Results 101 to 110 of about 2,320 (256)

Where Do We Fit? Reflections on Research Interview Practice, Project Design, and Interpretation**

open access: yesBerichte zur Wissenschaftsgeschichte, EarlyView.
What is special about historical research interviews in the history of science, technology, and medicine, and how do they compare to the tools of oral historians and social scientists? This essay reflects on three interview projects I have undertaken, each taking a distinct shape.
Dmitriy Myelnikov
wiley   +1 more source

The Methods of Information Security Based on Blurring of System

open access: yesБезопасность информационных технологий, 2016
The paper present the model of researching system with own known input, output and set of discrete internal states. These theoretical objects like an absolutely protected from research system and an absolutely indiscernible data transfer channel are ...
Mikhail Andreevich Styugin
doaj  

Perfect Forward Secrecy (PFS) [PDF]

open access: yesDatenschutz und Datensicherheit - DuD, 2013
openaire   +1 more source

Integrating Digital Technologies Into Biochemistry Education: A Decade of Efforts, Pandemic Impacts, and Emerging Insights

open access: yesBiochemistry and Molecular Biology Education, EarlyView.
ABSTRACT This review critically examines the integration of Digital Information and Communication Technologies (TDICs) in biochemistry education over the past decade, highlighting both the benefits and challenges from a critical theoretical perspective. A systematic review was conducted to identify relevant literature, followed by thematic analysis and
Francis Pereira‐Dias   +1 more
wiley   +1 more source

Adolescent Cyberviolence in South Korea: A Multi‐Year, National Population‐Based Study of Cyberviolence Prevalence (2017–2024)

open access: yesBehavioral Sciences &the Law, EarlyView.
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan   +2 more
wiley   +1 more source

Investigating the Customer Journey in Second‐Hand Fashion Platforms: Implications for Luxury Brand Management

open access: yesJournal of Consumer Behaviour, Volume 24, Issue 2, Page 655-672, March 2025.
ABSTRACT Consumers' increasing environmental concerns are prompting a shift in fashion consumption, fueling the remarkable growth of the second‐hand market. Over the last decade, this trend has spurred the emergence of a plethora of online platforms dedicated to the resale of pre‐loved fashion items.
Gabriele Murtas, Giuseppe Pedeliento
wiley   +1 more source

How to ‘survive’ after graduating in science or engineering: Becoming an academic administrator

open access: yesThe Canadian Journal of Chemical Engineering, EarlyView.
Abstract This is the eighth article in the series ‘Survival Skills for Scientists’; previous papers were published in the Journal of Materials Education. Here I describe my views, based partly on personal experience, about pursuing an alternative career path within academia: becoming an administrator (e.g., Department Chair, Dean, Vice‐President ...
Federico Rosei
wiley   +1 more source

A Strategic Action Plan to Advance Circular Economy Practices in the Automotive Industry Based on Sector Insights to Support Sustainable Development

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT The circular economy is gaining traction as a transformative approach to address climate change and the shortcomings of the linear economic model, which is defined by unsustainable production and consumption patterns. This study explores the implementation of circularity principles in the Spanish automotive industry, with particular attention ...
Salvador Perez‐Canto   +2 more
wiley   +1 more source

Modern Methods of Providing of Safety of Information by Quantum-mechanical Transformations

open access: yesБезопасность информационных технологий, 2010
This article is devoted to the review of basic perspective directions of development of quantum cryptography. Most perspective methods provided security of information by quantum-mechanic laws are examined in the article.
A. S. Gerasimov
doaj  

Scope 3 Carbon Emissions Assessment for Manufacturing SMEs

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This paper addresses the challenges facing managers of Small‐ and Medium‐Size Enterprises (SMEs) when conducting environmental sustainability assessment at the value chain level, particularly Scope 3 Greenhouse Gases (GHG) emissions. The paper investigates issues related to data availability and data quality for Scope 3 assessment and ...
Kourosh Halat   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy