Results 31 to 40 of about 19,515 (229)
ABSTRACT Understanding how policy instruments with overlapping goals interact is crucial for leveraging their synergies. This study explores the mechanisms for regional nature parks (a form of protected areas that impose no restrictions on agriculture) to enhance the adoption of biodiversity‐conserving agri‐environment schemes (AES) in Switzerland ...
Yanbing Wang +3 more
wiley +1 more source
Honey password vaults tolerating leakage of both personally identifiable information and passwords
Honey vaults are useful tools for password management. A vault usually contains usernames for each domain, and the corresponding passwords, encrypted with a master password chosen by the owner.
Chao An +4 more
doaj +1 more source
Citizen Engagement for Social and Technological Innovation in Sustainable Energy Systems
This study underscores the potential of citizen participation in the energy transition by providing insights to foster citizen‐driven innovation. An analysis of energy communities, one of the most dynamic innovations in the energy sector, reveals that these models can be citizen‐led initiatives regarding their operational and organizational structure ...
Ana Belén Cristóbal +3 more
wiley +1 more source
Personal review record, as a form of personally identifiable information, refers to the past review information of a reviewer. The disclosure of reviewers’ personal information on electronic commerce websites has been found to substantially impact ...
Jianhua Liu +5 more
doaj +1 more source
ABSTRACT This study examines whether information about production methods and social norms can increase consumers' willingness to pay (WTP) a price premium for food produced using climate‐friendly farming methods. A randomized survey experiment was conducted with 1568 respondents across Denmark, Lithuania, and Spain, who were assigned to one of four ...
Kassa Tarekegn Erekalo +5 more
wiley +1 more source
A growing number of individuals who are not professional scientists are working with professional scientists to contribute to scientific research through a broad spectrum of volunteer activities and roles.
Caren Cooper +3 more
doaj +1 more source
A systematic literature review of blockchain cyber security
Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through decentralized, trustless, peer-to-peer systems.
Paul J. Taylor +4 more
doaj +1 more source
Abstract Black women face a myriad of challenges that heighten their susceptibility to sexually transmitted infections (STIs), resulting in a disproportionate impact of STIs among this population. Yet, there is a lack of research that explores how women navigate these diagnoses with resilience.
Jaleah D. Rutledge +3 more
wiley +1 more source
This paper deals with reliability estimation for information systems of personally identifiable information in the case of infrequent failures. The method for samples aggregation is presented.
A. V. Titov, V. O. Chukanov
doaj
Abstract Mobile technologies have become significant resources for crisis communication and social support in recent years. However, despite empirical evidence pointing to the centrality of these technologies for parenthood in everyday life, it is yet unknown how parents' coping resources play a role in the digital environment.
Daphna Yeshua‐Katz +2 more
wiley +1 more source

