Results 21 to 30 of about 396 (94)

La geografia al tempo della crisi: territorial rigor vs spatial austerity [PDF]

open access: yes, 2014
Taking inspiration from the ideas of A. Pettifor (2006), A. Rodriguez-Pose (2010), M. Kitson, R. Martin and P. Tyler (2011), the section analyses and discusses the so defined Geographies of Austerity in front of the current crisis.
Prezioso, M
core   +1 more source

Residual-based inference on moment hypotheses, with an application to testing for constant correlation [PDF]

open access: yes, 2016
Often, inference on moment properties of unobserved processes are conducted on the basis of estimated counterparts obtained in a preliminary step. In some situations, the use of residuals instead of the true quantities affects inference even in the ...
Demetrescu, Matei, Wied, Dominik
core  

FDI influence over Romanian exports [PDF]

open access: yes, 2013
: Competition between countries, regions, company groups and individual companies is getting more and more complex due to globalisation and trade liberalization. Constraints on companies competitivity, especially on SMEs are harder to identify and outrun.
Ivan, Maria - Alexandra
core   +1 more source

The association of stressful life events on weight loss efforts among African American breast cancer survivors. [PDF]

open access: yesJ Cancer Surviv, 2022
Kwarteng JL   +5 more
europepmc   +1 more source

The Beacon, October 14, 2013 [PDF]

open access: yes, 2013
Vol.
Florida International University
core  

Study of values in sociology of public administration on the example of public employees' values in the Republic of Sakha (Yakutia) [PDF]

open access: yes, 2016
The article represents the results of public employees' axiological basis study in the Republic of Sakha (Yakutia). The authors analyse values within the sociology of public administration and management and in accordance with Talcott Parsons' concept ...
Pavenkov, Oleg   +2 more
core   +1 more source

Ransomware: A New Era of Digital Terrorism [PDF]

open access: yes, 2018
This work entails the study of ten nasty ransomwares to reveal out the analytical similarities and differences among them, which will help in understanding the mindset of cyber crooks crawling over the dark net.
Indu, Richa, Sharma, Anuj
core   +1 more source

Different Successful Patterns for Implementing Holding Model in Public Sector [PDF]

open access: yes, 2013
Background: Transitions in the modern business environment cause significant organizational changes not only in private companies, but also in the public sector.
Ivan Todorović   +2 more
core   +2 more sources

Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. [PDF]

open access: yesComput Secur, 2021
Lallie HS   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy