Proportional Equality: Readings of Romer [PDF]
One of the great enigmas of equal protection law is Romer v. Evans. In finding sufficient power in the rational basis test to invalidate a state constitutional amendment enacted by popular vote, the Supreme Court left legal scholars in its doctrinal dust,
Hunter, Nan D.
core +2 more sources
Spiritual Cannibalism in HRD: How Workplace Spirituality Devours Sacred Traditions
ABSTRACT This paper interrogates how the discourse of workplace spirituality in human resource development (HRD) operates as a tool of colonization. Through a systematic review of 48 articles published between 1997 and March 2025, the study uncovers recurring patterns of spiritual appropriation in which non‐Western traditions are detached from their ...
Shoaib Ul‐Haq
wiley +1 more source
Confronting the anti-access/area denial and precision strike challenge in the Baltic region [PDF]
The Baltic States are once again worried that their security is under threat. The US and NATO have responded with air patrols, joint exercises, and battalion-sized groundforce deployments.
Hunzeker, M. A., Lanoszka, A.
core +1 more source
Induced abortion in the world: 2. Present views on pregnancy termination
Abstract Abortion was practiced in most cultures for millennia, but was often disapproved and banned. The 20th century witnessed a progressive conditional legalization, often with limitations for the duration of pregnancy. Legalizing abortion was driven by multiple factors, including a desire to limit population growth, the emergence of movements that ...
Giuseppe Benagiano +4 more
wiley +1 more source
Forward defense – concept, plan, and action for solving russian aggression at Nato's easternd border
Forward defense is not a new concept. It is rather traditional, coming from the Cold War and implying, originally, the nuclear posture and strategy. Following the issuance of the Madrid NATO Strategic Concept and Vilnius statement that not an inch of ...
Iulian CHIFU
doaj +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
The Computer Misuse Act 1990: lessons from its past and predictions for its future [PDF]
The age of the internet has thrown down some real challenges to the Computer Misuse Act 1990. Recently, the Government made changes to this piece of legislation, in an attempt to meet two of those challenges--the proliferation of “ Denial of Service ...
Macewan, NF
core
ABSTRACT Objectives Men with presentations consistent with borderline personality disorder (BPD) and antisocial personality disorder (ASPD) are highly visible in community and forensic services. However, mis/underdiagnosis may be a consequence of their lower than expected engagement with mental health services, and when they do engage, systematised ...
Jillian Helen Broadbear +4 more
wiley +1 more source
Overall Cumulative Burden of Hidradenitis Suppurativa: An In‐Depth Qualitative Examination
This qualitative study examined the cumulative burden of Hidradenitis Suppurativa (HS) through in‐depth cross‐sectional interviews with 40 patients. The thematic analysis revealed five major concepts: challenging choices, prevalent negative emotions (fear, anxiety, depression), companionship (social support/isolation), life being ‘on hold’ due to ...
Burhan A. Buttar +13 more
wiley +1 more source
Securitization, Deterrence, and Extended Deterrence by Denial: The War in Ukraine
Abstract The war in Ukraine created a situation in which various actors issued and responded to existential threats. These incidents of aggressive rhetoric invite a scholarly discussion about the securitizing moves of deterrence. More specifically, I identify five interrelated securitizing moves—each responding to the other moves—within ...
openaire +1 more source

