Results 21 to 30 of about 927,073 (74)
Communicating tokenomics and monetary policy: A comparative analysis of real and virtual economies
Abstract This article investigates the economic governance of blockchain‐based virtual economies in the context of monetary policy. Focusing on tokenomics communication, we employ deductive and inductive approaches, applying real‐world monetary policy metrics and text mining frameworks. Our comparative analysis reveals that the tokenomics communication
Kane Falco ter Veer, Timo Heinrich
wiley +1 more source
Four group sessions of the Family Acceptance and Commitment Therapy (ACT)‐based eczema management program improve children's eczema symptoms and enhance parental self‐efficacy, offering a novel approach to eczema management. ABSTRACT Introduction Eczema significantly affects the quality of life of affected children and their families, with ...
Yuen Yu Chong+5 more
wiley +1 more source
ABSTRACT Background Despite a variety of literature reviews, there is limited understanding of the learning strategies healthcare professionals use to help patients adopt and maintain effective foot care practices. Aim To explore learning processes and educational strategies for persons with diabetes focusing on foot care and examine how different ...
Kristofer Björk+3 more
wiley +1 more source
Scenes From a Sociolegal Career: An Informal Memoir
ABSTRACT This memoir describes the 40‐year unfolding, project by project, of my sociolegal field research on legal and regulatory processes. It provides brief accounts of my interactions and interviews with regulatory officials and with businesspeople responsible for regulatory compliance.
Robert A. Kagan
wiley +1 more source
ABSTRACT Background Non‐pharmacological interventions (NPIs) are the primary approaches to the management of behavioural and psychological symptoms of dementia (BPSD), but studies have indicated that there is a suboptimal implementation. Although there are several studies on the factors influencing NPI implementation for BPSD at residential aged‐care ...
Hunduma Dinsa Ayeno+3 more
wiley +1 more source
ABSTRACT This study aimed to develop a proof‐of‐concept prototype of a machine learning system to forecast and mitigate the effect of floods in Kasese District. The researchers used a participatory design science approach. The researchers conducted document reviews and brainstorming to obtain past climate data from the representatives of affected ...
Edward Miiro+4 more
wiley +1 more source
Burning Up the Carbon Sink: How the EU's Forest Biomass Policy Undermines Climate Mitigation
The EU's reliance on forest biomass for renewable energy is weakening its forest carbon sink, with even heavily forested Member States losing their net sink entirely. Despite 2016 modeling that predicts this decline in the sink, EU renewable energy policy treats forest biomass as having zero carbon emissions, conflicting with IPCC guidance.
M. S. Booth, J. Giuntoli
wiley +1 more source
Evaluation of Distributed Intelligence on the Smart Card [PDF]
We describe challenges in the risk management of smart card based electronic cash industry and describe a method to evaluate the effectiveness of distributed intelligence on the smart card. More specifically, we discuss the evaluation of distributed intelligence function called "on-chip risk management" of the smart card for the global electronic cash ...
arxiv
Desperate Journeys to Europe: Sensebreaking in Extreme Contexts
Abstract This paper uncovers the ways in which sensebreaking processes are initiated and then unfold over time in extreme contexts. Using semi‐structured interviews with irregular migrants from Pakistan undertaking perilous journeys to Europe, this research makes two major contributions to the literatures on extreme contexts and sensebreaking.
Amna Chaudhry, John M. Amis
wiley +1 more source
Comments on Five Smart Card Based Password Authentication Protocols [PDF]
In this paper, we use the ten security requirements proposed by Liao et al. for a smart card based authentication protocol to examine five recent work in this area. After analyses, we found that the protocols of Juang et al.'s , Hsiang et al.'s, Kim et al.'s, and Li et al.'s all suffer from offline password guessing attack if the smart card is lost ...
arxiv