Results 61 to 70 of about 10,120,233 (322)

Are Existing Security Models Suitable for Teleworking? [PDF]

open access: yes, 2011
The availability of high performance broadband services from the home will allow a growing number of organisations to offer teleworking as an employee work practice.
James, Peter
core   +2 more sources

Developing evidence‐based, cost‐effective P4 cancer medicine for driving innovation in prevention, therapeutics, patient care and reducing healthcare inequalities

open access: yesMolecular Oncology, EarlyView.
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg   +43 more
wiley   +1 more source

Evidence on how planning and design contribute to building a habitat security space: a multidimensional exploration

open access: yesEnvironmental Research Communications
The importance of the natural and social environment for human security is self-evident. Enhancing comprehensive environmental security is crucial not only for protecting human living environments but also for achieving sustainable development.
Mian Yang   +7 more
doaj   +1 more source

Impact of a senior research thesis on students' perceptions of scientific inquiry in distinct student populations

open access: yesFEBS Open Bio, EarlyView.
This study addressed how a senior research thesis is perceived by undergraduate students. It assessed students' perception of research skills, epistemological beliefs, and career goals in Biochemistry (science) and BDC (science‐business) students. Completing a thesis improved confidence in research skills, resilience, scientific identity, closed gender‐
Celeste Suart   +4 more
wiley   +1 more source

NOVÁ POLSKÁ BEZPEČNOSTNÍ STRATEGIE

open access: yesObrana a Strategie, 2015
The new Polish National Security Strategy was approved at the end of the last year. Its creation reflected ongoing shifts in global security environment most importantly the Ukrainian crisis and current assertive behaviour of the Russian federation ...
Libor Kutěj
doaj   +1 more source

Mycobacterial cell division arrest and smooth‐to‐rough envelope transition using CRISPRi‐mediated genetic repression systems

open access: yesFEBS Open Bio, EarlyView.
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point   +7 more
wiley   +1 more source

Truck Driving Assessment for Chinese Logistics and Transportation Companies Based on a Safety Climate Test System

open access: yesSystems
By applying the “safety atmosphere” measurement theory to Chinese management companies engaged in road transportation, a corporate and individual safety risk assessment system was established that is consistent with the management and cultural climate in
Jian Xiong, Zhenhan Chen
doaj   +1 more source

RELATIONAL APPROACHES REGARDING FOCUSED LOGISTICS IN MODERN WARFARE JOINT OPERATIONS [PDF]

open access: yesJournal of Defense Resources Management, 2015
The military joint operations of the future are characterized by large concentrations of forces and conventional means on the directions that permit the exploitation of the technological superiority and the manifestation of the offensive spirit of the ...
Gheorghe MINCULETE, Polixenia OLAR
doaj  

ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]

open access: yes, 2013
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy