Results 31 to 40 of about 800,214 (301)

Legal Basis for Regulation of the Private Security in the Republic of Macedonia [PDF]

open access: yesBezbednosni Dijalozi, 2016
In the Republic of Macedonia, private security is a significant factor in the overall interactions for building a beneficial security ambiance in the country. Hence, it is not all at one how the private security activity will be regulated in the Republic
Oliver BAKRESKI
doaj   +1 more source

Generative Artificial Intelligence Shaping the Future of Agri‐Food Innovation

open access: yesAgriFood: Journal of Agricultural Products for Food, EarlyView.
Emerging use cases of generative artificial intelligence in agri‐food innovation. ABSTRACT The recent surge in generative artificial intelligence (AI), typified by models such as GPT, diffusion models, and large vision‐language architectures, has begun to influence the agri‐food sector.
Jun‐Li Xu   +2 more
wiley   +1 more source

Gender, Violence and Peace: A Post-2015 Development Agenda [PDF]

open access: yes, 2014
Gender has increasingly become a part of the international peace and security agenda, particularly since the passage of UN Security Council Resolution (UNSCR) 1325 and subsequent resolutions on women, peace and security.

core  

Does Contract Farming Improve Diet Quality? The Case of Senegalese Smallholders

open access: yesAgribusiness, EarlyView.
ABSTRACT The institution of contract farming has gained prominence in most developing countries owing to its numerous benefits. While several studies have already highlighted the welfare benefits of contract farming, very few have investigated the effects on diet quality, despite poor quality diets being a serious challenge in most parts of the ...
Francis E. Ndip, Takeshi Sakurai
wiley   +1 more source

Territorial control by non-state armed groups and gendered access to healthcare in conflict using a new complex adaptive systems framework

open access: yesHumanities & Social Sciences Communications
The growing prevalence and influence of non-state armed groups (NSAGs) in armed conflict requires a deeper understanding of how their territorial control and contestation affect sub-national healthcare availability and outcomes, particularly with regards
Jannie Lilja   +6 more
doaj   +1 more source

The Imagination of the Other in a (Post-)Sectarian Society: Asylum Seekers and Refugees in the Divided City of Belfast

open access: yesSocial Inclusion, 2019
This article explores the ways a salient sectarian community division in Northern Ireland frames the imagination of newcomers and the experiences of asylum seekers and refugees.
Ulrike M. Vieten, Fiona Murphy
doaj   +1 more source

Parents' WhatsApp coping resources in the context of ongoing political conflicts: An ecological exploration

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract Mobile technologies have become significant resources for crisis communication and social support in recent years. However, despite empirical evidence pointing to the centrality of these technologies for parenthood in everyday life, it is yet unknown how parents' coping resources play a role in the digital environment.
Daphna Yeshua‐Katz   +2 more
wiley   +1 more source

Peace and Security Grantmaking by U.S. Foundations, 2008-2009 [PDF]

open access: yes, 2011
Examines trends in grantmaking by U.S. foundations for civil society initiatives worldwide to promote peace and security, including by issue area, strategy, and foundation and grantee characteristics.

core  

Sitting in Many Camps—Innovative Approaches and Methods for First Nations‐Led Research Into Indigenous Peacebuilding

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT In 2021, a desktop review was conducted of published references to First Nations peoples' approaches to conflict and its management in Australia (Project Stage One), culminating in a report published in 2024. This article focuses on Project Stage Two, a complex, innovative research undertaking building on the findings of Stage One, and being ...
Helen Bishop   +3 more
wiley   +1 more source

Navigating the Shadows: Manual and Semi-Automated Evaluation of the Dark Web for Cyber Threat Intelligence

open access: yesIEEE Access
In today’s world, cyber-attacks are becoming more frequent and thus proactive protection against them is becoming more important. Cyber Threat Intelligence (CTI) is a possible solution, as it collects threat information in various information ...
Philipp Kuhn   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy