Results 1 to 10 of about 810,462 (294)
Power-supply enterprises cyber security and IT-immunity in the Customs Union countries [PDF]
It is important for power supply firms to remain immune to rapidly emerging cybersecurity threats. These can be acts of a hooligan nature, and an attempt to steal data and money, and even cases of electronic terrorism.
Pletnev Dmitri +3 more
doaj +1 more source
Five years ago, co-author Ashley Albert surrendered her parental rights to her two youngest children to the State of Washington. She shares her story of ostensibly "voluntary" surrender, which was anything but voluntary.
Ashley Albert, Amy Mulzer
doaj +1 more source
Some Issues Related to the Implementation of the Right to Protection by Individuals in Respect of Whom Criminal Proceedings Are Carried Out to Prove Them Guilty of Committing a Crime [PDF]
Introduction: the article deals with the issues of protection of the rights and freedoms of persons against whom criminal proceedings are carried out to prove them guilty of committing a crime; these issues have always been in the focus of attention of ...
OL’GA P. ALEKSANDROVA +1 more
doaj +1 more source
Neutrophils defending the defenders
Neutrophils are the most abundant granulocytes which are involved in defense mechanism. As innate immune cells, they are first-line defenders and can perform different functions in the human body to maintain equilibrium. Neutrophils are the main leukocyte and their role in healthy oral cavity is to face pathological changes ...
Singh, Roli +2 more
openaire +3 more sources
Strategy and cost stickiness under different managerial abilities: Evidence from Southeast Asia
Firms’ strategies reflect their competitive advantages, such as the prospector focuses on innovation and defenders focus on cost efficiency. The differences in strategies’ competitive advantages imply different resource management to different magnitude ...
Mitha Dwi Restuti +3 more
doaj +1 more source
Analysis of Mobile Phone Geolocation Methods Used in US Courts
Call Detail Records (CDR) are files that collect information about every call made on every cellular wireless network in the USA. Network operators capture and archive these files in the regular course of daily operations for internal use by their ...
Vladan M. Jovanovic, Brian T. Cummings
doaj +1 more source
Realization of the right to free legal aid: constitutional and sectoral aspects
The purpose of the article is to analyze the constitutional and sectoral aspects of the realization of the right to free legal aid, to determine the optimal subject of administration of the system of free secondary legal aid in Ukraine. Research methods.
Sergiy Ivanytskyy , Demyd Morozov
doaj +1 more source
Audit Games with Multiple Defender Resources [PDF]
Modern organizations (e.g., hospitals, social networks, government agencies) rely heavily on audit to detect and punish insiders who inappropriately access and disclose confidential information. Recent work on audit games models the strategic interaction
Blocki, Jeremiah +4 more
core +3 more sources
The Author studies the problem of general jurisdiction courts’ appeals to the Constitutional Court of the Republic of Armenia with a request to review the constitutionality of a legal act as a condition for the implementation of the principle of ...
Yeranuhi S. Tumanyants
doaj +1 more source
In a recent British Medical Journal editorial, Ruth Macklin pronounced that dignity is “a useless concept in medical ethics and can be eliminated without any loss of content” (Macklin, 2003). The published responses offered a unanimous, firm rebuttal, arguing that dignity is somehow foundational to all we do, or ought to be doing, within the ...
openaire +2 more sources

