نتایج جستجو برای: practical policy

تعداد نتایج: 483823  

2006
Caspian Richards Kirsty Blackstock Claudia Carter Clive L. Spash

This policy research brief draws on presentations and discussions from the 'Practical Approaches to Participation' workshop, held in October 2003 at the Macaulay Institute, Aberdeen. The aim was to facilitate a critical dialogue on participatory approaches to environmental decision-making by bringing together practitioners, policy-makers, researchers and experienced participants.

2010

The Open University's repository of research publications and other research outputs The qualitative longitudinal case history: practical, method ological and ethical reflections Journal Article How to cite: Thomson, Rachel (2007). The qualitative longitudinal case history: practical, methodological and ethical reflections. Social Policy and Society, 6(4), pp. 571–582.

Journal: :J. Knowledge Management 2006
Andreas Riege Nicholas Lindsay

Purpose – How knowledge management theories and frameworks are applied in the public sector is not well understood due to little evidence being published in the literature. This paper aims to identify core issues and challenges that governments face in delivering effective public policy, particularly challenges presented by increasing community expectations, and to highlight the importance of d...

Journal: :In Situ : Revue de Patrimoines 2023

Post-war housing stocks have been in focus for modernisation and transformation since the 1980s. Technical deficiencies social problems related to exclusion segregation arguments investments. The architecture has seen as part of problem alterations its character important finding solutions. Lately, policy energy efficient renovation decarbonisation sector put modern stock again. With reference ...

2017
Yan Michalevsky Marc Joye

Attribute-based encryption (ABE) enables limiting access to encrypted data to users who possess certain attributes. Different aspects of ABE have been studied, such as the multi-authority setting (MA-ABE), and policy hiding, meaning the access policy is unknown to unauthorized parties, as in predicate encryption (PE). However, no practical scheme so far provided both properties, which are often...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید