Results 81 to 90 of about 2,389,131 (303)
The Potential of Data Envelopment Analysis (DEA) in Labor Adjustment Policy [PDF]
[Excerpt] Through labor-management policy, the management is responsible for establishing mutually beneficial relations between workers and employers. Establishing proper relations from the perspective of the worker refers to protecting workers’ rights ...
Choi, Intae
core +1 more source
Objectives Systemic lupus erythematosus (SLE) is a heterogenous inflammatory condition, with widely varying global prevalence estimates. Frequency of SLE in the general population of Australia has been reported to be notably lower than contemporary estimates in countries such as the US or UK at 19‐39 per 100,000 as opposed to 65‐97 per 100,000.
Lucinda Roper +7 more
wiley +1 more source
It Systems Security Management in Migration Process [PDF]
It Systems Security Management in Migration Process This paper looks at the issue of IT systems migration as well as problems related to security policy in migration processes. Problem of migration is viewed in a broad context of changes which occur during construction or modernization of an IT system. Migration projects were classified against
openaire +1 more source
Designing Strategies to Support a Transformation of Agriculture in Ethiopia [PDF]
The paper consists of three parts. The first part of the paper is a review of agricultural performance in Ethiopia over the past forty years. The second part diagnoses agricultural system performance and food security problems in Ethiopia and discusses ...
Gebre, Hagos +3 more
core +1 more source
The impact of security on Philippine tourism : a thesis presented in fulfilment of the requirements for the degree of Master of Philosophy in Development Studies at Massey University [PDF]
This study investigates the nexus between security and tourism within the development context within political structures and institutions examining specifically the impacts of security issues on the tourism industry of the Philippines. The latest global
Dela Cruz, Josephine Andres
core
Cybersecurity Transformation: Cyber-Resilient IT Project Management Framework
In response to the escalating threats of cybersecurity attacks and breaches, ensuring the development and deployment of secure IT products has become paramount for organizations in their cybersecurity transformation.
Samir Al-Janabi +2 more
doaj +1 more source
21st Century Security Manager [PDF]
We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security ...
Stelian ARION
doaj
Reforming foodgrains management: Achieving food security with cost-effectiveness [PDF]
This paper examines the efficacy of the current system of public foodgrains management and policies in promoting food security in the country. It argues that the system has outlived its usefulness, and that continuing with the same only stifles growth in
A. Ganesh-Kumar +2 more
core
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker +4 more
wiley +1 more source
During the years 2018-2024, considerable advancements have been achieved in the use of deep learning for side channel attacks. The security of cryptographic algorithm implementations is put at risk by this.
Amjed A. Ahmed +8 more
doaj +1 more source

