Results 151 to 160 of about 1,426,432 (217)
Editorial: Standard employment enclaves, precarity and informality: explaining employment configurations in the global south. [PDF]
Dingeldey I, Fechner H, Julián-Vejar D.
europepmc +1 more source
Food Security Outlook for Eastern Africa by 2050: Climate Change Impacts and Population-Driven Demand Gaps. [PDF]
Simane B +7 more
europepmc +1 more source
Digitization of hospital administration and public service reform: integration of technology and humanistic values. [PDF]
Utami EW +6 more
europepmc +1 more source
North East Asia’s regional Security Secrets: re-envisaging the Korean crisis [PDF]
Smith, Hazel Anne
core
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2019
Unlike the EAEU and the CIS, the Shanghai Cooperation Organization includes two key actors—Russia and China. The chapter reviews the specifics of the organization and the functioning of the SCO, and also develops an argument about how SCO could contribute to the longevity of autocratic rulers.
Anastassia V. Obydenkova +1 more
openaire +1 more source
Unlike the EAEU and the CIS, the Shanghai Cooperation Organization includes two key actors—Russia and China. The chapter reviews the specifics of the organization and the functioning of the SCO, and also develops an argument about how SCO could contribute to the longevity of autocratic rulers.
Anastassia V. Obydenkova +1 more
openaire +1 more source
Regional Organizations and Regional Security
Security Studies, 1992(1992). Regional Organizations and Regional Security. Security Studies: Vol. 2, No. 1, pp. 6-37.
S. Neil MacFarlane, Thomas G. Weiss
openaire +1 more source
Secure mobile services using secure region
2013 International Conference on ICT Convergence (ICTC), 2013Hacking techniques are becoming smarter day by day. Hacking techniques on PC environment are changed and applied to the mobile device and mobile only hacking techniques rise steeply. We consider separated secure region on mobile device to protect user data stored at mobile device from various hacking.
Yun-kyung Lee, Jeong-Nye Kim
openaire +1 more source

