Results 111 to 120 of about 20,376 (274)
How Consumers Contest Legitimacy: Skepticism Toward Corporate Social Responsibility
ABSTRACT Consumer skepticism toward Corporate Social Responsibility (CSR) initiatives operates not only as an individual‐level response but also as a societal governance mechanism that disciplines firms and reshapes organizational legitimacy. Drawing on in‐depth interviews with consumers in an emerging Latin American economy, this study advances an ...
Francine Zanin Bagatini +2 more
wiley +1 more source
Provably secure secret sharing scheme based on bilinear maps
A method to construct provable secure secret sharing scheme using bilinear pairing was recommended.Firstly,the semantic security definition for secret sharing scheme is given,which is developed from the standard definition of semantic security for the ...
LI Hui-xian1, PANG Liao-jun2
doaj +2 more sources
ABSTRACT This study investigates the integration of circular economy (CE) and lean management (LM) as a strategic approach for enhancing corporate efficiency and sustainability. While CE emphasizes resource circularity, LM focuses on waste elimination and value maximization in production processes.
Pedro Carmona Marques +2 more
wiley +1 more source
Aluminum‐enhanced afterburning renders AE explosives more hazardous than conventional ones. Corrugated steel linings reduce far‐field AE blast overpressure by ~50% through wave reflection and dissipation. The developed model accurately predicts peak pressure (<10% error) and arrival time (<3% error), supporting protective design.
Zhen Wang +5 more
wiley +1 more source
The Distributive Consequences of Active Welfare Policies in Europe
ABSTRACT This article examines the distributive consequences of active welfare policies in Europe by analysing tier‐specific investments in individualised employment services across four European welfare states: Denmark, Germany, the Netherlands and the United Kingdom.
Deborah Jackwerth‐Rice +1 more
wiley +1 more source
Abstract Sensor technology advancements have provided a viable solution to fight COVID and to develop healthcare systems based on Internet of Things (IoTs). In this study, image processing and Artificial Intelligence (AI) are used to improve the IoT framework.
Noor M Allayla +2 more
wiley +1 more source
Abstract Soft robots, engineered from highly compliant materials, offer superior adaptability and safety in unstructured environments compared to their rigid counterparts. Recent advancements, fueled by bio‐inspiration and material programmability, have led to the rapid co‐evolution of their core modules: actuation, sensing, protection, energy, and ...
Qiulei Liu +3 more
wiley +1 more source
Efficient and provably secure attribute-based online/offline encryption schemes
To improve the encryption efficiency, the online/offline cryptography was extended to ABE and the primitive of attribute-based online/offline encryption (ABOOE) was proposed.
Hai-ying MA +3 more
doaj
Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions
This paper analyzes the security and performance of the isogeny-based hash functions. The isogeny-based hash function was first proposed by Charles, Goren, and Lauter, and is referred to as the CGL hash function.
Donghoe Heo +4 more
doaj +1 more source
Sustainable Work and Employment in Social Care: New Challenges, New Priorities
ABSTRACT Human Resource Management (HRM) research focused on social care is sparse. This gap is surprising given the scale of the social care workforce in many countries, its vital role in meeting the increasingly complex needs of vulnerable community groups, and the persistent challenges in recruiting and retaining staff.
Ian Kessler +4 more
wiley +1 more source

