Results 81 to 90 of about 233,719 (314)

Adolescent Cyberviolence in South Korea: A Multi‐Year, National Population‐Based Study of Cyberviolence Prevalence (2017–2024)

open access: yesBehavioral Sciences &the Law, EarlyView.
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan   +2 more
wiley   +1 more source

Classification of Rank 2 Cluster Varieties [PDF]

open access: yes, 2019
We classify rank $2$ cluster varieties (those for which the span of the rows of the exchange matrix is $2$-dimensional) according to the deformation type of a generic fiber $U$ of their ${\mathcal X}$-spaces, as defined by Fock and Goncharov [Ann. Sci. \'
Mandel, Travis
core   +3 more sources

Hacking Quantum Key Distribution via Injection Locking [PDF]

open access: yesPhysical Review Applied, 2019
Unconditionally secure communication, being pursued for thousands of years, however, hasn't been reached yet due to continuous competitions between encryption and hacking.
Xiao-Ling Pang   +6 more
semanticscholar   +1 more source

A Social Entrepreneurship Perspective of De‐Carbonising the Footprint through Recycling Compensation: A Case Study of the NGO Madre Coraje

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This research analyses the carbon footprint of the NGO Madre Coraje, using an integrated methodology that combines the calculator provided by REAS (Red de Economía Alternativa y Solidaria) Navarra and the Life Cycle Assessment (LCA). It quantifies emissions across the three scopes of the Greenhouse Gas Protocol, evaluating both direct and ...
José Fernandez‐Serrano   +2 more
wiley   +1 more source

A Comprehensive Overview of Government Hacking Worldwide

open access: yesIEEE Access, 2018
There has been an ongoing and heated public policy debate on the appropriate role of and limitations to government hacking in maintaining a proper balance of national security and privacy. Asserting that they are compelled to use government hacking tools
Chen-Yu Li   +4 more
doaj   +1 more source

A smart configuration of computer as a prevention from hacking and cyber espionage [PDF]

open access: yesTehnika, 2016
In a modern business world, IT systems are frequently exposed to attacks, business espionage and the other cyber incidents. Many software tools of nowadays got a remote access option to another computer which is suitable for a cyber espionage as well as ...
Đekić Milica D.
doaj   +1 more source

'Working our way to health': Final Evaluation Report [PDF]

open access: yes, 2009
This summary presents the findings of an independent evaluation of the ‘Working our Way to Health’ programme. This programme was delivered by Sefton PCT, funded through the Neighbourhood Renewal Fund, and was aimed at improving the health of men in three
Hacking, S, Robertson, S, Robinson, M
core  

Drone Hacking with Raspberry-Pi 3 and WiFi Pineapple: Security and Privacy Threats for the Internet-of-Things

open access: yes2019 1st International Conference on Unmanned Vehicle Systems-Oman (UVS), 2019
The use of Internet-of-Things (IoT) technology is growing exponentially as more consumers and businesses acknowledge the benefits offered by the intelligent and smart devices.
O. Westerlund, R. Asif
semanticscholar   +1 more source

Enhancement of the Plant‐Accessible Phosphate Fraction in Sewage Sludge Ashes by Na+ or K+ Addition Prior to Combustion

open access: yesChemSusChem, Volume 18, Issue 6, March 15, 2025.
The addition of Na2CO3 or K2CO3 to sewage sludge prior to combustion leads to the production of ashes containing phosphate in the form of buchwaldite‐like phases (Ca(Na/K)PO4). Compared to conventional sewage sludge mono‐ashes, such Na‐ or K‐ashes show greatly increased P‐solubilities and proved to be potent P‐fertiliser materials in greenhouse ...
Lorenz Bier‐Schorr   +4 more
wiley   +1 more source

How Changing Narratives About the Future Shape Policymaking for the Long Term

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT How can we explain decisions by governments to engage in policy investments—accepting short‐term costs in return for anticipated gains in the longer term—after previously sustaining the status quo? Our article examines the role of narratives in changing expectations about the future as a key driver of intertemporal policymaking. In light of an
Pieter Tuytens, Charlotte Haberstroh
wiley   +1 more source

Home - About - Disclaimer - Privacy