Results 221 to 230 of about 503,301 (280)

Some of Them Want to Use You: Antecedents and Consequences of Supervisors' Employee‐Directed Objectification

open access: yesJournal of Organizational Behavior, EarlyView.
ABSTRACT Although objectification is prevalent in leadership relations, little is known about (a) why some supervisors objectify their employees to a greater extent than others and (b) when and how such objectification manifests in a supervisor's leadership behavior.
Katerina Tsantila, Frank Walter
wiley   +1 more source

Optimizing Health Insurance Claims Processing: The Role of Clinical Documentation Improvement (CDI). [PDF]

open access: yesRisk Manag Healthc Policy
Alumran A   +5 more
europepmc   +1 more source

Perceived parenting styles and chronic pain course in mid-life in the general population. [PDF]

open access: yesPain Rep
Rouch I   +8 more
europepmc   +1 more source

A denial of service but not a denial of justice

Computer Law & Security Report, 2006
Abstract There has been a great deal of concern that the Computer Misuse Act 1990 has been unable to keep pace with the development of the internet and is ineffective against new forms of cyber-crime, such as denial of service attacks. This case note considers the judgment of the Divisional Court in Director of Public Prosecutions v.
Georgina Kon, Peter Church
openaire   +1 more source

Denial of service or denial of security?

Proceedings of the 14th ACM conference on Computer and communications security, 2007
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the Hydra-Onion and Cashmere systems that aim to offer reliable mixing, and Salsa, a peer-to-peer anonymous communication network.
Nikita Borisov   +3 more
openaire   +1 more source

Analysis of denial-of-service attacks on denial-of-service defensive measures

GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), 2004
Currently, denial-of-service (DoS) attacks remain among the most critical threats on the Internet. Ironically, although a major objective of Internet protocol design was to prevent DoS attacks and to maintain network connections in order to provide essential services to the masses uninterruptedly, the Internet is suffering significantly from ...
Bao-Tung Wang, Henning Schulzrinne
openaire   +1 more source

Home - About - Disclaimer - Privacy