Results 21 to 30 of about 6,604 (182)

Laws, Enforcement, and Strategy: A Multi‐Layered Qualitative Study of Multinational Enterprise Compliance Under European Union and Chinese Data Protection Regimes

open access: yesPolicy &Internet, Volume 18, Issue 2, June 2026.
ABSTRACT In an era of proliferating but divergent data protection regimes, the European Union's rights‐based approach and China's sovereignty‐centric model have become two dominant poles of global data governance. This article examines how multinational enterprises navigate compliance under these dual systems and how that compliance is shaped through ...
Yiping Cao
wiley   +1 more source

LA SEGURIDAD y CONFIAbILIDAD DE LOS DATOS EN LOS SISTEMAS DE INFORMACIÓN COMpUTARIzADA

open access: yesGestión en el Tercer Milenio, 2013
Una multiplicación rápida de los dispositivos del terminal y el crecimiento de los sistemas distribuidos añaden nuevas dimensiones a la tarea del auditor para asegurarse de tener un sistema seguro de PD. Aunque no es perfecto el sistema de comunicación de datos, varios conceptos de diseño y requisitos que los auditores deben entender para simplificar ...
openaire   +3 more sources

Spatially Downscaling of Future Food Demand for Policy Planning

open access: yesWorld Food Policy, Volume 12, Issue 1, May 2026.
ABSTRACT Understanding the subnational dynamics of food demand, while accounting for the evolution of the agrifood system at the global level, remains a challenge for designing food policy to ensure food security. To link global agrifood systems with subnational food policy planning, we downscale per capita food demand for 62 food commodities at the ...
Chun Song   +3 more
wiley   +1 more source

Fear in Public Policy Compliance: Citizens' Response to Crisis‐Induced Policies

open access: yesEuropean Policy Analysis, Volume 12, Issue 2, Spring 2026.
ABSTRACT This article brings together social psychology and public policy literature in a mixed‐methods research design to explore how fear influences non‐compliance with challenging policies during crises. Building on Terror Management Theory, we argue that fear affects individual citizens' compliance tendencies.
Stella Ladi   +3 more
wiley   +1 more source

Privacidad, seguridad y legalidad en soluciones educativas basadas en Blockchain: Una Revisión Sistemática de la Literatura

open access: yesRIED: Revista Iberoamericana de Educación a Distancia, 2020
La Analítica del Aprendizaje (proveniente del término en inglés Learning Analytics) procesa los datos de los estudiantes, incluso los estudiantes menores de edad.
Daniel Amo   +4 more
doaj   +1 more source

A Scoping Review of Human–Jaguar (Panthera onca) Conflict in Latin America 拉丁美洲人与美洲豹 (Panthera onca) 冲突的范围综述 Revisión de Alcance del Conflicto Humano‐Jaguar (Panthera onca) en América Latina

open access: yesIntegrative Conservation, Volume 5, Issue 1, Page 16-32, March 2026.
A review of 192 articles published between 1985 and 2023 revealed that human–jaguar conflict literature has focused on the human dimensions of conflict, jaguar killings, attacks on domestic animals and humans, and management. Several research gaps remain including: policy enforcement, interdisciplinary research, relevant geographic locations and ...
Angelica Solano   +2 more
wiley   +1 more source

Comparación de los métodos de seguridad implementados en ecommerce para garantizar la seguridad de los datos

open access: yesRevista Ingeniería e Innovación del Futuro
El comercio electrónico en Ecuador ha experimentado un crecimiento significativo, impulsado por la pandemia y la preferencia de los consumidores por transacciones digitales. Sin embargo, la desconfianza hacia la seguridad de los sitios web persiste, lo que refuerza la necesidad de cumplir con estándares rigurosos para proteger los datos de los usuarios.
Guillermo Guachamín Gutiérrez   +2 more
openaire   +1 more source

Importance and spatial patterns of invisible fisheries in Amazonian clear‐water rivers as revealed by fisher knowledge and collaboration

open access: yesConservation Biology, Volume 40, Issue 1, February 2026.
The graphical abstract highlights the research collaboration with fishers through interviews to record fishers' knowledge and participatory monitoring, to provide data on small‐scale fisheries in three clear water rivers (Trombetas, Tapajos and Tocantins).
Renato A. M. Silvano   +10 more
wiley   +1 more source

De la seguridad cibernética a la resiliencia cibernética aplicada a la protección de datos personales

open access: yesForo, Revista de Derecho, 2018
Las tecnologías de la información y comunicación nos permiten vivir en una sociedad en red, sin embargo, existen varios riesgos de la hiperconectividad, tales como la seguridad de la información, y parte de esta son los datos personales. Este reto se lo
Claudia Orellana Robalino
doaj  

Blockchain and Quantum Technologies for Securing the Global Nuclear Supply Chain: Synergies, Applications, Technical Challenges and Opportunities

open access: yesJournal of Critical Infrastructure Policy, Volume 7, Issue 1, Spring/Summer 2026.
ABSTRACT The infiltration of counterfeit, fraudulent, and suspect items into civil nuclear supply chains, notably within power generation and medical isotope production, poses severe safety and security threats. The ever‐increasing growth in nuclear installations (70 power plants are under construction and another 100 are in the planning stage) and the
Hafiz Ahmed
wiley   +1 more source

Home - About - Disclaimer - Privacy