Results 101 to 110 of about 158,711 (305)
Аналіз імперативності норм застосування комплексних систем захисту інформації в системах, що обробляють відкриту інформацію, яка є власністю держави [PDF]
The article analyzed the legal grounds for mandatory application of Integrated Systems for Information Security in information and telecommunication systems that process the public information, which is owned by the state. Based on this analysis it was
Мохор, В.В. +2 more
core
ABSTRACT Environmental sustainability and political influence increasingly shape corporate strategy, yet the link between politically appointed executives and firms' environmental actions remains underexplored. This study investigates whether political appointments to top executive positions influence the adoption of green action initiatives and how ...
Post Raj Pokharel +3 more
wiley +1 more source
CHAPTER 9. INFORMATION SECURITY IN THE STRUCTURE OF THE SECURITY COMPLEX
The essence of the security complex is revealed. Approaches to understanding the essence of information security are determined, in particular, as a state of security, as a type of public information legal relations, the direction of information ...
Сергій СТАВЧЕНКО
doaj +1 more source
Left: Desulphurization method application. Right: Novel desulphurization method. Abstract The presence of hydrogen sulphide (H2S) in biogas poses significant environmental and operational challenges due to its corrosive and toxic properties. Thus, this study aimed to develop a dual‐function desulphurization system using a cation exchange resin (CIER ...
Matheus Damásio Thrun +6 more
wiley +1 more source
National Identity Meaning and Attitudes Toward War, Peace, and the Future of Ukraine
ABSTRACT The link between attitudes and social identity is complex, influencing perceptions, motivations, and actions. Social psychological research mainly focused on the role of attitude in identity formation, particularly in the contexts of social movements and collective action.
Karina V. Korostelina +6 more
wiley +1 more source
REGULATORY AND LEGAL SUPPORT OF INFORMATION SECURITY IN UKRAINE
The article examines trends in the development of legal regulation of information security in Ukraine in the context of the implementation of the Association Agreement between Ukraine and the European Union. The current information legislation and regulations on information security are analyzed.
Oleksandr Malashko, Serhii Yesimov
openaire +1 more source
The ISCIP Analyst, Volume XIII, Issue 2 [PDF]
This repository item contains a single issue of The ISCIP Analyst, an analytical review journal published from 1996 to 2010 by the Boston University Institute for the Study of Conflict, Ideology, and ...
Adami, Fabian +8 more
core +2 more sources
Optimization of Additive Fibonacci Generators Based on Primitive Polynomials Over GF(p)
This paper presents an approach to the modification of the additive Fibonacci generator by implementing it based on primitive polynomials over the field GF(p).
Pawel Sawicki +7 more
doaj +1 more source
From Custom to Court: The Evolution of Mediation in European Legal Systems
ABSTRACT This article traces how European mediation has repeatedly rebalanced three variables—(1) the source of mediator authority, (2) the degree of institutionalization, and (3) the operative meaning of voluntariness—from antiquity to the present. Using three periods—Proto‐Mediation (c. 500 BCE–c. 1750), Classical Mediation (c.
Viktoriia Hamaiunova
wiley +1 more source
From Waste to Value: A Bibliometric‐Systematic Review of Biogas and Biomethane Business Literature
ABSTRACT In response to escalating environmental challenges and the growing demand for sustainable energy solutions, the agri‐food sector is increasingly exploring business models grounded in circular economy (CE) principles based on the production of biogas and biomethane.
Silvia Cantele +3 more
wiley +1 more source

