Results 151 to 160 of about 1,426,432 (217)

Food Security Outlook for Eastern Africa by 2050: Climate Change Impacts and Population-Driven Demand Gaps. [PDF]

open access: yesCurr Environ Health Rep
Simane B   +7 more
europepmc   +1 more source

Digitization of hospital administration and public service reform: integration of technology and humanistic values. [PDF]

open access: yesFront Public Health
Utami EW   +6 more
europepmc   +1 more source

Security Regionalism

2019
Unlike the EAEU and the CIS, the Shanghai Cooperation Organization includes two key actors—Russia and China. The chapter reviews the specifics of the organization and the functioning of the SCO, and also develops an argument about how SCO could contribute to the longevity of autocratic rulers.
Anastassia V. Obydenkova   +1 more
openaire   +1 more source

Regional Organizations and Regional Security

Security Studies, 1992
(1992). Regional Organizations and Regional Security. Security Studies: Vol. 2, No. 1, pp. 6-37.
S. Neil MacFarlane, Thomas G. Weiss
openaire   +1 more source

Secure mobile services using secure region

2013 International Conference on ICT Convergence (ICTC), 2013
Hacking techniques are becoming smarter day by day. Hacking techniques on PC environment are changed and applied to the mobile device and mobile only hacking techniques rise steeply. We consider separated secure region on mobile device to protect user data stored at mobile device from various hacking.
Yun-kyung Lee, Jeong-Nye Kim
openaire   +1 more source

Home - About - Disclaimer - Privacy