Results for 'security factor'

1000+ found
Order:
  1.  33
    Choice under Risk and the Security Factor: An Axiomatic Model.Jean-Yves Jaffray - 1988 - Theory and Decision 24 (2):169.
  2.  41
    Security Level, Potential Level, Expected Utility: A Three-Criteria Decision Model under Risk.MichÈle Cohen - 1992 - Theory and Decision 33 (2):101.
  3. A survey on the economical-social effective factors of peace of mind and social security on female postgraduate students majoring in demography in tehran city.Ebadati Nazarlou Somayeh Kamran Feridoun - 2010 - Social Research (Islamic Azad University Roudehen Branch) 3 (6):43-56.
  4.  3
    Hybrid War as a Phenomenon of Semantic Postmodern Discourse with Emphasis on the Military Constant as a Factor of National Security.Andriy Tkachuk & Pavlo Tkachuk - 2021 - Postmodern Openings 12 (3):190-215.
    The article states the core thesis about two asymmetric modes of existence of war – physical and discursive. The purpose of the article is to substantiate the analytical and practical necessity of distinguishing between two modes of existence of hybrid warfare as a phenomenon of physical reality and as a discursive construct, as well as to raise questions about the value specificity of the relationship between them. The methodology of work represents the implication of two asymmetric modes of war existence (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5. Analysis and explanation of the effective factors on empowering staffs 'social security treatment in golestan province in 2009'.Majid Kafashi & R. Hataminezhad - 2010 - Social Research (Islamic Azad University Roudehen Branch) 2 (5):63-95.
     
    Export citation  
     
    Bookmark  
  6.  75
    Surveillance, security, and AI as technological acceptance.Yong Jin Park & S. Mo Jones-Jang - 2023 - AI and Society 38 (6):2667-2678.
    Public consumption of artificial intelligence (AI) technologies has been rarely investigated from the perspective of data surveillance and security. We show that the technology acceptance model, when properly modified with security and surveillance fears about AI, builds an insight on how individuals begin to use, accept, or evaluate AI and its automated decisions. We conducted two studies, and found positive roles of perceived ease of use (PEOU) and perceived usefulness (PU). AI security concern, however, negatively affected PEOU (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  31
    Legal Security from the Point of View of the Philosophy of Law.Gregorio Peces-Barba Martínez - 1995 - Ratio Juris 8 (2):127-141.
    . The author analyses the concept of legal security from its historical evolution to its main structural aspects. In the first part he argues that legal security is a historical and cultural concept of the modern world. He considers a series of factors which lead from the general concept of security generated by an ideological monism and the social rigidity characterizing the Middle Ages to the concept of legal security protected by the legal monism of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  21
    Internet security – technology and social awareness of the dangers.Piotr Paweł Laskowski - 2017 - Studies in Logic, Grammar and Rhetoric 50 (1):239-252.
    The article describes selected issues related to user safety on the Internet. This safety consists of a number of factors such as the technology that we use to communicate and to browse the Internet, and habits and behaviors that we have acquired and through which we can identify at least some typical hazards encountered on the Web. Knowledge of software and the ability to use it and to configure it properly as well as checking regularly for security updates reduces (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9.  42
    Securities market and corporate governance of privatised firms.Viet Ha Hoang - 2006 - International Journal of Business Governance and Ethics 2 (s 3-4):254-279.
    The purpose of this paper is to provide a model linking enforcement of institutional environment and reform of corporate governance of firms. It is argued that in the context of weak enforcement environment in transition economies, institutional factors in securities markets are effective in shifting corporate governance model of the privatised firms towards a market-based model that ensures a sustainable economic performance. The empirical study in the Vietnamese securities market supports this argument.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  13
    Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks.Jiaqi Liang, Yibei Wu, Jun’E. Li, Xiong Chen, Heqin Tong & Ming Ni - 2021 - Complexity 2021:1-12.
    With the development of distributed networks, the remote controllability of the distributed energy objects and the vulnerability of user-side information security protection measures make distributed energy objects extremely vulnerable to malicious control by attackers. Hence, the large-scale loads may produce abnormal operation performance, such as load casting/dropping synchronously or frequent and synchronous casting and dropping, and hence, it can threaten the security and stable operation of the distribution networks. First, we analyze the security threats faced by industrial (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11. Research of the intelligent resource security of the nanoeconomic development innovation paradigm.Tetiana Ostapenko, Igor Britchenko & Peter Lošonczi - 2021 - Baltic Journal of Economic Studies 7 (5):159-168.
    The resources and resource potential of the innovative component of nanoeconomics are analyzed. The factors of production – classical types of resources such as land, labor, capital and technology – are described. Ways of influencing the security resources of nanoeconomics within the innovation paradigm are evaluated. The purpose of the study is to identify the factor of nanoeconomics in the formation of resource security potential in the innovation paradigm. To achieve this goal, the following tasks were set: (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  16
    The Phenomenon of Security Within the Socio-Psychological Knowledge in the Era of Postmodernism.Olha Lazorko, Hryhorii Dzhahupov, Rafal Abramciow, Svitlana Symonenko, Olena Hrek & Tetiana Kostieva - 2022 - Postmodern Openings 13 (3):180-200.
    The relevance of the study of the socio-psychological phenomenon of personal security in the era of post-modernism is due to the real problems of today's society, which at the present stage of state development are characterized by acute interrelationships between the requirements of social security as a factor of socio-political and national security and the real state of mental existence. associated with indicators of social well-being of the individual. The aim of the article is to prove (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  46
    Factors affecting willingness to share electronic health data among California consumers.Katherine K. Kim, Pamela Sankar, Machelle D. Wilson & Sarah C. Haynes - 2017 - BMC Medical Ethics 18 (1):25.
    Robust technology infrastructure is needed to enable learning health care systems to improve quality, access, and cost. Such infrastructure relies on the trust and confidence of individuals to share their health data for healthcare and research. Few studies have addressed consumers’ views on electronic data sharing and fewer still have explored the dual purposes of healthcare and research together. The objective of the study is to explore factors that affect consumers’ willingness to share electronic health information for healthcare and research. (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  14.  48
    Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information.Nick Hajli & Xiaolin Lin - 2016 - Journal of Business Ethics 133 (1):111-123.
    Social networking sites have challenged ethical issues about users’ information security and privacy. SNS users are concerned about their privacy and need to control the information they share and its use. This paper examines the security of SNS by taking a look at the influence of users’ perceived control of information over their information-sharing behaviors. Employing an empirical study, this paper demonstrates the importance of perceived control in SNS users’ information-sharing behaviors. Specifically, perceived control has been found to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  15.  21
    Organizational Factors in the Individual Ethical Behaviour. The Notion of the “Organizational Moral Structure”.Paulina Roszkowska & Domènec Melé - 2021 - Humanistic Management Journal 6 (2):187-209.
    Various organizational factors reported in the hitherto literature affect individual behaviour within a company. In this paper, we conduct a literature review thereof, and propose a notion of the “Organizational Moral Structure” defined as a comprehensive framework of interrelated organizational factors that condition, incite or influence good or bad moral behaviour of individuals within the organization. Drawing from a wide bibliographical review and our own reflection on recent business scandals, we identify seven constituents of the “Organizational Moral Structure”: 1) leader’s (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  31
    From food security to food wellbeing: examining food security through the lens of food wellbeing in Nepal’s rapidly changing agrarian landscape.Pashupati Chaudhary, Kamal Khadka, Rachana Devkota, Derek Johnson, Kirit Patel & Hom Gartaula - 2017 - Agriculture and Human Values 34 (3):573-589.
    This paper argues that existing food security and food sovereignty approaches are inadequate to fully understand contradictory human development, nutrition, and productivity trends in Nepalese small-scale agriculture. In an attempt to bridge this gap, we developed a new food wellbeing approach that combines insights from food security, food sovereignty, and social wellbeing perspectives. We used the approach to frame 65 semi-structured interviews in a cluster of villages in Kaski district in the mid-hills of Nepal on various aspects of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  17. Formation of the Economic Security System of Tourism and Hospitality Enterprises.Oleksandr P. Krupskyi, Sergii Sardak, Y. Kolbushkin & Y. Stasyuk - 2019 - Journal of Advanced Research in Law and Economics 10 (4):1159-1175.
    The purpose of the paper is to consider genesis and approaches to forming a security culture of tourism and hospitality enterprises that are superstructures of economic, industrial, professional, household, ecological, psychological and social security. In the research, apart from general scientific methods, we used the collection and analysis of primary information obtained from the survey of 220 respondents. Three areas that have a decisive influence on the security of tourism and hospitality enterprises have been identified: organizational culture, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  18.  40
    Factors that degrade the match distribution in iris biometrics.Kevin W. Bowyer, Sarah E. Baker, Amanda Hentz, Karen Hollingsworth, Tanya Peters & Patrick J. Flynn - 2009 - Identity in the Information Society 2 (3):327-343.
    We consider three accepted truths about iris biometrics, involving pupil dilation, contact lenses and template aging. We also consider a relatively ignored issue that may arise in system interoperability. Experimental results from our laboratory demonstrate that the three accepted truths are not entirely true, and also that interoperability can involve subtle performance degradation. All four of these problems affect primarily the stability of the match, or authentic, distribution of template comparison scores rather than the non-match, or imposter, distribution of scores. (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  19.  36
    Factors Eliciting Corporate Fraud in Emerging Markets: Case of Firms Subject to Enforcement Actions in Malaysia.Abdul Ghafoor, Rozaimah Zainudin & Nurul Shahnaz Mahdzan - 2019 - Journal of Business Ethics 160 (2):587-608.
    This study investigates the key factors that elicit financial reporting fraud among companies in Malaysia. Using enforcement action releases issued by the Security Commission of Malaysia and Bursa Malaysia, we identify a sample of 76 firms that had committed financial reporting fraud during the period of 1996–2016. We use the fraud triangle framework and the Malaysian International Standards on Auditing 240 to identify the factors. Since the simple probit model fails to address the identification problem, we estimate our results (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  50
    The Factors Predicting Students' Satisfaction with University Hostels, Case Study, Universiti Sains Malaysia.Fatemeh Khozaei, Nadia Ayub, Ahmad Sanusi Hassan & Zahra Khozaei - 2010 - Asian Culture and History 2 (2):P148.
    This study was administrated to undergraduate students living in the various hostels of Universiti Sains Malaysia. The primary purpose of this study was to identify the most important factors that predict undergraduate students’ level of satisfaction with the student hostels they are living in. This paper also explored the difference in the satisfaction levels of students living in hostels within the campus and those living in hostels outside the campus. Based on literature review, it was hypothesized that there would be (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  21.  12
    Technology and Security Analysis of Cryptocurrency Based on Blockchain.Chao Yu, Wenke Yang, Feiyu Xie & Jianmin He - 2022 - Complexity 2022:1-15.
    Blockchain technology applied to cryptocurrencies is the dominant factor in maintaining the security of cryptocurrencies. This article reviews the technological implementation of cryptocurrency and the security and stability of cryptocurrency and analyzes the security support from blockchain technology and its platforms based on empirical case studies. Our results show that the security support from blockchain technology platforms is significantly insufficient and immature. In addition, we further Zyskind and Nathan and Choi and find that the top (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  7
    Hessenberg factorization and firework algorithms for optimized data hiding in digital images.Salama A. Mostafa, Jamal N. Hasoon, Muhanad Tahrir Younis & Methaq Talib Gaata - 2022 - Journal of Intelligent Systems 31 (1):440-453.
    Data hiding and watermarking are considered one of the most important topics in cyber security. This article proposes an optimized method for embedding a watermark image in a cover medium (color image). First, the color of the image is separated into three components (RGB). Consequently, the discrete wavelet transform is applied to each component to obtain four bands (high–high, high–low, low–high, and low–low), resulting in 12 bands in total. By omitting the low–low band from each component, a new square (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  10
    Civil Rights and Security.David Dyzenhaus - 2009 - Routledge.
    The articles in this volume focus on the appropriate relationship between rights and counterterrorism policy and form part of the surge of scholarship on security and human rights resulting from the 'war on terror'. The articles also take account of issues of security where terrorism is not a factor, and reflect the attempt to rethink more generally the concept of security and its relationship to rights.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24. Assessment of Factors of Employee’s Turnover: Case Study in My village (MVi).Narith Por - 2018 - International Journal of Information Research and Review 5 (08):5637-5649.
    Employee is the main resource for organization. Recently, there were many concerns of staff resignation within industries. High staff turnovers cause increase of costs of hiring workforces. Owing this issue, “Assessment of Factor of Employee’s Turnover” was proposed for research with the objective of examination of factors causing staff resignation from MVi. In total 26 staff both women and men who resigned 2016 and 2017 was selected for interview. Quantitative data was used. Three main steps were done including research (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  12
    The Phenomenon of National Security within Postmodern Cultures: Interests, Values, Mentality.Leonid Kryvyzyuk, Bohdan Levyk, Svitlana Khrypko & Alla Ishchuk - 2021 - Postmodern Openings 12 (3):77-95.
    The article is devoted to defining the essence of security, particularly national security, its interpretation, main features, structure, and factors. The research focuses on the main concepts of the modern understanding of national security and defines national security according to recent research. The authors have performed a structural and functional analysis of the system of national security of Ukraine, which would be an adequate counteraction to threats to vital national interests. The article examines the multi-vector (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26. Socio-economic factors of providing quality of livestock products in Ukraine.Iryna Kyryliuk, Yevhenii Kyryliuk, Alina Proshchalykina & Sergii Sardak - 2020 - Journal of Hygienic Engineering and Design 31:37-47.
    In the context of Ukraine’s membership in the WTO, the functioning of a free trade area with the EU, the opportunity for agricultural producers to obtain a larger share of the value added is primarily linked to the intensification of trade in domestic livestock products and their processing products. However, their production is one of the high-risk areas and requires a set of measures aimed at ensuring proper quality. Without effective solution of the problem of quality of livestock products it (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  27.  9
    Management of Economic Security in the High-Tech Sector in the Context of Post-Pandemic Modernization.Andriy Shtangret, Nataliia Korogod, Sofia Bilous, Nataliia Hoi & Yurii Ratushniak - 2021 - Postmodern Openings 12 (2).
    The accelerated rates of scientific and technological progress and the intellectualization of the main factors of production play a leading role in ensuring the economic recovery of national economies, in particular in the conditions of the existence of today's post-pandemic consequences. The technological development of the leading countries of economic development poses difficult tasks for other participants in the world economic space to avoid a significant lag, especially in today's post-pandemic society. For the countries of Eastern Europe, this task is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  13
    The Factor of Knowledge Implementation and the Development Status of Sub-Saharan African Countries.Joseph Situma & Beneah M. Mutsotso - 2022 - Thought and Practice: A Journal of the Philosophical Association of Kenya 8 (1):27-49.
    Sub-Saharan African countries have generally remained relatively poor for many decades, despite various internal and external measures. Every year, African governments conceive and implement poverty reduction and eradication policies, and multi-lateral agencies and developed countries provide development assistance to enable SSA countries achieve their development goals. This article utilises systems theory to advance the thesis that sub-Saharan countries’ failure to develop is, to a significant extent, a consequence of poor knowledge utilisation. The significance of knowledge utilisation arises from the fact (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29.  37
    Dynamics of Crimes against the Security of Electronic Data and Information Systems and its Influence on the Development of Electronic Business in Lithuania.Tatjana Bilevičienė & Eglė Bilevičiūtė - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):689-702.
    The development of an information society and information technologies does not result in positive consequences only. Individuals with criminal intent also find their niche. Information security includes the creation of the input, processing and output processes of protection. The objective of information security is to protect the system of values, to protect and ensure accuracy and integrity and to minimize losses that may be incurred if the information is modified or destroyed. In the development of an information society, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  30.  76
    Community food security and environmental justice: Searching for a common discourse. [REVIEW]Robert Gottlieb & Andrew Fisher - 1996 - Agriculture and Human Values 13 (3):23-32.
    Community food security and environmental justice are parallel social movements interested in equity and justice and system-wide factors. They share a concern for issues of daily life and the need to establish community empowerment strategies. Both movements have also begun to reshape the discourse of sustainable agriculture, environmentalism and social welfare advocacy. However, community food security and environmental justice remain separate movements, indicating an incomplete process in reshaping agendas and discourse. Joining these movements through a common language of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  31.  17
    Driving Style: Determining Factors, Characteristics, Optimization Directions.I. I. Lobanova - 2015 - Liberal Arts in Russiaроссийский Гуманитарный Журналrossijskij Gumanitarnyj Žurnalrossijskij Gumanitaryj Zhurnalrossiiskii Gumanitarnyi Zhurnal 4 (1):76.
    A system of description, identification and classification of factors determining driving style is proposed in the article; stable and variable factors determining driving style are studied. Driving style is analyzed within the framework of structural approach. The variable factor are: specifications and technical condition of the vehicle, class of the car, its prestige, training of the driver, social regulators, features of the road environment, psychophysiological condition of the driver. The stable factors are: individual-typological properties, the level of suitability for (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  44
    A Human Rights Debate on Physical Security, Political Liberty, and the Confucian Tradition.Benedict S. B. Chan - 2014 - Dao: A Journal of Comparative Philosophy 13 (4):567-588.
    There are many East and West debates on human rights. One of them is whether all civil and political rights are human rights. On one hand, scholars generally agree that rights to physical security are human rights. On the other hand, some scholars argue that rights to political liberty are only Western rights but not human rights because political liberty conflicts with some East Asian cultural factors, especially the Confucian tradition. I argue that physical security also conflicts with (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  33. Language as a Factor of Integration or Segregation in Modern States.Margarita Costa - 2011 - Hobbes Studies 24 (1):15-23.
    This paper aims at showing that Hobbes's theory of language, which allows men to communicate among themselves like no other animal species, is an importante factor in the integration of modern states. Both his nominalism and the fact that he considers language previous to reason play a role in the formation of social groups. This leads him, as Johnston points out, to make political order depend upon linguistic order. In consequence, Hobbes aims at building a political philosophy by introducing (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  34.  66
    Cultivating cacao Implications of sun-grown cacao on local food security and environmental sustainability.Jill M. Belsky & Stephen F. Siebert - 2003 - Agriculture and Human Values 20 (3):277-285.
    The reasons why upland farmerson the Indonesian island of Sulawesi areengaged in a cacao boom and its long termimplications are addressed in the context ofprotected area management regulations, andpolitical and economic conditions inPost-Suharto, Indonesia. In the remote casestudy village of Moa in Central Sulawesi, wefound that while few households cultivatedcacao in the early 1990s, all had planted cacaoby 2000. Furthermore, the vast majoritycultivate cacao in former food-crop focusedswidden fields under full-sun conditions.Farmers cultivate cacao to establish propertyrights in light of a (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  49
    The main influencing factors of customer satisfaction and loyalty in city express delivery.Zheng Lei, Huawei Duan, Liping Zhang, Daji Ergu & Fangyao Liu - 2022 - Frontiers in Psychology 13.
    At present, customers’ low satisfaction and loyalty to city express service have restricted the development of city express. It is particularly important to analyze the factors causing customers’ low satisfaction and loyalty, which will promote the development of city express industry effectively. Based on SERVQUAL model and CCSI model, this paper constructs a new evaluation index system from the perspective of service quality. Through this new system, this paper first explores the factors that affect customers’ satisfaction and loyalty, respectively, by (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  9
    International and Domestic Factors Shaping Kosovo’s Euro-Atlantic Integration.Arben Hajrullahu & Chris J. Dolan - 2022 - Seeu Review 17 (2):49-70.
    This study examines the complex and dynamic relationship between Kosovo and NATO. It argues that Kosovo’s prospects for NATO membership are shaped by an array of contradictory and often confusing international and domestic political forces. It draws on theoretical sources, media reports, and descriptive statistical data to the factors shaping expectations for NATO membership. The study relies on theories and concepts from the established and evolving literature on alliance formation and expansion to explain how states aspiring for membership in (...) organizations must navigate a pattern of political and security hurdles in their quest for membership accession. It then explores Kosovo’s case for NATO membership by examining whether Kosovo has met key political and security benchmarks and devotes significant attention to the settlement dispute with Serbia, the roles played by the U.S. and E.U., and identifies alternative paths for Kosovo’s membership in NATO. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  37. Autonomous Weapons Systems, the Frame Problem and Computer Security.Michał Klincewicz - 2015 - Journal of Military Ethics 14 (2):162-176.
    Unlike human soldiers, autonomous weapons systems are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will make AWS (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  38.  7
    Advantages of Combining Factorization Machine with Elman Neural Network for Volatility Forecasting of Stock Market.Fang Wang, Sai Tang & Menggang Li - 2021 - Complexity 2021:1-12.
    With a focus in the financial market, stock market dynamics forecasting has received much attention. Predicting stock market fluctuations is usually challenging due to the nonlinear and nonstationary time series of stock prices. The Elman recurrent network is renowned for its capability of dealing with dynamic information, which has made it a successful application to predicting. We developed a hybrid approach which combined Elman recurrent network with factorization machine technique, i.e., the FM-Elman neural network, to predict stock market volatility. In (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  21
    The significance of African vegetables in ensuring food security for South Africa’s rural poor.Tim G. B. Hart - 2011 - Agriculture and Human Values 28 (3):321-333.
    Technologies and services provided to resource-poor farmers need to be relevant and compatible with the context in which they operate. This paper examines the contribution of extension services to the food security of resource-poor farmers in a rural village in South Africa. It considers these in terms of the local context and the production of African vegetables in household food plots. A mixture of participatory, qualitative and quantitative research tools, including a household survey, is used to argue that local (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  8
    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication.Banghua Wu, Shah Nazir & Neelam Mukhtar - 2020 - Complexity 2020:1-12.
    Security has become one of the important factors for any network communication and transmission of data packets. An organization with an optimal security system can lead to a successful business and can earn huge profit on the business they are doing. Different network devices are linked to route, compute, monitor, and communicate various real-time developments. The hackers are trying to attack the network and want to draw the organization’s significant information for its own profits. During the communication, if (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  5
    Study on the Heterogeneity of Social Security Affecting the Sense of Security of Urban and Rural Residents.Yuanfeng Liu & Shujiao Luo - 2022 - Complexity 2022:1-6.
    Social security is an important part of the national security system from the perspective of the overall security concept, and social security is an important influencing factor of social security. Using the CFPS2018 data, this study uses the critical weight method to measure residents’ individual security and uses path analysis to empirically study the impact of endowment insurance and medical insurance on residents’ security in urban and rural areas. The results show that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  11
    Is Burnout Primarily Linked to Work-Situated Factors? A Relative Weight Analytic Study.Renzo Bianchi, Guadalupe Manzano-García & Jean-Pierre Rolland - 2021 - Frontiers in Psychology 11.
    It has often been asserted that burnout is primarily linked to occupational-context factors, and only secondarily to individual-level and non-work factors. We evaluated the validity of this view by examining the links between burnout and an array of 22 work-situated, work-unrelated, dispositional, and intersecting variables. The study involved schoolteachers from three different countries: France, Spain, and Switzerland. Burnout was assessed with the Maslach Burnout Inventory for Educators. Most of our predictors were assessed based on widely used measures. In order to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  43.  11
    Association Between Child Abuse Experience and Pathological Internet Use Among Chinese University Students: The Mediating Roles of Security and Maladaptive Cognitions.Ningbo Qin, Pei Li & Yu Tian - 2022 - Frontiers in Psychology 13.
    Research has revealed that child abuse experience can increase pathological Internet use; however, few studies have focused on the influence of child abuse experience on pathological Internet use. This study examined the mediating roles of security and maladaptive cognitions in the association between child abuse and pathological Internet use. A total of 918 Chinese university students participated in the study, with measurements of child abuse, security, maladaptive cognitions, and pathological Internet use being employed. Structural equation modeling results indicated (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  37
    Bioengineering nitrogen acquisition in rice: can novel initiatives in rice genomics and physiology contribute to global food security?Dev T. Britto & Herbert J. Kronzucker - 2004 - Bioessays 26 (6):683-692.
    Rice is the most important crop species on earth, providing staple food for 70% of the world's human population. Over the past four decades, successes in classical breeding, fertilization, pest control, irrigation and expansion of arable land have massively increased global rice production, enabling crop scientists and farmers to stave off anticipated famines. If current projections for human population growth are correct, however, present rice yields will be insufficient within a few years. Rice yields will have to increase by an (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  7
    Human risk factors in cybersecurity.Tom Cuchta, Brian Blackwood, Thomas R. Devine & Robert J. Niichel - 2023 - Interaction Studies 24 (3):437-463.
    This article presents an experimental analysis of several cybersecurity risks affecting the human attack surface of Fairmont State University, a mid-size state university. We consider two social engineering experiments: a phishing email barrage and a targeted spearphishing campaign. In the phishing experiment, a total of 4,769 students, faculty, and staff on campus were targeted by 90,000 phishing emails. Throughout these experiments, we explored the effectiveness of three types of phishing awareness training. Our results show that phishing emails that make it (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  46.  11
    Research on factors affecting people’s intention to use digital currency: Empirical evidence from China.Guo Wu, Jiangqin Yang & Qiaoxi Hu - 2022 - Frontiers in Psychology 13.
    In the era of FinTech, many countries are currently exploring the viability of their own digital currencies due to the vast potential in terms of efficiency, security and accessibility. Some digital currencies have been under rapid development and real-world trials have recently been deployed. The purpose of this paper is to understand the main factors that could affect people’s intention to use digital currency via an empirical study. A survey was employed to collect data and the final sample consisted (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  11
    Exploiting multimodal biometrics for enhancing password security.Konstantinos Karampidis - 2024 - Logic Journal of the IGPL 32 (2):293-305.
    Digitization of every daily procedure requires trustworthy verification schemes. People tend to overlook the security of the passwords they use, i.e. they use the same password on different occasions, they neglect to change them periodically or they often forget them. This raises a major security issue, especially for elderly people who are not familiar with modern technology and its risks and challenges. To overcome these drawbacks, biometric factors were utilized, and nowadays, they have been widely adopted due to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  19
    Social capital dimensions in household food security interventions: implications for rural Uganda.Haroon Sseguya, Robert E. Mazur & Cornelia B. Flora - 2018 - Agriculture and Human Values 35 (1):117-129.
    We demonstrate that social capital is associated with positive food security outcomes, using survey data from 378 households in rural Uganda. We measured food security with the Household Food Insecurity Access Scale. For social capital, we measured cognitive and structural indicators, with principal components analysis used to identify key factors of the concept for logistic regression analysis. Households with bridging and linking social capital, characterized by membership in groups, access to information from external institutions, and observance of norms (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  13
    Content or Design? Factors Influencing the Circulation of American and German Newspapers.Edmund Lauf & Klaus Schoenbach - 2002 - Communications 27 (1):1-14.
    What is it that helps newspapers gain or at least keep readers; is it the specific content they offer or measures of design? In an explorative secondary analysis, local daily newspapers in Germany are compared to daily newspapers in the US. The newspapers used in this study were analyzed twice, both in the 1980s and the mid-1990s. In the US, visualizing information and displaying it more generously were more important for positive developments in circulation than in Germany. In Germany, community (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  15
    Yield Response of Different Rice Ecotypes to Meteorological, Agro-Chemical, and Soil Physiographic Factors for Interpretable Precision Agriculture Using Extreme Gradient Boosting and Support Vector Regression.Md Sabbir Ahmed, Md Tasin Tazwar, Haseen Khan, Swadhin Roy, Junaed Iqbal, Md Golam Rabiul Alam, Md Rafiul Hassan & Mohammad Mehedi Hassan - 2022 - Complexity 2022:1-20.
    The food security of more than half of the world’s population depends on rice production which is one of the key objectives of precision agriculture. The traditional rice almanac used astronomical and climate factors to estimate yield response. However, this research integrated meteorological, agro-chemical, and soil physiographic factors for yield response prediction. Besides, the impact of those factors on the production of three major rice ecotypes has also been studied in this research. Moreover, this study found a different set (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000