Results 41 to 50 of about 526,648 (174)

La protección de la privacidad de los menores en Internet. [PDF]

open access: yes, 2017
Treball Final de Grau en Criminologia i Seguretat. Codi: CS1044. Curs: 2017/2018The emergence and evolution of new technologies have brought numerous benefits that have made possible a more comfortable life and full of opportunities, but they
Porcar Parra, Sandra
core  

Effects of land cover and protected areas on flying insect diversity

open access: yesConservation Biology, Volume 39, Issue 4, August 2025.
Abstract Widespread insect losses are a critical global problem. Mitigating this problem requires identifying the principal drivers across different taxa and determining which insects are covered by protected areas. However, doing so is hindered by missing information on most species owing to extremely high insect diversity and difficulties in ...
James S. Sinclair   +27 more
wiley   +1 more source

Memorándum de Montevideo [PDF]

open access: yes, 2011
288 p.; 14 x 21.5 cm.Libro ElectrónicoEste documento, toma como base el memorándum de Montevideo, documento que reunió a representantes de la industria, medios de comunicación, legisladores, jueces, padres de familia, organizaciones de la sociedad civil ...
Gregorio, Carlos G. (Comp.)   +1 more
core  

Menores y medios de comunicación [PDF]

open access: yes, 2012
Currently there are numerous television programs and press that use to inform about the personal and intimate life of anonymous persons, minors in many cases, whose situation is considered to be at an important public interest, putting at risk evident ...
Morillas Fernández, Marta
core   +2 more sources

Effect of reserve protection level and governance on tree cover loss and gain

open access: yesConservation Biology, Volume 39, Issue 4, August 2025.
Abstract Terrestrial protected areas are essential for biodiversity conservation, yet it is not fully understood when and how different types of protected areas are most effective in achieving specific conservation objectives. We assessed the impact of reserves on tree cover loss and gain through a case study in Tasmania, Australia.
Natasha Stoudmann   +2 more
wiley   +1 more source

La protección del menor en el proceso judicial de prodigalidad. La protección del menor en el proceso judicial de prodigalidad *.

open access: yesRevista Sobre la Infancia y la Adolescencia, 2011
En este ensayo se analiza la posible reinvención del proceso de prodigalidad desde la perspectiva de la protección de los menores. En este sentido, proponemos la regulación de un proceso de prodigalidad ágil, dinámico, eficaz, sencillo y económico, que ...
Sonia Calaza López
doaj   +1 more source

La señalización de los contenidos televisivos en España como expresión del derecho a un consumo mediático responsable [PDF]

open access: yes, 2016
La señalización de los contenidos televisivos en horarios de programación considerados como franjas de protección infantil, debe contemplarse desde la perspectiva del derecho de los padres y menores a una comunicación y consumo responsable desde la ...
Fuente Cobo, Carmen   +2 more
core  

Digital medication and patients' right of autonomy in Spain

open access: yesBioethics, Volume 39, Issue 5, Page 482-491, June 2025.
Abstract The progress the Internet has experienced in recent years has brought about huge changes and social transformation in all aspects of our lives. One such aspect greatly impacted has been our health, where we can talk about the existence of an ‘Internet of Medical Things’.
Salvador Pérez Álvarez
wiley   +1 more source

Estudio de prescripciones técnicas para la mejora de la seguridad infantil en vehículos de transporte colectivo [PDF]

open access: yes, 2010
La seguridad en accidentes de tráfico constituye una de las preocupaciones de la sociedad actual. En particular, y en los últimos años, se está trabajando en mejorar la seguridad infantil en el transporte por carretera.
García Álvarez, Antonio   +1 more
core  

Evaluating cryptographic vulnerabilities created by quantum computing in industrial control systems

open access: yesJournal of Critical Infrastructure Policy, Volume 5, Issue 2, Page 88-110, Fall/Winter 2024.
Abstract Quantum computing is expected to eventually be able to break the public‐key cryptography algorithms currently used throughout information technology (IT) infrastructure, undermining foundational tools used to maintain information security across the country's critical infrastructure.
Michael J. D. Vermeer   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy