Results 101 to 110 of about 2,320 (256)
Where Do We Fit? Reflections on Research Interview Practice, Project Design, and Interpretation**
What is special about historical research interviews in the history of science, technology, and medicine, and how do they compare to the tools of oral historians and social scientists? This essay reflects on three interview projects I have undertaken, each taking a distinct shape.
Dmitriy Myelnikov
wiley +1 more source
The Methods of Information Security Based on Blurring of System
The paper present the model of researching system with own known input, output and set of discrete internal states. These theoretical objects like an absolutely protected from research system and an absolutely indiscernible data transfer channel are ...
Mikhail Andreevich Styugin
doaj
Perfect Forward Secrecy (PFS) [PDF]
openaire +1 more source
ABSTRACT This review critically examines the integration of Digital Information and Communication Technologies (TDICs) in biochemistry education over the past decade, highlighting both the benefits and challenges from a critical theoretical perspective. A systematic review was conducted to identify relevant literature, followed by thematic analysis and
Francis Pereira‐Dias +1 more
wiley +1 more source
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan +2 more
wiley +1 more source
ABSTRACT Consumers' increasing environmental concerns are prompting a shift in fashion consumption, fueling the remarkable growth of the second‐hand market. Over the last decade, this trend has spurred the emergence of a plethora of online platforms dedicated to the resale of pre‐loved fashion items.
Gabriele Murtas, Giuseppe Pedeliento
wiley +1 more source
How to ‘survive’ after graduating in science or engineering: Becoming an academic administrator
Abstract This is the eighth article in the series ‘Survival Skills for Scientists’; previous papers were published in the Journal of Materials Education. Here I describe my views, based partly on personal experience, about pursuing an alternative career path within academia: becoming an administrator (e.g., Department Chair, Dean, Vice‐President ...
Federico Rosei
wiley +1 more source
ABSTRACT The circular economy is gaining traction as a transformative approach to address climate change and the shortcomings of the linear economic model, which is defined by unsustainable production and consumption patterns. This study explores the implementation of circularity principles in the Spanish automotive industry, with particular attention ...
Salvador Perez‐Canto +2 more
wiley +1 more source
Modern Methods of Providing of Safety of Information by Quantum-mechanical Transformations
This article is devoted to the review of basic perspective directions of development of quantum cryptography. Most perspective methods provided security of information by quantum-mechanic laws are examined in the article.
A. S. Gerasimov
doaj
Scope 3 Carbon Emissions Assessment for Manufacturing SMEs
ABSTRACT This paper addresses the challenges facing managers of Small‐ and Medium‐Size Enterprises (SMEs) when conducting environmental sustainability assessment at the value chain level, particularly Scope 3 Greenhouse Gases (GHG) emissions. The paper investigates issues related to data availability and data quality for Scope 3 assessment and ...
Kourosh Halat +3 more
wiley +1 more source

