Jensen   +4 more
wiley   +1 more source

Offline and online task allocation algorithms for multiple UAVs in wireless sensor networks

open access: yesEURASIP Journal on Advances in Signal Processing
In recent years, UAV techniques are developing very fast, and UAVs are becoming more and more popular in both civilian and military fields. An important application of UAVs is rescue and disaster relief.
Liang Ye   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy