Academic literature on the topic 'Gaining and Maintaining Access Concept'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Gaining and Maintaining Access Concept.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Gaining and Maintaining Access Concept"

1

Latova, Natalia. "Socio-Economic Status of the Actors of the Request for Change." Sociologicheskaja nauka i social'naja praktika 9, no. 2 (July 1, 2021): 7–26. http://dx.doi.org/10.19181/snsp.2021.9.2.8098.

Full text
Abstract:
The article analyzes the socio-economic situation of supporters of change and adherents of stability in the statics (according to 2019) and dynamics (during 1997–2019). The analysis confirms the concept that the importance of the absolute socio-economic situation (level of income) has no significant connection with the presence/absence of protest requests. The study of subjective satisfaction with the socio-economic situation was found to be more productive. At the same time, the point of view that the main supporters of change in post-Soviet Russia are Russians who feel they are poorer should be strongly rejected. The analysis showed that supporters of change in Russia are, as a rule, people with average financial status. At the same time, compared to previous years, by the end of the 2010s actors for change are gaining new features: being more satisfied with their backround, they demonstrate dissatisfaction with the aspects of their lives that determine their future (material situation, access to quality medical care and, especially, the ability to express their political views). Social and political factors, in contrast to the first post-Soviet decade, come to the fore. In general, the main social and economic differences in recent years between supporters of change and supporters of stability can be described as follows: those who want to change are more acutely affected by the problems of financial standing and maintaining health, but even more acutely by the decline in political opportunities in society.
APA, Harvard, Vancouver, ISO, and other styles
2

Tokarev, E. G., and A. A. Mikhalev. "ATTITUDE OF BELGORODIAN STUDENTS TO HEALTHY LIFESTYLE AND SPORTS." KAZAN SOCIALLY-HUMANITARIAN BULLETIN 11, no. 3 (June 2020): 45–49. http://dx.doi.org/10.24153/2079-5912-2020-11-3-45-49.

Full text
Abstract:
In recent years, in Russia as a whole and in the Belgorod region in particular, a healthy lifestyle (hereinafter - HLS) is gaining more and more popularity, and the attitude of young people towards it is changing depending on many factors - environment, material well-being, health and opportunities. The popularization of sports in the country and in regional educational institutions also has a great influence. The attitude of students of Belgorod universities and colleges towards healthy lifestyle and sports is becoming more serious: this can be seen from the increasing statistics of young people attending sports sections. In social networks, the number of groups and social advertisements devoted to healthy lifestyles, proper nutrition and sports is also growing. Propaganda of this direction began relatively recently, but today has become widespread among Belgorod residents. In addition, young people often jog on the streets of the city, or practice outdoors in open access sports grounds. In view of the prolongation of the pandemic in May 2020, such physical education activities in the fresh air gained mass and excitement. All of the above suggests that the attitude of young people to maintaining health, physical activity and spiritual peace is at a fairly high level. Today's youth is trying to take seriously the topic of health-saving technologies. In this article, the author reveals the concept of healthy lifestyles, explores the criteria for inclusion in a healthy lifestyle of Belgorod students, then analyzes the answers received through the survey and presents them in the form of diagrams.
APA, Harvard, Vancouver, ISO, and other styles
3

Natifu, Barbra. "Multiple levels of “knowing and being known”, their affiliated capital, benefits and challenges." Journal of Organizational Ethnography 5, no. 3 (October 10, 2016): 219–34. http://dx.doi.org/10.1108/joe-09-2015-0022.

Full text
Abstract:
Purpose The purpose of this paper is to investigate the extent to which the position of a former insider with multiple levels of knowing and being known, afforded me benefits and challenges in a complex higher education institution in Uganda. A reflexive autoethnographic account of the author’s research experience is employed as methodology. The study observes various benefits and challenges of this position. These include: firsthand knowledge of institutional culture and informants, leading to multiple levels of access; ability to conduct enriching interviews; and good rapport with informants. The challenges include: complexity of the institution; ethical challenges; power dilemmas; and anonymization of data. Access was noted to be a key benefit and it was experienced at five levels: personal relational networks; informant’s knowledge of a family relation; links to institutional and national networks; the role of media; and situational factors. In accordance with Bourdieu’s (1986) concepts of forms of capital, the study established that four levels of knowing were linked to social, cultural, economic or media capital. The study reveals existence of a link between different levels of knowing and being known and their affiliated forms of capital. It shows that possession of any or a combination of these forms of capital leads to what the study defines as “information access capital.” The study suggests that the different levels of knowing and being known determine the breadth and depth of a researcher’s information access capital. The study implies that power imbued relationships can limit access. Design/methodology/approach The paper applies a reflexive autoethnographic methodology where the author uses their personal research experience to make sense of the benefits and challenges of gaining access as a former insider with multiple identity positions. The paper draws from the author’s personal experience (auto) set in an institutional cultural context (ethno), to analyze the research process (graphy) of gaining access of top and middle management informants. First person (auto) accounts of the author’s organizational cultural (ethno) and research process (graphy) experiences and how they link to the benefits and challenges of researching an organization as insider are used as data. Findings The study observed various benefits and challenges of the insider position. These include: firsthand knowledge of institutional culture and informants, leading to multiple levels of access; ability to conduct enriching interviews; and good rapport with informants. The challenges include: complexity of the institution; ethical challenges; power dilemmas; and anonymization of data. Access was noted to be a key benefit experienced at five levels: personal networks; informant’s networks; institutional networks; the role of media; and situational factors. The four levels were linked to social, cultural, economic or media capital. Research limitations/implications The study is limited to the researcher’s personal experience of the institution. The paper shows the role that social, work, political, media, institutional and national networks and their affiliated forms of capital play in affording insider researchers access. It shows that researchers deficient in these capitals have low-information access capital and face challenges of access. It also shows that although friendship may enable access, if infused with power dynamics, power hinders access. The study shows insider researchers in complex organizations have to continually navigate the insider-outsider continuum and challenges thereof. Practicing relational ethics during and after research is key when conducting organizational insider research. Practical implications The paper shows the role that social, work, political, media, institutional and national networks and their affiliated forms of capital play in affording insider researchers access. It shows that researchers deficient in these forms of capital have low-information access capital and face challenges of access. It also shows that although friendship may enable access, if infused with power dynamics, power serves as hindrance to access. The study also shows insider researchers in complex organizations may have to continually navigate the insider-outsider continuum and challenges thereof. Practicing relational ethics during and after research is a key consideration of insider researchers. Social implications The paper reveals the challenges of accessing top and middle management in complex, bureaucratic and guarded higher education organizations. It shows that although higher education institutions, by virtue of their research orientated missions, should ideally set the right example for easy access to information at all levels and ranks of the organization. However, the reality of access for an insider research may be far from the ideal due to factors of complexity and previously formed power imbued relationships. Originality/value The paper contributes to understanding factors at play when gaining and maintaining research access to top and middle management in a higher education context. In accordance with (Bourdieu’s, 1986) concepts of forms of capital, the paper contributes to understanding the relationship between multiple levels of knowing and their affiliated forms of capital and how these capital forms may facilitate information access. It shows that possession of any capital form increases a researcher’s information access capital. The paper expands Weinreb’s (2006) definition of stranger and insider interviews, by showing multiple ways of “knowing or being known” before and during the study.
APA, Harvard, Vancouver, ISO, and other styles
4

Clark, Tom. "Gaining and Maintaining Access." Qualitative Social Work 10, no. 4 (April 6, 2010): 485–502. http://dx.doi.org/10.1177/1473325009358228.

Full text
Abstract:
Gatekeepers occupy increasingly important positions within qualitative social work research and their engagement with research is crucial to the ongoing development of a useable knowledge base. However, while some studies have hinted at the mechanisms that support and challenge the relationship between gatekeepers and researchers, there is a paucity of systematic research concerning how these relationships can be maintained more effectively for all concerned. This article aims to develop the literature in this respect by examining how researchers in the child and families research arena (n = 13) understand the mechanisms that support and challenge the engagement of gatekeepers. Several mechanisms that support engagement are identified. These are: political representation, civic and moral responsibility to engage, and the identification of good practice. Similarly, a number of mechanisms that can challenge engagement are also explored. These include: methodology, representation, intrusion, and, disruption. These results are discussed in relation to the current developments within the field of qualitative social work that have seen a rise in collectivized responses to research requests.
APA, Harvard, Vancouver, ISO, and other styles
5

Mykhaylenko, Valeriy, and Mykola Blyzniuk. "Educational activities of the international Carpathian school in the context of sustainable development goals." ScienceRise: Pedagogical Education, no. 2(41) (March 31, 2021): 4–8. http://dx.doi.org/10.15587/2519-4984.2021.228131.

Full text
Abstract:
International Carpathian School is a fast-growing volunteer project in Kosiv, Ivano-Frankivsk region, Ukraine, designed as a local centre of non-formal education to address youth adaptation to the globalized world. It intended to overcome the existing gaps in the education of socially conscious youth, finding optimal ways of skill-sharing activities to local communities. Among others, the school is oriented for delivering knowledge, skills and attitudes of the EU best practices in the field of municipal solid waste management (MSWM). In a broader meaning, the Carpathian School Agenda serves for the environmental protection of the vulnerable mountain landscapes to meet the Sustainable Development Goals Ukraine-2030 (hereof and after SDG), entered in force by the Decree of the President of Ukraine in order to ensure the national interests of Ukraine in relation to sustainable economic development [1]. The School activity is aligned with both SDG-4 "Quality education" and SDG-11 "Sustainable cities and communities". It has an interdisciplinary approach to learning where academic concepts of geoscience are coupled with real-world lessons. Carpathian Winter School hosted researches from Ukraine, Georgia and Armenia together with five educational entities from Baltic Sea Region (BSR). Scholars were exposed to a cross-cultural experience that facilitates connections between the classroom and the world around them. Simultaneously, the School is providing a prospect to local scientists in maintaining professional links with their foreign colleagues and obtaining hands-on scientific information on MSWM. Having a central geographical position and well-developed informal tuition activities, the Carpathian School may have a good chance to become a placement for students’ mobility, people-to-people contacts and promoting youth employability that is coherent with The Eastern Partnership (EaP) policy [2]. The educational project of the Swedish Institute LASUWAMA [3], which was considered at the Carpathian Winter School, combined researchers from Ukraine, Georgia and Armenia with five educational institutions of the Baltic Sea region. Representatives of EU universities, involved in the development of educational programs, provided the relevant knowledge and skills, needed to students for gaining an in-depth understanding of the sustainable development concept [4], including, inter alia, access to further vocational training in EU countries
APA, Harvard, Vancouver, ISO, and other styles
6

Thomas, Sunu C. "Maintaining confidentiality while gaining access to the community." Indian Journal of Medical Ethics 05, no. 01 (February 4, 2020): 10–11. http://dx.doi.org/10.20529/ijme.2020.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bergman Blix, Stina, and Åsa Wettergren. "The emotional labour of gaining and maintaining access to the field." Qualitative Research 15, no. 6 (December 5, 2014): 688–704. http://dx.doi.org/10.1177/1468794114561348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kuruppu, Sanjaya C., Markus J. Milne, and Carol A. Tilt. "Gaining, maintaining and repairing organisational legitimacy." Accounting, Auditing & Accountability Journal 32, no. 7 (September 16, 2019): 2062–87. http://dx.doi.org/10.1108/aaaj-03-2013-1282.

Full text
Abstract:
Purpose The purpose of this paper is to examine how legitimacy is gained, maintained or repaired through direct action with salient stakeholders and/or through external reporting, by using a number of empirical case vignettes within a single case study organisation. Design/methodology/approach The study investigates a foreign affiliate of a large multinational organisation involved in an environmentally sensitive industry. Data collection included semi-structured interviews with 26 participants, organisational reports and participation in the organisation’s annual environmental management seminar and a stakeholder engagement meeting. Findings Four vignettes featuring environmental issues illustrate the complexity of organisational responses. Issue visibility, stakeholder salience and stakeholder interconnectedness influence a company’s action to manage legitimacy. In the short-term, environmental issues which affected salient stakeholders resulted in swift and direct action to protect pragmatic legitimacy, but external reporting did not feature in legitimacy management efforts. Highly visible issues to the public, regulators and the media, however, resulted in direct action together with external reporting to manage wider stakeholder perceptions. External reporting was used superficially, along with a broad suite of communication strategies, to gain legitimacy in the long-term decision about the company’s future in New Zealand. Research limitations/implications This paper outlines how episodic encounters to manage strategic legitimacy with salient stakeholders in the short-term are theoretically distinct, but nonetheless linked to continual efforts to maintain institutional legitimacy. Case vignettes highlight how pragmatic legitimacy via dispositional legitimacy can be managed with direct action in the short-term to influence a limited range of salient stakeholders. The way external reporting features in legitimacy management is limited, although this has predominantly been the focus of prior research. Only where an environmental incident damages legitimacy to a larger number of stakeholders is external reporting also used to buttress community support. Originality/value The concept of legitimacy is comprehensively applied, linking the strategic and institutional arms of legitimacy and illustrating how episodic actions are taken to manage legitimacy in the short-term with continual efforts to manage legitimacy in the long-term. Stakeholder salience and networks are brought in as novel theoretical extensions to provide a deeper understanding of the interrelationships between these key concepts with a unique case study.
APA, Harvard, Vancouver, ISO, and other styles
9

Belcher, Ryan H., Allison K. Ikeda, and John M. DelGaudio. "Remodeling of the Paradoxical Middle Turbinate: Preserving Function While Gaining Access." American Journal of Rhinology & Allergy 32, no. 2 (March 2018): 98–100. http://dx.doi.org/10.1177/1945892418765002.

Full text
Abstract:
Background Endoscopic sinus surgery is performed for many reasons, most commonly for chronic rhinosinusitis refractory to medical treatment. A paradoxical middle turbinate is an anatomic variant that can hinder endoscopic access to the sinuses. No publication has addressed how to surgically treat a paradoxical middle turbinate. Method We present a basic endoscopic surgical approach to conservatively resect a paradoxical middle turbinate in order to improve access to the middle meatus and the sinuses while preserving support and function. Conclusion Conservative remodeling of the paradoxical middle turbinate can provide access to the sinuses while maintaining a significant portion of the middle turbinate.
APA, Harvard, Vancouver, ISO, and other styles
10

Usmanov, Yu, and O. Vergeles. "The problem of humanitarian access in armed conflicts." Uzhhorod National University Herald. Series: Law, no. 69 (April 15, 2022): 461–66. http://dx.doi.org/10.24144/2307-3322.2021.69.76.

Full text
Abstract:
Humanitarian access is an essential factor in humanitarian action in situations of armed conflict since it is impossible to provide direct humanitarian assistance without it. Unfortunately, the imposition of prohibitions and barriers to humanitarian aid by the warring parties has become a trend in modern armed conflicts worldwide, particularly in Asia, Africa, Europe, the Middle East, and Latin America. The right of access to victims of armed conflict is a fundamental element of humanitarian action since it allows humanitarian aid organizations to make independent needs assessments, ensure their effectiveness and monitor the fair distribution of such aid. However, gaining and maintaining access to the population to provide humanitarian assistance is difficult for humanitarian organizations. The provision of such access may be limited by the very fact of armed conflict and the fact that humanitarian access is usually considered ad hoc, so there are often no established methods or rules for granting such access. Although humanitarian access is not a new issue in international law, there are several challenges today in ensuring and maintaining such access in situations of armed conflict, including the understanding of the term "humanitarian access," the rights and responsibilities of participants in armed conflict, obligations, and restrictions on humanitarian organizations themselves, criteria for granting humanitarian access in various situations, etc. This article will consider the most common problems in gaining humanitarian access during armed conflicts and suggest possible ways to solve them.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Gaining and Maintaining Access Concept"

1

Goldsmith, Sam. "China’s Anti-Access & Area-Denial operational concept and the dilemmas for Japan." Master's thesis, 2012. http://hdl.handle.net/1885/9721.

Full text
Abstract:
The People's Republic of China is developing a sophisticated Anti-Access/Area-Denial operational concept utilising a variety of defensive military capabilities, entwined with offensive components. The United States, Japan and other Asia-Pacific countries remain sceptical about China's defensive rationale for developing this operational concept because it threatens to undermine Asia-Pacific security. Specifically, the threat posed by China's military modernisation to the security of Japan may force the Japanese Government to adopt a more self-reliant defence posture. However, there are a variety of factors that complicate Japan's perception of China and restrict the number of feasible response options open to the Japanese Government. As such, this sub-thesis will examine the nature of China's Anti-Access/Area-Denial operational concept in addition to the factors complicating Japan's response and finally the ways that Japan may respond to the rising power of China.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Gaining and Maintaining Access Concept"

1

Tomlinson, Kathryn. Oil and Gas Companies and the Management of Social and Environmental Impacts and Issues. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198817369.003.0020.

Full text
Abstract:
This chapter provides an overview of social and environmental performance and management practices in the oil and gas industries, outlining the evolution of international companies’ approaches over the last twenty years within the wider extractive industries context. The chapter reviews what social and environmental management amongst such companies means in practice, and highlights some of the unresolved issues emerging. While most companies now model their approach to social and environmental management on international norms, they face a variety of drivers to their practices. These range from complying with international standards in order to gain access to finance, to complying with new host country legislation and regulation, and gaining and maintaining a good reputation and a ‘social licence to operate’. This chapter argues that the complexity of these drivers problematizes the portrayal of the industry’s social and environmental performance as ‘voluntary’ corporate social responsibility, and renders the latter term somewhat misleading.
APA, Harvard, Vancouver, ISO, and other styles
2

Satija, Ambika, and Frank B. Hu. Prevention of Obesity and Physical Inactivity. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190238667.003.0065.

Full text
Abstract:
Energy imbalance, obesity, and physical inactivity are key risk factors for at least eight types of cancer as well as other life-threatening conditions. Obesity results from an excess of energy intake relative to energy expenditure over time. Until recently, the onus for maintaining a healthy body weight was placed predominantly on the individual. The traditional concept of individual autonomy cannot explain the rapid worldwide increase in obesity and physical inactivity over the last 40 years. A new paradigm has emerged, in which individual choices are important, but these choices are made within a social, economic, and physical context that profoundly influences the options. Food choices are affected by the availability and pricing of different products and by social norms about eating patterns body weight. Urbanization and a more rapid pace of life reduce access to homegrown and home-cooked foods, and mechanization replaces the need for walking and manual labor.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Gaining and Maintaining Access Concept"

1

"13. Gaining and Maintaining Access to Safe Drinking Water." In The China Environment Yearbook, Volume 2, 229–47. BRILL, 2008. http://dx.doi.org/10.1163/9789004180581_014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Gain and Maintain Access." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 178–208. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch007.

Full text
Abstract:
The gaining access phase in the ethical hacking process focuses on getting access to the individual host on a network based on the information collected during previous phases. Actual attacking starts in this phase, where an attacker will carry out password cracking/password sniffing attacks along with privilege escalation attacks to gain administrative privileges on the target host bypassing computer security. Once access is gained, maintaining that access on compromised hosts becomes important for an attacker in order to carry out future attacks. This chapter includes a study of tools and techniques like password cracking or social engineering attacks in order to gain the access on target machines based on the information collected during the previous phases. The chapter also introduces the tools and techniques used for escalating privileges by exploiting vulnerabilities, executing spyware/backdoor/key loggers/rootkits/trozans applications, etc. The chapter also explains the techniques used to maintain access in compromised hosts, to cover tracks/evidence, and methods to avoid detection. An attacker may use rootkits during this phase to hide his presence and maintain access to the compromised hosts. An attacker may hide files using rootkits/steganographic techniques, hide directories, hide attributes, use alternate data streams (ADS), place backdoors, and cover tracks by modifying/deleting log files. All these techniques are explained in this chapter.
APA, Harvard, Vancouver, ISO, and other styles
3

Anchugam, C. V. "Essential Security Elements and Phases of Hacking Attacks." In Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention, 114–43. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6504-9.ch010.

Full text
Abstract:
Cyber security provides protection against theft of data, protects computers from theft, minimizes computer freezing, provides privacy for users, and offers strict regulation. Firewalls can be difficult to configure correctly. Faultily configured firewalls may prohibit users from performing any behavior on the internet before the firewall is properly installed, and you will continue to upgrade the latest software to retain current protection. Cyber protection can be expensive for ordinary users. This is chapter helps to understand phases of attacks and types of attacks. Ethical hacking simulates a malicious attack without trying to cause damage. If you need to understand the countermeasures, first you need to understand the phases of an attack. It is necessary to comprehend the steps to counter an attack once it is detected and stop the attack before it reaches the next phase. In general, there are five phases that make up an attack such as reconnaissance, scanning, gaining access, maintaining access, covering tracks.
APA, Harvard, Vancouver, ISO, and other styles
4

Nambobi, Mutwalibi, and Kanyana Ruth. "Anticipating Blockchain as Disruptive Technology." In Handbook of Research on Innovation and Development of E-Commerce and E-Business in ASEAN, 708–21. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-4984-1.ch034.

Full text
Abstract:
Today, people are going to senior managers in almost all industries pitching about their “I have a new product” thing. Disruptive technology transforms a differentiated product that was so expensive and sometimes complicated or sophisticated into a simplified implementation with the applicability of APIs. APIs provide a platform where startup companies can be nitrated to a giant and established companies. Secondly, it changes the business ecosystem to suit all kinds of players small or big. In previous years, only major companies with a lot of resources had access to such technologies. This selfish access to new technologies would make such giants flourish like Amazon, eBay, Google. Blockchain is a form of distributed ledger technology gaining significant research devotion in numerous areas cutting across e-commerce, cryptocurrency, cryptography, logistics, security, finance, and now it is gaining grounds in e-commerce, big data, and internet of things. This chapter introduces the concept of blockchain, applications, and benefits it possesses in various fields related to e-commerce.
APA, Harvard, Vancouver, ISO, and other styles
5

Johnson, Vinitha. "The Gender Divide." In Globalization, Technology Diffusion and Gender Disparity, 110–19. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0020-1.ch009.

Full text
Abstract:
Technophobia, computer illiteracy, poverty, lack of necessity to counter the downward arch of the learning curve, and fear of sexual predators online are among the more popularly cited reasons for explaining the gender divide. It might be useful to elaborate on the concept of “access” in relation to the Gender Divide. Barriers to access could be physical such as spatial difficulty in gaining physical proximity to a computer, or internet connectivity, mental or related to ability to understand or utilise computer technology or computer usage, or attitudinal. The attitudinal aspect of a woman impeding herself from using the internet is possibly worthy of analysis.
APA, Harvard, Vancouver, ISO, and other styles
6

Vasilska, Maria, Iliya Kereziev, and Yordanka Ivanova. "Strategic Networking Behavior of SMEs." In Advances in Logistics, Operations, and Management Science, 372–97. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5962-9.ch018.

Full text
Abstract:
Strategic networking behavior of SMEs is an issue that has not yet been thoroughly studied in the context of emerging market economies in Eastern Europe. No doubt, through strategic networking, SMEs could gain access to valuable resources – information, know-how, technologies, finance, etc., needed for strategy development, and building and maintaining competitive advantages. In addition, the networking of Bulgarian firms operating in a limited domestic market can be viewed as a tool for gaining access to external markets. On the other hand, intensive collaboration and networking creates problems and challenges for the SMEs and places new requirements to their strategic management. Therefore, this chapter draws upon the data and results of three researches which investigated strategic networking behavior of Bulgarian SMEs in order to reveal the specific benefits and challenges of SMEs involved in networks and to examine the impact of networking activities on SMEs strategic development. Finally, recommendations for the strategic networking behavior of Eastern European SMEs are formulated with a view to improve their results from networking and hence their competitiveness.
APA, Harvard, Vancouver, ISO, and other styles
7

Kohlborn, Thomas, Erwin Fielt, and Maximillian Boentgen. "One-Stop Government Portals." In Public Affairs and Administration, 1386–408. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8358-7.ch068.

Full text
Abstract:
E-government is seen as a promising approach for governments to improve their service towards citizens and become more cost-efficient in service delivery. This is often combined with one-stop government, which is a citizen-oriented approach stressing integrated provision of services from multiple departments via a single access point, the one-stop government portal. While the portal concept is gaining prominence in practice, there is little known about its status in academic literature. This hinders academics in building an accumulated body of knowledge around the concept and makes it hard for practitioners to access relevant academic insights on the topic. The objective of this study is to identify and understand the key themes of the one-stop government portal concept in academic, e-government research. A holistic analysis is provided by addressing different viewpoints: social-political, legal, organizational, user, security, service, data and information, and technical. As an overall finding, the authors conclude that there are two different approaches: a more pragmatic approach focuses on quick wins in particular related to usability and navigation and a more ambitious, transformational approach having far reaching social-political, legal, and organizational implications.
APA, Harvard, Vancouver, ISO, and other styles
8

Horwitz, Ilana M. "Unexpected Destinations." In God, Grades, and Graduation, 125–51. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197534144.003.0006.

Full text
Abstract:
This chapter argues that an upbringing of religious restraint constrains college choices, especially for professional-class kids. It does so by recalibrating their academic ambitions after graduation, leading them to rarely consider a selective college despite their excellent grades in high school. As a result, religiously restrained teens—and especially those from the professional class who have the resources to make it to college—tend to undermatch in the college selection process. This is evident among men and is especially prevalent among women. Girls who grow up with religious restraint have a self-concept centered around family, service, and God. They do not aspire toward prestigious careers, which makes a degree from a selective college less valuable. Unlike less affluent teens who want to improve their class position by gaining a college degree, religiously restrained teens are content maintaining their class position by attending college close to home and reproducing traditional gender norms.
APA, Harvard, Vancouver, ISO, and other styles
9

Karim, Ahmad, Victor Chang, and Ahmad Firdaus. "Android Botnets." In Research Anthology on Securing Mobile Technologies and Applications, 75–92. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8545-0.ch005.

Full text
Abstract:
Mobile botnets are gaining popularity with the expressive demand of smartphone technologies. Similarly, the majority of mobile botnets are built on a popular open source OS, e.g., Android. A mobile botnet is a network of interconnected smartphone devices intended to expand malicious activities, for example; spam generation, remote access, information theft, etc., on a wide scale. To avoid this growing hazard, various approaches are proposed to detect, highlight and mark mobile malware applications using either static or dynamic analysis. However, few approaches in the literature are discussing mobile botnet in particular. In this article, the authors have proposed a hybrid analysis framework combining static and dynamic analysis as a proof of concept, to highlight and confirm botnet phenomena in Android-based mobile applications. The validation results affirm that machine learning approaches can classify the hybrid analysis model with high accuracy rate (98%) than classifying static or dynamic individually.
APA, Harvard, Vancouver, ISO, and other styles
10

Carter, David. "Dreams and the Cinema." In Inception, 51–78. Liverpool University Press, 2019. http://dx.doi.org/10.3828/liverpool/9781911325055.003.0005.

Full text
Abstract:
This chapter examines the oneiric film theory which claims that the experience of cinema is akin to that of dreaming, before considering what methods are used in Christopher Nolan's Inception (2010) to depict the dream states. It details how Inception uses dream theory. It is clear that the film assumes the existence of an unconscious area of the mind, which can be influenced through access by skilled operators. This is very much in accordance with Sigmund Freud's concept of repression: disturbing thoughts are repressed from consciousness, but, if such thoughts, or ideas, are too disturbing they start to force their way back into consciousness, and the sleeping mind distorts them, changes them in some way, so that they can be contemplated in dreams but will not break through into consciousness. Extraction is a process of gaining access to such a repressed idea. A sci-fi element is thus introduced in the film, with the notion that it is possible to train the subconscious to defend itself against extraction. The chapter then looks at the dream states depicted in the film and considers the presuppositions about the nature of dreams and the subconscious mind.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Gaining and Maintaining Access Concept"

1

Vuk Baliz, Kristjan, and Bostj an Batagelj. "Stabilization concept for maintaining maximum suppression of the undesired sideband in a radio-over-fiber link using a single add/drop micro-ring resonator." In 2022 International Workshop on Fiber Optics in Access Networks (FOAN). IEEE, 2022. http://dx.doi.org/10.1109/foan56774.2022.9939695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Papadopoulos, J. M., C. Qiao, and A. T. Myers. "Concept for a Wind-Yawing Shallow-Draft Floating Turbine." In ASME 2021 3rd International Offshore Wind Technical Conference. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/iowtc2021-3561.

Full text
Abstract:
Abstract Offshore wind turbines are poised to become a vital part of the global energy landscape — particularly the floating types which give access to a much greater wind power resource. The design possibilities for floating turbines are so different from onshore and offshore fixed-bottom turbines, that a cost-reducing re-imagining may be justified. Apart from the expense of an offshore transmission cable and substation, the costs of hardware for offshore bottom-fixed wind turbines (CAPEX) are roughly twice as much as for onshore. Much of the extra cost can be attributed to the mass of the above- and underwater support and expensive installation. In this paper, we reconsider two aspects of present-day offshore turbines: (a) maintaining a land-turbine architecture (a slender tower with the rotor cantilevered from a yawing, equipment-filled nacelle); (b) seeking to minimize wave-induced motion and loads of the above-water plant. Our aim is an offshore floating design that is potentially less expensive than offshore fixed-bottom units. We outline the preliminary structural analyses that underlie a design focused on weight, cost reduction, and ease of manufacturing. This includes lattice towers, tubular hub and axle, and needle-roller bearings. The biggest concerns about the proposed lightweight system involve motions and forces induced by waves. Shallow-draft floats will follow the waves, leading to greater rotor translation and precession; and lattice towers may be subject to impact loads, ice buildup, and fouling. We present analysis of some of these motions and forces, along with resulting estimates for required structural weight as a preliminary investigation into the feasibility of this lightweight concept.
APA, Harvard, Vancouver, ISO, and other styles
3

Gietka, Paul, Manish Verma, and William H. Wood. "Functional Modeling, Reverse Engineering, and Design Reuse." In ASME 2002 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2002. http://dx.doi.org/10.1115/detc2002/dtm-34019.

Full text
Abstract:
Experience is a tremendous asset for any designer. To leverage the experience of many designers, a general methodology for case-based functional design is required. Function-based design is a natural foundation for this methodology because its goal is to structure the solution space and support concept generation. Gaining access to experience about how functions combine will help designers to explore more, better design concepts. This experience is gleaned by reverse engineering existing products and storing and indexing the information gained. This work studies the preliminary steps in matching functional information derived from reverse engineering to that generated in the design process. A language of function developed for reverse engineering is tested in the context of design.
APA, Harvard, Vancouver, ISO, and other styles
4

Kerr, G., and N. Georgantzi. "An introduction to the Babcock designed super dock blocks." In 14th International Naval Engineering Conference and Exhibition. IMarEST, 2018. http://dx.doi.org/10.24868/issn.2515-818x.2018.046.

Full text
Abstract:
This paper considers the issue of gaining access to the full extent of a vessel’s bottom plating whilst it is dry docked. The current methods of secondary docking positions and block removals are reviewed and a new approach using jacks is presented. The development of an initial version of the new approach is described. This covers the elements of removal and replacement concept, general arrangement, limitations of the existing equipment, removal equipment and wood compression properties. These aspects are then brought together to create the requirements for the jacks. Operational experience on the first three dockings using the initial version at Babcock’s Devonport site is discussed. The limitations of the initial approach are quantified and a fully developed solution which allows 100% block removal is presented. The paper concludes that the new approach of using jack-able super blocks provides benefits to both the shipyard and the ship operator. This project has been achieved through new research and the application of a sound knowledge of engineering and tolerances. The intellectual property of the paper is the subject of a pending patent.
APA, Harvard, Vancouver, ISO, and other styles
5

R. Simpson, William, and Kevin E. Foltz. "Network Defense in an End-to-End Paradigm." In 9th International Conference on Natural Language Processing (NLP 2020). AIRCC Publishing Corporation, 2020. http://dx.doi.org/10.5121/csit.2020.101414.

Full text
Abstract:
Network defense implies a comprehensive set of software tools to preclude malicious entities from conducting nefarious activities. For most enterprises at this time, that defense builds upon a clear concept of the fortress approach. Many of the requirements are based on inspection and reporting prior to delivery of the communication to the intended target. These inspections require decryption of packets when encrypted. This decryption implies that the defensive suite has access to the private keys of the servers that are the target of communication. This is in contrast to an end-to-end paradigm where known good entities can communicate directly with each other. In an end-to-end paradigm, maintaining confidentiality through unbroken end-toend encryption, the private key resides only with the holder-of-key in the communication and on a distributed computation of inspection and reporting. This paper examines a formulation that is pertinent to the Enterprise Level Security (ELS) framework.
APA, Harvard, Vancouver, ISO, and other styles
6

Monaco, Lucio, Damian M. Vogt, John Bergmans, and Torsten H. Fransson. "A Remotely Operated Aeroelastically Unstable LPT Cascade for Turbomachinery Aeromechanics Education and Training: Remote Flutter Lab." In ASME Turbo Expo 2014: Turbine Technical Conference and Exposition. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/gt2014-27170.

Full text
Abstract:
The use of advanced pedagogical methodologies in connection with advanced use of modern information technology (ICT) for delivery enables new ways of communicating, of exchanging knowledge, and of learning that are gaining increasing relevance in our society. Remote laboratory exercises offer the possibility to enhance learning for students in different technical areas, especially to the ones not having physical access to laboratory facilities and thus spreading knowledge in a world-wide perspective. A new “Remote Flutter Laboratory” has been developed to introduce aeromechanics engineering students and professionals to aeroelastic phenomena in turbomachinery. The laboratory is world-wide unique in the sense that it allows global access for learners anywhere and anytime to a facility dedicated to what is both a complex and relevant area for gas turbine design and operation. The core of the system consists of an aeroelastically unstable turbine blade row that exhibits self-excited and self-sustained flutter at specific operating conditions. Steady and unsteady blade loading and motion data are simultaneously acquired on five neighboring suspended blades and the whole system allows for a distant-based operation and monitoring of the rig as well as for automatic data-retrieval. This paper focuses on the development of the “Remote Flutter Laboratory” exercise as a hands-on learning platform for online and distant-based education and training in turbomachinery aeromechanics enabling familiarization with the concept of critical reduced frequency and of flutter phenomena. This laboratory set-up can easily be used “as is” directly by any turbomachinery teacher in the world, free of charge and independent upon time and location with the intended learning outcomes as specified in the lab, but it can also very easily be adapted to other intended learning outcomes that a teacher might want to highlight in a specific course. As such it is also a base for a turbomachinery repository of advanced remote laboratories of global uniqueness and access. The present work documents also the pioneer implementation of the LabSocket System for the remote operation of a wind tunnel test facility from any Internet-enabled computer, tablet or smartphone with no end-user software or plug-in installation.
APA, Harvard, Vancouver, ISO, and other styles
7

Wettstein, Hans E. "High Pressure Gas Fired Intercooled Semi-Closed Recuperated Cycle." In ASME Turbo Expo 2016: Turbomachinery Technical Conference and Exposition. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/gt2016-56176.

Full text
Abstract:
A promising semi-closed recuperated cycle (SCRC) has been suggested earlier by the author. For assessing the polytropic changes of state within this cycle ideal gas assumptions have been used as usual in gas turbine cycle analysis. But this leads finally to approximations which prevent an accurate extrapolation to a pressure level considerably above critical. The SCRC concept allows easy access to very high pressure and this has not yet been explored due to the lack of an appropriate method. In two papers an incremental method called constant dissipation rate algorithm (CDRA) for calculating polytropic changes of state for real gases corresponding to the classic definition has been shown. In the first paper different polytropic change of state calculations have been compared with the temperature based CDRA for air gases and in the second paper the applicability of the enthalpy based CDRA for steam both in the vapor and in the wetness range (in equilibrium) has been demonstrated. The validation of the calculation was first made by comparing with the previously published cycle data. This confirms the applicability of the ideal gas approximations for the data range up to a pressure level of 60 bars reasonably. Then versions with supercharging pressure ratio of up to 30 with a pressure level of up to 289bar were explored using the new temperature based CDRA method. It shows an impressive potential for high power density and low power turndown capability with no loss of efficiency and maintaining low emissions.
APA, Harvard, Vancouver, ISO, and other styles
8

Yu, John P., Chengwei Lei, Duncan Wong, Jason Choi, and Jason Cotton. "Blockchain Applications in Oilfield Underground Injection Operations." In International Petroleum Technology Conference. IPTC, 2021. http://dx.doi.org/10.2523/iptc-21786-ms.

Full text
Abstract:
Abstract This research project has successfully built a Distributed Ledger Technology (DLT) based prototype using R3 Corda open source. Its purpose applies in the oil & gas underground injection control (UIC) operations for the underground aquifer protection. This DLT prototype is a permissioned network that allows oil & gas companies to create, disseminate, and trace immutable records. The network enables oil and gas companies, government regulatory agency, and all other participants to share secure records such as well information while maintaining data integrity, traceability, and security. The purpose is to create a network of trust among all the stakeholders in the UIC processes for underground aquifer protection. In this DLT network, a company submits well information, which will be digitally signed and notarized. Unauthorized changes to the information, ownership, or history will become infeasible, thanks to the underlying cryptographic technologies of DLT. The network designs so that information stored and communicated will have a high level of trustworthiness. Every participant in the network can get simultaneous access to a common view of the data. Corda platform also provides multiple functionalities, e.g., Smart contract, Vault, Identity Management, Scheduler, Notary Services, etc. Many of the functionalities automate the data processing within the DLT databases. This project's results expect to enhance public safety and improve the aquifer protection review and operational processes. Kern County uniquely poises for a project to develop more streamlined, effective, and entirely digitized DLT-based workflows that will secure regional environmental data integrity. Water contamination is a primary concern in a region where water and petroleum play vital roles in the economy. Both industries and regulatory agencies pay close attention to environmental quality. Data integrity is a primary issue concern for those that monitor and analyze environmental data. Monitoring and forecasting based on available immutable data are imperative to mitigate complications. We have changed the manual workflow into DLT applications which takes advantage of built-in functionalities. The new review process can avoid repetitive reviews among all participants and shorten the approval time. The embedded smart contracts on the DLT network will also help automate the workflows, and therefore, will be able to help eliminate human errors and improve the turnaround time. The prototype model proves the concept of using DLT. Our research work demonstrates DLT successfully implement into energy technology. The prototype model will further expand to all the UIC processes, such as thermal, wastewater disposal, waterflood, gas injection & disposal, etc. It is a substantial cost and time savings for all the oil and gas companies. The results of this analysis could provide the government with valuable information for significant policy and regulation decisions to further benefit the community and society.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography