Taking the business model as point of departure, this open access book explores how companies and organizations can contribute ...
Continue readingThis book looks at how a democracy can devolve into a post-factual state. The media is being flooded by populist narratives, ...
Continue readingThis second volume of ReConFort, addresses the decisive role of constitutional normativity, and focuses on discourses concerning ...
Continue readingThis book investigates the role of renewable energy in East Africa to provide policy-relevant inputs for the achievement ...
Continue readingThis open access edited collection examines representations of human trafficking in media ranging from British and Serbian ...
Continue readingIt first discusses research concerning the nature of mathematical giftedness, including theoretical frameworks and methodologies ...
Continue readingThis Open Access book offers a synthetic reflection on the authors’ fieldwork experiences in seven countries within the ...
Continue readingThe book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
Continue readingThis book addresses the way in which urban and urbanizing regions profoundly impact and are impacted by climate change. ...
Continue readingThe goal of this open access book is to develop an approach to clinical health care ethics that is more accessible to, and ...
Continue readingThis book is based on work from the COST Action “RESTORE - REthinking Sustainability TOwards a Regenerative Economy'', ...
Continue readingThis open access book offers new insights into the ageing-migration nexus and the nature of home. Documenting the hidden ...
Continue readingThis book provides new conceptualisations on the networks of migrants and their descendants in accessing the labour market. ...
Continue readingThe conventional approach to risk communication, based on a centralized and controlled model, has led to blatant failures ...
Continue readingThis open access book surveys the frontier of scientific river research and provides examples to guide management towards ...
Continue readingThis book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly ...
Continue readingThe objective of this book is to help at-risk organizations to decipher the “safety cloud”, and to position themselves ...
Continue readingThis book addresses a wide variety of events and technologies concerning the sago palm, ranging from its botanical characteristics, ...
Continue readingAlthough a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
Continue readingthe use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
Continue reading