Results 91 to 100 of about 144,734 (270)
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan +2 more
wiley +1 more source
Consumer Mobile Phone Recycling Behaviour: A Systematic Review and Future Research Agenda
ABSTRACT Mobile phone recycling has received increasing attention from scholars and practitioners due to its environmental, social, and economic impacts. However, knowledge about consumer mobile phone (MP) recycling behaviour is fragmented, making it challenging to develop effective strategies to promote this behaviour. This study follows the Preferred
Xinru (Angie) Jiang +4 more
wiley +1 more source
The authors study the energy efficiency (EE) of ambient backscatter communication (AmBC) device‐assisted and reconfigurable intelligent surfaces (RIS)‐assisted non‐orthogonal multiple access (NOMA) downlinks.
Ruiman Gao +4 more
doaj +1 more source
How to ‘survive’ after graduating in science or engineering: Becoming an academic administrator
Abstract This is the eighth article in the series ‘Survival Skills for Scientists’; previous papers were published in the Journal of Materials Education. Here I describe my views, based partly on personal experience, about pursuing an alternative career path within academia: becoming an administrator (e.g., Department Chair, Dean, Vice‐President ...
Federico Rosei
wiley +1 more source
A secure and efficient user selection scheme in vehicular crowdsensing
Against the backdrop of the rapid development of the Internet of Things and vehicle technology, the emergence of intelligent connected vehicles provides a technological foundation for vehicle crowdsensing (VCS).
Min Zhang +3 more
doaj +1 more source
Management system requirements for wireless systems beyond 3G [PDF]
This paper presents a comprehensive description of various management system requirements for systems beyond 3G, which have been identified as a result of the Software Based Systems activities within the Mobile VCE Core 2 program.
A. Liotta +7 more
core +4 more sources
How Hidden Can Be Even More Hidden?
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform.
Fraczek, Wojciech +2 more
core +1 more source
ABSTRACT This study revisits the relationship between environmental and social sustainability and customer loyalty, integrating both sufficiency and necessity theoretical perspectives within a generational framework. It examines whether generational differences moderate these relationships and whether these sustainability dimensions act not only as ...
Ovidiu I. Moisescu, Oana A. Gică
wiley +1 more source
ABSTRACT Both universities and companies create value and innovation to maintain their position and remain competitive. Different, but still similar, with two goals that are shared. With their collaboration, they can enhance their pursuit of sustainability and as well corporate social responsibility by creating and delivering value and thus ...
Jana Hojnik +4 more
wiley +1 more source
ABSTRACT Recent scholarship shows growing interest in the circular economy (CE) approach, which promotes resource‐efficient, community‐friendly activities. However, scientific evidence is still needed on the synergies and trade‐offs between CE and community development (CD).
Michael Odei Erdiaw‐Kwasie +6 more
wiley +1 more source

