Results 61 to 70 of about 42,725 (305)

Overview of Constitutional Challenges to NSA Collection Activities and Recent Developments [PDF]

open access: yes, 2014
[Excerpt] Beginning in the summer of 2013, media reports of foreign intelligence activities conducted by the National Security Agency (NSA) have been published and are apparently based on unauthorized disclosures of classified information by Edward ...
Liu, Edward C.   +2 more
core   +2 more sources

Increased Risk of Intrahepatic Cholestasis of Pregnancy in SLE Women Exposed to Azathioprine

open access: yesArthritis &Rheumatology, Accepted Article.
Objectives To evaluate the risk of intrahepatic cholestasis of pregnancy (ICP) in azathioprine (AZA)‐exposed versus unexposed SLE pregnancies within the multi‐centre prospective Lupus in prEGnAnCY (LEGACY) cohort. Methods LEGACY is conducted at Systemic Lupus International Collaborating Centres in Canada, South Korea, Peru, and Mexico.
Reem Farhat   +14 more
wiley   +1 more source

The issues of enterprise growth in transition and post-transition period: the case of Polish 'Elektrim' [PDF]

open access: yes, 2001
Case study of Polish company Elektrim illustrates the changing basis of growth of enterprises between the transition and post-transition periods. Elektrim grew primarily through conglomeration in the transition period.
Dornisch, D, Radosevic, S, Yoruk, DE
core  

Company Location, Business Environment and Digital Maturity as Drivers of Environmental Innovation in Business

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Environmental protection has emerged as a global priority in the contemporary context. As pivotal actors in the transition towards sustainable development, companies play a crucial role through the adoption of environmental innovations. This study investigates how organisational characteristics—specifically geographical location, business ...
Carlos de las Heras‐Rosas   +3 more
wiley   +1 more source

Characteristics of Spanish adolescents’ and youngsters’ civic activity: e- citizenship [PDF]

open access: yesRevista Electrónica Interuniversitaria de Formación del Profesorado, 2011
In this study we aim to illustrate and provide data on the access, use, equipment, habits and motivations of Spanish adolescents and young people towards ICT (computers, networks, internet, mobile phones...).
Juan Antonio Fuentes Esparrell
doaj  

Intelligent Manufacturing, Industrial Agglomeration, and Green and Low‐Carbon Development: A Nonlinear Path Test Based on the Theory of Ecological Modernization

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Drawing upon ecological modernization theory as the analytical framework, this study employs macro‐level longitudinal tracking data covering China's major regions as research samples. It measures the green and low‐carbon development (GLCD) of manufacturing from the four dimensions—“carbon reduction, pollution mitigation, ecological expansion ...
Deng Wang   +4 more
wiley   +1 more source

Testing the Social Investment Principle Around Childbirth: Little Evidence for Personality Maturation Before and After Becoming a Parent

open access: yesEuropean Journal of Personality, EarlyView., 2020
Abstract In line with the social investment principle, becoming a parent should lead to more mature behaviour and an increase in conscientiousness, agreeableness, and emotional stability. However, previous research provided mixed results that do not support this idea.
Eva Asselmann   +2 more
wiley   +1 more source

El Islam en Internet: el concepto de ciberislam

open access: yesRevista de Estudios Internacionales Mediterráneos, 2009
The new technologies of information and communication have become essential part of our lives. Internet, mobile telephony and other digital platforms are essential in many fields.
Guerrero Enterría, Arturo
doaj  

Novel Unsupervised SPITters Detection Scheme by Automatically Solving Unbalanced Situation

open access: yesIEEE Access, 2017
Spam over Internet telephony (SPIT) is recognized as a new threat for voice communication services such as voice over Internet protocol (VoIP). Due to the privacy reason, it is desired to detect SPITters (SPIT callers) in a VoIP service without training ...
Kentaroh Toyoda   +3 more
doaj   +1 more source

IDENTIFIKASI UANG KERTAS MENGGUNAKAN METODE BACKPROPAGASI PADA SISTEM INTERNET-TELEPON UMUM [PDF]

open access: yes, 2011
Now a days, the communication device is being a part of the human lifestyles. In every activity, the communication device either cellphones or fixed phone being a primary device to doing a telecomunication.
Khalilullah, Achmad Subhan   +1 more
core  

Home - About - Disclaimer - Privacy