نتایج جستجو برای: own
تعداد نتایج: 157173 فیلتر نتایج به سال:
Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your perso...
In direct agri-food chains (DAFCs), farmers and consumers are brought together with the aim of shortening, localizing and synergizing an agrifood chain. As food moves from the farm to the fork, all the economic activities are performed by farmers/producers or consumers, and none intermediary is required to handle an agri-food product before it is consumed. Any DAFC form provide a sort of limina...
Policymakers have been puzzled to observe that food stamp households appear more likely to be food insecure than observationally similar eligible nonparticipating households. We reexamine this issue allowing for nonclassical reporting errors in food stamp participation and food insecurity. Extending the literature on partially identified parameters, we introduce a nonparametric framework that m...
Recently, the rapid adoption of smartphones and tablets among employees has forced organizations to proactively embrace the concept of Bring Your Own Device (BYOD). Allowing employees to bring their own mobile devices to the workplace has blurred the boundary between work and personal life and therefore created a stressful environment for employees when they are performing both work role and fa...
The Mobile Offices services based on Bring Your Own Device (BYOD) are getting more popular as the use of smart phone grows rapidly. As the free wireless services are being spread, malicious codes can be spread easily. Therefore, how we will provide security in an environment of free wireless has become an issue. This paper suggests security architecture for the better mobile office security and...
Information Technologies (IT) have gradually transformed into complex digital artefacts with blurred and constantly changing functional boundaries. While this shift offers promising venues that unfold in front of our eyes every day, it also challenges the deeply entrenched knowledge structures on which ordinary users rely to learn about unfamiliar technologies. We propose to take a step back in...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید