Results 41 to 50 of about 319,488 (211)

Aging with HIV/AIDS in Sub‐Saharan Africa: A scoping review

open access: yesCanadian Geographer / Le géographe canadien, Volume 69, Issue 3, Autumn / automne 2025.
Abstract Older adults in Sub‐Saharan Africa (SSA) are projected to increase 4‐fold from 46 million to 165 million by 2050. Despite this fact, global health policies and programs typically neglect this particular demographic. This is illustrated by the fact that policies and programs directed towards human immunodeficiency virus/acquired ...
Satveer Dhillon   +2 more
wiley   +1 more source

The Social Engineering framework para el aseguramiento de PYME [PDF]

open access: yes, 2016
El trabajo plantea un aporte al framework de ingeniería social (The Social Engineering Framework) para la evaluación del riesgo y mitigación de distintos vectores de ataque, por medio del análisis de árboles de ataque -- Adicionalmente se muestra una ...
Correa Sierra, Alejandro   +1 more
core  

Is the US Moving Toward Autocracy? A Critical Assessment

open access: yesPolitics &Policy, Volume 53, Issue 3, June 2025.
ABSTRACT Using the theory of incremental autocratization, I illustrate in this commentary that recent developments in the United States perfectly align with this theory. In the analytical framework I use, incremental autocratization consists of six distinct step: (1) societal turmoil, (2) a proposition of radical change, (3) an electoral victory as ...
Daniel Stockemer
wiley   +1 more source

Measuring social stress for heart attack prediction [PDF]

open access: yes, 2019
In this project is used data from trending topics to perform heart attack prediction exercises. It is defined as a baseline for future developments for the prediction of heart attacks with this type of data.En este proyecto se utilizan datos de trending ...
Casas Béjar, Gerard
core  

Secure neighbor discovery in wireless sensor networks using range-free localization techniques [PDF]

open access: yes, 2012
Si una red inalámbrica de sensores se implementa en un entorno hostil, las limitaciones intrínsecas a los nodos conllevan muchos problemas de seguridad. En este artículo se aborda un ataque particular a los protocolos de localización y descubrimiento de ...
Adrián Población-Hernández   +8 more
core   +3 more sources

How does a focusing event shape public opinion? Natural experimental evidence from the Orlando mass shooting

open access: yesPolicy Studies Journal, Volume 53, Issue 2, Page 463-479, May 2025.
Abstract Policy process theories posit that focusing events can trigger significant shifts in public attention and policy preferences, thereby reshaping public agenda setting. Prior studies, however, have not clearly defined the scope of public opinion changes induced by these focusing events, leading to inconsistent empirical findings. This study aims
Youlang Zhang, Xinsheng Liu
wiley   +1 more source

La ciberguerra como nueva estrategia bélica en el contexto internacional y su tratamiento periodístico en España [PDF]

open access: yes, 2015
El avance de las tecnologías y el desarrollo digital ha transmutado aspectos fundamentales en el devenir social. Tal es así que incluso ha incidido en las tácticas de presión, ofensivas y ataques de un país contra otro, de un grupo armado en contra del ...
García-Estévez, Noelia   +1 more
core  

Dreaming Ubuntu: Jungian Studies, Forgiveness, and Jung’s Recalcitrant Fourth

open access: yesJournal of Analytical Psychology, Volume 70, Issue 2, Page 235-256, April 2025.
Abstract Jung’s recalcitrant fourth comes in from a place of opposition, demanding that what has been neglected be considered. It is in the spirit of the fourth that the author examines the use of Ubuntu in Jungian literature, cautioning against a decontextualized appropriation of the notion that overlooks its diverse interpretations and usages ...
Barbara Cerminara
wiley   +1 more source

Cyberterrorismo: historia de nunca acabar

open access: yesChasqui, 2015
La informática siempre ha tenido un halo de desconocido que ha generado temor. Los ataques son terrorismo o bromas de desaprensivos o desadaptados se pregunta el autor. Trata sobre la flexibilidad del ajuste; la vulnerabilidad del sistema; los ataques de
José Camilo Daccach T
doaj   +1 more source

Pruebas de penetración en aplicaciones web usando hackeo ético [PDF]

open access: yes, 2017
En este artículo se lleva a cabo un análisis de las principales pruebas de intrusión en aplicaciones web, con un breve preámbulo de lo que es el significado de Pentesting, así como de los principales ataques que puedan sufrir las aplicaciones web.
López de Jiménez, Rina Elizabeth
core  

Home - About - Disclaimer - Privacy