Results 61 to 70 of about 752,384 (290)

Breaking Down Online and Digital Reporting Practices: A Research Map From Websites to Social Media

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This paper adopts a mixed research methodology, integrating bibliometric and systematic literature review (SLR) tools, to systematise the academic contributions and the different bodies of knowledge generated over the last decades on online and digital reporting practices, ranging from websites to social media.
Giuseppe Nicolò   +3 more
wiley   +1 more source

IMPACT OF RELIGIOUS CRISIS IN 18 CENTURY ON DEPLOPMENT OF “MAGICAL REVIVAL” PROCESS IN FRANCE

open access: yesКиївські історичні студії, 2020
The purpose of the study is to unveil the religious crisis through the impact of the “Magical Revival” and esoteric secret organizations in France during the 18th century.
Dmytro Pomazan
doaj   +1 more source

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

The Role of Trade Secrets in Innovation Policy [PDF]

open access: yes, 2010
[Excerpt] This report provides an overview of the law and policy of trade secrets. It discusses the role of trade secrets in U.S. innovation policy. It then reviews the sources of trade secret law and the substantive rules that they provide.
Thomas, John R
core   +2 more sources

Relating two standard notions of secrecy [PDF]

open access: yes, 2006
Two styles of definitions are usually considered to express that a security protocol preserves the confidentiality of a data s. Reachability-based secrecy means that s should never be disclosed while equivalence-based secrecy states that two executions ...
B. Blanchet   +11 more
core   +12 more sources

Slip versus dilation tendency parameter space as a tool for prospecting structurally controlled geothermal systems in greenfield: insights from the greater Ruhr region

open access: yesDeep Underground Science and Engineering, EarlyView.
This study highlights that with the static and time‐dependent evolution of slip versus dilation tendency parameter space, structurally controlled deep geothermal systems can be selected within areas of higher permeability and lower seismic hazard. Abstract Faults play a vital role in the Earth's hydraulic system by facilitating fluid flow when dilating
Michal Kruszewski   +4 more
wiley   +1 more source

Mewujudkan Good Local Goverance Melalui Transparansi Dan Akuntabilitas Anggaran Publik

open access: yesJKAP (Jurnal Kebijakan dan Administrasi Publik), 2015
Secret bureaucracy culture to public budget have created itsfed& OI of corruption growth in various area, so that can menace its form of good local governance . Therefore transparency represent one of the elementary aspect which require to conduct to its
Nurul Rofikoh
doaj   +1 more source

UK public attitudes to whistleblowing [PDF]

open access: yes, 2012
This reports on the findings from a public survey (n=2,000 cross-section of UK adult population) on their attitudes towards whistleblowing. 8 questions were inserted in a public omnibus carried out by ComRes.
Vandekerckhove, Wim
core   +1 more source

Permeability of granite from a shallow buried mountain pipe gallery tunnel under unloading confining pressure

open access: yesDeep Underground Science and Engineering, EarlyView.
Triaxial compression tests under unloading confining pressure conditions were conducted to systematically analyze the permeability behavior of granite retrieved from the different classification surrounding rocks. Abstract The rock mass within mountain tunnels undergoes complex changes in permeability, strength, and deformation during tunneling ...
Xiaoyan Zhang   +4 more
wiley   +1 more source

Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things

open access: yesSensors, 2020
As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks
Abid Rauf   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy