Results 131 to 140 of about 44,119 (352)

El Islam en Internet: el concepto de ciberislam

open access: yesRevista de Estudios Internacionales Mediterráneos, 2009
The new technologies of information and communication have become essential part of our lives. Internet, mobile telephony and other digital platforms are essential in many fields.
Guerrero Enterría, Arturo
doaj  

The "Hidden Homeless" in Japan’s Contemporary Mobile Culture [PDF]

open access: yeslo Squaderno, 2014
Mobile telephony and all it ensues has frequently gained incredible attention due to the massive impacts, which has had on the organization of daily life as well as on popular and youth cultures.
Miya Yoshida
doaj  

Deregulating fixed voice services? Empirical evidence from the European Union [PDF]

open access: yes, 2014
This paper deals with the relationship between the traditional fixed-line, mobile and Voice over IP telephony in the EU.We estimate the supply and demand for fixed-line telephony using data on 25 EU member states for the 2006:Q2 - 2011:Q4 period ...
Lange, Mirjam R. J., Šaric, Amela
core  

No App, No Entry: Conceptualizing Digital Technology Captivity in Service Access

open access: yesPsychology &Marketing, EarlyView.
ABSTRACT We introduce Digital Technology Captivity (DTC), a form of consumer vulnerability that arises when digital technologies become the mandatory gateway to essential services. When access is tied to systems that feel unfamiliar, complex, or intimidating—and when preferred alternatives are limited—consumers may experience heightened vulnerability ...
Carolyn Wilson‐Nash   +4 more
wiley   +1 more source

Association of Overactive Bladder With Fall Risk Among US Adults Aged 20−69 Years

open access: yesNeurourology and Urodynamics, EarlyView.
ABSTRACT Objective Falls are a leading cause of morbidity and loss of independence in adults. The association between overactive bladder (OAB) and fall risk has not been thoroughly investigated. This study evaluated the association between OAB and fall history in a nationally representative sample of US adults aged 20−69 years.
Brian J. Linder   +6 more
wiley   +1 more source

DEVELOPMENT APPROACHES AND STRATEGIC MOVEMENTS WITHIN THE MOBILE TELECOMMUNICATION FIELD [PDF]

open access: yesManagement & Marketing, 2008
In February 2000, when Vodafone took control of the British operatorOrange, they had to split, because Vodafone owned two mobile telephonylicenses in the same country – Great Britain – fact that was interdicted by theEuropean legislation.
Gheorghe MEGHISAN   +1 more
doaj  

Mitigating Health Disparities Through Empathetic Policymaking During Times of Crisis

open access: yesPublic Administration and Development, EarlyView.
ABSTRACT The COVID‐19 pandemic greatly exacerbated the existing disparities and inequities in health and healthcare among historically marginalized populations. Today, these impacts still echo. These persistent structured inequities erode the public's trust in government, lead to failure in public policies, and result in worse health consequences ...
Yali Pang   +2 more
wiley   +1 more source

Large, rugged and remote: The challenge of wolf–livestock coexistence on federal lands in the American West

open access: yesPeople and Nature, EarlyView.
Abstract The expansion of grey wolves (Canis lupus) across the western United States, including on public lands used for extensive livestock grazing, requires tools and techniques for reducing wolf–livestock conflict and supporting coexistence. We examined approaches used on forested lands managed by the U.S.
Robert M. Anderson   +3 more
wiley   +1 more source

A Technical Approach to the Evaluation of Radiofrequency Radiation Emissions from Mobile Telephony Base Stations. [PDF]

open access: yesInt J Environ Res Public Health, 2017
Buckus R   +8 more
europepmc   +1 more source

Signalling Attacks in Mobile Telephony [PDF]

open access: yes, 2018
Many emerging Internet of Things devices, gateways and networks, rely either on mobile networks or on Internet Protocols to support their connectivity. However it is known that both types of networks are susceptible to different types of attacks that can significantly disrupt their operations.
openaire   +1 more source

Home - About - Disclaimer - Privacy