Results 111 to 120 of about 20,376 (274)

How Consumers Contest Legitimacy: Skepticism Toward Corporate Social Responsibility

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT Consumer skepticism toward Corporate Social Responsibility (CSR) initiatives operates not only as an individual‐level response but also as a societal governance mechanism that disciplines firms and reshapes organizational legitimacy. Drawing on in‐depth interviews with consumers in an emerging Latin American economy, this study advances an ...
Francine Zanin Bagatini   +2 more
wiley   +1 more source

Provably secure secret sharing scheme based on bilinear maps

open access: yesTongxin xuebao, 2008
A method to construct provable secure secret sharing scheme using bilinear pairing was recommended.Firstly,the semantic security definition for secret sharing scheme is given,which is developed from the standard definition of semantic security for the ...
LI Hui-xian1, PANG Liao-jun2
doaj   +2 more sources

Integrating Circular Economy and Lean Management: A Strategic Framework for Sustainable Business Transformation

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This study investigates the integration of circular economy (CE) and lean management (LM) as a strategic approach for enhancing corporate efficiency and sustainability. While CE emphasizes resource circularity, LM focuses on waste elimination and value maximization in production processes.
Pedro Carmona Marques   +2 more
wiley   +1 more source

Shock wave propagation characteristics of aluminum‐containing explosive in corrugated steel‐lined tunnel

open access: yesDeep Underground Science and Engineering, EarlyView.
Aluminum‐enhanced afterburning renders AE explosives more hazardous than conventional ones. Corrugated steel linings reduce far‐field AE blast overpressure by ~50% through wave reflection and dissipation. The developed model accurately predicts peak pressure (<10% error) and arrival time (<3% error), supporting protective design.
Zhen Wang   +5 more
wiley   +1 more source

The Distributive Consequences of Active Welfare Policies in Europe

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT This article examines the distributive consequences of active welfare policies in Europe by analysing tier‐specific investments in individualised employment services across four European welfare states: Denmark, Germany, the Netherlands and the United Kingdom.
Deborah Jackwerth‐Rice   +1 more
wiley   +1 more source

Enabling image optimisation and artificial intelligence technologies for better Internet of Things framework to predict COVID

open access: yesIET Networks, EarlyView., 2022
Abstract Sensor technology advancements have provided a viable solution to fight COVID and to develop healthcare systems based on Internet of Things (IoTs). In this study, image processing and Artificial Intelligence (AI) are used to improve the IoT framework.
Noor M Allayla   +2 more
wiley   +1 more source

Recent advances in multifunctional soft robots: A materials–structures–systems co‐design perspective for synergistic integration

open access: yesFlexMat, EarlyView.
Abstract Soft robots, engineered from highly compliant materials, offer superior adaptability and safety in unstructured environments compared to their rigid counterparts. Recent advancements, fueled by bio‐inspiration and material programmability, have led to the rapid co‐evolution of their core modules: actuation, sensing, protection, energy, and ...
Qiulei Liu   +3 more
wiley   +1 more source

Efficient and provably secure attribute-based online/offline encryption schemes

open access: yesTongxin xuebao, 2014
To improve the encryption efficiency, the online/offline cryptography was extended to ABE and the primitive of attribute-based online/offline encryption (ABOOE) was proposed.
Hai-ying MA   +3 more
doaj  

Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions

open access: yesIEEE Access
This paper analyzes the security and performance of the isogeny-based hash functions. The isogeny-based hash function was first proposed by Charles, Goren, and Lauter, and is referred to as the CGL hash function.
Donghoe Heo   +4 more
doaj   +1 more source

Sustainable Work and Employment in Social Care: New Challenges, New Priorities

open access: yesHuman Resource Management, EarlyView.
ABSTRACT Human Resource Management (HRM) research focused on social care is sparse. This gap is surprising given the scale of the social care workforce in many countries, its vital role in meeting the increasingly complex needs of vulnerable community groups, and the persistent challenges in recruiting and retaining staff.
Ian Kessler   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy