the company's compliance with regulations on issues such as product safety, environmental safety, labor safety, personal data protection, and corporate social responsibility through the establishment of a harmonious internal control mechanism, especially for major social security incidents in recent years....
1. Introduction The global humanitarian crisis caused by the spread of COVID-19 pandemic has had spill-over effects on food security, due to the resulting economic and social shocks. The pandemic has highlighted how food system plays a key role within a broader reflection in terms of ...
behavioral sciences Article Women in Need—The Nature of Social Support in an Online Community Vanja Ida Ercˇulj and Tinkara Pavšicˇ Mrevlje * Faculty of Criminal Justice and Security, University of Maribor, 1000 Ljubljana, Slovenia; vanja.erculj@um.si * Correspondence: tinkara.pavsic@um...
Keywords: digital identity; social networks; digital transformation; data protection; online security settings Citation: Friedhoff, T.; Au, C.-D.; Ladnar, N.; Stein, D.; Zureck, A. Analysis of Social Acceptance for the Use of Digital Identities. Computers 2023, 12, 51. https://doi....
When this is not possible, the "ronda campesina" (voluntary peasant security rounds) intervenes. The Ronda is rooted in the ancient Inca traditions and evolved during colonial and republican times. It was historically sited in the Andean region and must therefore been introduced by the migrants....
Introduction Insufficient access to modern energy services and the lack of energy security are still important limitations to the development of poor regions [1,2] and they also affect certain social sectors in developed countries; people in these sectors struggle to afford the costs of the energy...
However, the merging of physical objects, cyber components and humans in the SIoT will introduce new concerns for risks, privacy and security. Consequently, managing risk and securing the SIoT are broad in scope and pose greater challenges than the traditional privacy and security triad of ...
For example, one must establish the maximal acceptable distance for parking, which could be far away from one's destination. Second, this model cannot incorporate parking search times, price, and turn over, local factors of driver's favorable spot, security, and road crossings during the walk ...
the perspective of food security in this region during the historical periods. It also provides fundamental data for r2e.sReaersceharocnh hAisrteoarical climate change impact and adaptation. This paper takes the modern Shandong Province in China as the research area. It is located in 2th. eRem...