Results 21 to 30 of about 2,195,820 (278)
Humanities, Discourse Transformations and Development Planning in Iran 1979-2013 [PDF]
Underdevelopment is the main problem in developing countries including Iran. This problem always has been concerned of thinker and policy makers after the Islamic Revolution that has created multiple discourses and has made different relations with ...
Gh. Ghaffary, M. Jafari Moghadam
doaj +1 more source
On average, each person in Indonesia generates 0.45 kg of waste a day. The country is home to 231.8 million people, so the average daily waste generated is approximately 104.31 million kg.
Muljaningsih Sri +2 more
doaj +1 more source
The modern era is characterized by the rapid development of information and communication technologies (ICT), which are increasingly integrating into all spheres of social life, including science, education, governance, economy, defense, and security ...
Dmytro Dets +2 more
doaj +1 more source
Tindak pidana korupsi merupakan suatu masalah sangat serius dan perlu diperhatikan, karena tindak pidana korupsi dapat membahayakan stabilitas dan keamanan negara dan masyarakatnya, membahayakan pembangunan sosial dan ekonomi masyarakat, politik, bahkan ...
Martha Safira
doaj +1 more source
Ethical and Social Aspects of Self-Driving Cars
As an envisaged future of transportation, self-driving cars are being discussed from various perspectives, including social, economical, engineering, computer science, design, and ethics.
Dodig-Crnkovic, Gordana +2 more
core +1 more source
Sarcasm detection on Twitter [PDF]
State-of-the-art approaches for sarcasm detection in social media combine lexical clues with contextual information surrounding the potentially sarcastic posting including author information.
Lyu, Hao
core +1 more source
Devising and Detecting Phishing Emails Using Large Language Models
AI programs, built using large language models, make it possible to automatically create phishing emails based on a few data points about a user. The V-Triad is a set of rules for manually designing phishing emails to exploit our cognitive heuristics and
Fred Heiding +4 more
doaj +1 more source
Testing the Human Backdoor: Organizational Response to a Phishing Campaign [PDF]
To exploit the human as the "back door" to compromising well-protected information systems of organizations, phishing-type attacks are becoming increasingly sophisticated.
Anže Mihelič +3 more
doaj +3 more sources
This study aims to develop the concept of self-social engineering in the context of tourism, focusing on tourists’ pro-environmental behavior. By integrating psychological theories such as Environmental Psychology Theory, the Theory of Planned Behavior ...
Laila Refiana Said +4 more
doaj +1 more source
Traditional vocations and modern professions among Tamil Brahmans in colonial and post-colonial south India [PDF]
Since the nineteenth century, Tamil Brahmans have been very well represented in the educated professions, especially law and administration, medicine, engineering and nowadays, information technology.
Fuller, C. J., Narasimhan, Haripriya
core +1 more source

