Search

Results: 535
Approaches to Work in Reducing Entrenched Patterns of Violent Behavior
Christina McLaughlin
Jan 10, 2017
In this chapter, the author will demonstrate the use of a peace intervention to increase children's self-identity, community attachments, and coping mechanisms. With correct training and awareness, this project could be...
How Does IT Influence Chinese IS/IT Users' Job Burnout?
Christina Chang
Jan 01, 2023
Organizational utilization of information systems and information technology continues to grow in the 21st century, and job stress has become a worldwide problem; but the emotional expression of people differ in diverse cultural...
The Impact of Artificial Intelligence on International Trade
Christina Tay
Jan 01, 2021
This paper investigates the impact of artificial intelligence on international trade. We use data on neural machine translation & search engines dominating domestic markets from 2016 to 2019, comprising 196 countries to test for...
The Circumplex Model for Structuring Career Anchors of the IT/IS Personnel
A quantitative study involving Mainland China (the PRC), Taiwan, India, the UAE, and the US, five areas with 852 responses of IT/IS personnel data towards building a more suitable Circumplex Career Anchor Model for IT/IS...
A Participative Method for Prioritizing Smart City Interventions in Medium-Sized Municipalities
One of the most critical issues relating to smart cities is the selection of the most suited interventions, among numerous available options. Especially when medium-sized municipalities are concerned that typically have less...
Career Anchors of IT/IS Personnel
While career anchors have mainly studied in the US society; this study demonstrates the difference in the career anchors of the information technology/information system (IT/IS) personnel rooted in different cultures. The survey...
Hunger Series Begins With Dec. 2 Program on Food Security
Winthrop University
Jan 01, 0001
This series consists of five different programs aimed at informing the campus and community about hunger, which is one of the most important social issues both here at home and throughout the world. The first event will take...
Published by: Winthrop University
Viroplasms
Viroplasms are cytoplasmic, membraneless structures assembled in rotavirus (RV)-infected cells, which are intricately involved in viral replication. Two virus-encoded, non-structural proteins, NSP2 and NSP5, are the main drivers...
Published by:
Using Online Social Networks to Globalize and Popularize Product Brands in Different Cultural Areas
The purpose of this paper is to investigate the influential factors of online social network advertising in three different cultural areas, being China, India, and the US. This study uses the Social Capital Theory (SCT), and...
Viroplasms
Viroplasms are cytoplasmic, membraneless structures assembled in rotavirus (RV)-infected cells, which are intricately involved in viral replication. Two virus-encoded, non-structural proteins, NSP2 and NSP5, are the main drivers...
Published by: Viruses
Association between self-control and health risk behaviors
Abstract: Background: Self-control (SC) has been consistently found associated with diverse health risk behaviors (HRBs), but little research refers to low- and middle-income countries. Furthermore, there is evidence that some...
Published by:
Viroplasms
Viroplasms are cytoplasmic, membraneless structures assembled in rotavirus (RV)-infected cells, which are intricately involved in viral replication. Two virus-encoded, non-structural proteins, NSP2 and NSP5, are the main drivers...
Published by:
Director of Ethical Metalsmiths Lectures on Ethics and Precious Metal Sources
Winthrop University
Jan 01, 0001
Christina Miller, the director and co-founder of Ethical Metalsmiths, will speak at 5 p.m. in the Rutledge Building 119 on "Is There Such a Thing as an Ethical Wedding Ring?" She will give an overview of the challenges...
Published by: Winthrop University
Proposal of a Decision Support System and Model to Mitigate Scope Variability for New Product Development
This paper proposes a decision support model (DSM) to be used by project managers (PM) in the research of new products within multinational companies to select the right option to mitigate scope variability during critical...
First Tabletop Role-Playing Gaming Class Called a Success
Winthrop University
Jan 01, 0001
As a group, the class wrote a 64-page supplement to the popular Pathfinder game and created an imaginary town called Ravensberg. Over the spring semester, they populated it with residents, provided four locations - a manor, a...
Published by: Winthrop University
Victims, bullies and bully-victims
OBJECTIVES: To estimate the prevalence of self-reported bullying as victims, bullies or bully-victims among 9th grade adolescents in the city of São Paulo, Brazil; to investigate association between bullying with negative health...
Published by:
Sequences in the cytoplasmic tail of SARS-CoV-2 Spike facilitate expression at the cell surface and syncytia formation
Abstract: The Spike (S) protein of SARS-CoV-2 binds ACE2 to direct fusion with host cells. S comprises a large external domain, a transmembrane domain, and a short cytoplasmic tail. Understanding the intracellular trafficking of...
Published by:
Association between self-control and health risk behaviors
BACKGROUND: Self-control (SC) has been consistently found associated with diverse health risk behaviors (HRBs), but little research refers to low- and middle-income countries. Furthermore, there is evidence that some HRBs tend...
Published by:
Association between self-control and health risk behaviors

Background

Self-control (SC) has been consistently found associated with diverse health risk behaviors (HRBs), but little research refers to low- and middle-income countries. Furthermore, there is evidence that some HRBs...
Published by: BMC public health
IP6-stabilised HIV capsids evade cGAS/STING-mediated host immune sensing.
HIV-1 uses inositol hexakisphosphate (IP6) to build a metastable capsid capable of delivering its genome into the host nucleus. Here, we show that viruses that are unable to package IP6 lack capsid protection and are detected by...
Published by:

|<

<

1

2

3

4

5

>

>|