Sökresultat

Filtyp

Din sökning på "what do you do on the dark web 【Visit Sig8.com】9ZP42K8.5R9I" gav 91568 sökträffar

Meddelanden från HT-biblioteken

Meddelanden från HT-biblioteken | januari 2025 Meddelanden från HT-biblioteken | januari 2025 Publicerad den 15 januari 2025 Foto: Anja Hoppe. Något senare än vanligt kommer här årets första nyhetsbrev från HT-biblioteken. Vi hoppas ni hade en fin julledighet och en inte alltför slitsam terminsstart. Nyhetsbrevet innehåller inte bara decembernyförvärvet, utan även det från hela 2024, och månadens

https://www.htbibl.lu.se/article/meddelanden-fraan-ht-biblioteken-januari-2025/ - 2026-05-14

New kids on the block

To become a member of the European Union, the applicant country must meet the accession criteria established in the Copenhagen Declaration, commonly referred to as the Copenhagen criteria. While these criteria serve as formal guidelines, previous research has shown that they alone cannot explain when and how a country will join the union. Instead, it is argued that the justification and discursive

Accounting for Gifts: How Consumers Understand Free on the Internet

Purpose: To investigate how consumers understand free services on the Internet. Theories: The research is primarily based upon theories of gift giving. Methodology and analysis: The Internet is not a tangible marketplace and in order to understand the value of the free services online, we used consumers' behavioral accounts to explain how they perceive the free services that are common online.

Sensitive Stuff and Expressive Caution: Notes on the Research Process in Studies of Ethnicities Associated with Crime

Questions related to crime and migration are delicate matters, potentially because of associations with ethnicity, racism and oppressive politics and ideology in both the past and the present. The delicate nature of issues of crime and deviance may result in expressive caution exercised by both researchers and those studied. In this article, we discuss these dynamics in the research process in ter

Attacks on the Firekite Cipher

Firekite is a synchronous stream cipher using a pseudo-random number generator (PRNG) whose security is conjectured to rely on the hardness of the Learning Parity with Noise (LPN) problem. It is one of a few LPN-based symmetric encryption schemes, and it can be very efficiently implemented on a low-end SoC FPGA. The designers, Bogos, Korolija, Locher and Vaudenay, demonstrated appealing properties

QUOTATIONS - Mapping out abnormal return opportunities on the Stockholm Exchange 1994-2006

The purpose of this study is to investigate, at the Stockholm Exchange during the period 1994 to 2006, whether certain quotations with particular characteristics can be said to produce positive abnormal returns relatively larger than others. We measure the initial return as well as the mid and long run abnormal returns for firms quoted on the Stockholm Exchange during 1994 and 2006 based on quotat

Assuring financial statements filed in XBRL – A new technology’s effect on the assurance process

XBRL is an XML based, meta-tagged financial reporting language, which is anticipated to become one single standard for electronic filing of financial statements. Numerous studies have identified errors and inconsistencies in XBRL filings. Error-laden XBRL documents are a serious concern for many stakeholders. Many questions have been raised regarding the potential assurance of XBRL filings. These