Results 41 to 50 of about 617,080 (246)

Purging the Past: The Current State of Lustration Laws in the Former Communist Bloc [PDF]

open access: yes, 1996
Lustration laws are used in the nations of the former communist bloc to determine whether suspected individuals collaborated with the former state security service.
Ellis, Mark S.
core   +2 more sources

An Evaluation of Mortality Rates and Their Determinants in a Cohort of Former Asbestos Miners in South Africa

open access: yesAmerican Journal of Industrial Medicine, EarlyView.
ABSTRACT Background A causal association between occupational asbestos exposure and lung disease, including pneumoconiosis and mesothelioma, is well established. Elevated mortality among former asbestos miners is expected. However, large‐scale South African studies examining all‐cause mortality in this population are lacking.
Yumna Williams‐Mohamed   +3 more
wiley   +1 more source

PROFESSIONAL SECRET IN THE PRACTICE OF SOCIAL WORK AND SOCIAL EDUCATION1: A CORNERSTONE OF DEMOCRACY WITH A FOCUS ON CATALAN AND SPANISH CONTEXTS (p. 91-112) [PDF]

open access: yes, 2014
The aim of this paper is to examine the theoretical foundations of the professional secret and confidentiality in Social Work and Social Education in order to propose an alternative approach to the issue which does not reduce the professional secret to a
Rosàs Tosas, Mar
core  

Global intelligence, co-operation versus accountability: new facets to an old problem [PDF]

open access: yes, 2009
The most important recent change within the realm of intelligence and security services has been the expansion of intelligence co-operation. The growing connectivity between both foreign intelligence services and also domestic security services means ...
Aldrich, Richard J.
core   +1 more source

Structural Mechanism of an Efficacy Photoswitch Targeting the β2‐adrenergic Receptor

open access: yesAngewandte Chemie International Edition, EarlyView.
Time‐resolved structures from x‐ray free‐electron laser measurements combined with cellular assays demonstrate how the photoswitchable β‐blocker photoazolol‐1 acts as an efficacy switch of β2‐adrenergic receptor function. Light‐induced ligand repositioning shifts activity from inverse agonism toward neutral antagonism by altering local helical ...
Robin Stipp   +29 more
wiley   +1 more source

USA CIA activity in the western part of USSR. Declissified archives and possibilities to research history of post war Lithuania

open access: yesGenocidas ir Rezistencija, 2017
Since the beginning of the guerrilla fights, since the Atlantic Charter, there has been a general belief that ‘America supports us’. Although the operations of the United States Central Intelligence Agency (CIA) were classified as ‘secret’, the facts of
Mingailė Jurkutė
doaj   +1 more source

Inwigilacja w parlamencie. Analiza procesu legislacyjnego projektów dotyczących czynności operacyjno-rozpoznawczych w dobie rozwoju technologicznego

open access: yesPoliteja, 2022
SURVEILLANCE IN PARLIAMENT: AN ANALYSIS OF THE LEGISLATIVE PROCESS OF PROJECTS CONCERNING SECRET SURVEILLANCE IN THE ERA OF TECHNOLOGICAL DEVELOPMENT Secret surveillance is one of the core activities of the intelligence services.
Mateusz Kolaszyński, Dariusz Stolicki
doaj   +1 more source

Dr. Hans Kohn and the political takeover of the Berlin Medical Society by the National Socialist regime in 1933

open access: yesThe Anatomical Record, EarlyView.
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley   +1 more source

“ALHS! ALHS! Why Are You So OSINT?” Reading Books During Office Hours

open access: yesAltre Modernità, 2014
This is not a story for people who cannot digest acronyms. Indeed, it is as if the secret services, generally considered, simply could not do without them.
Paolo Caponi
doaj   +1 more source

Keeping Secrets in Hardware: the Microsoft Xbox(TM) Case Study [PDF]

open access: yes, 2002
This paper discusses the hardware foundations of the cryptosystem employed by the Xbox(TM) video game console from Microsoft. A secret boot block overlay is buried within a system ASIC. This secret boot block decrypts and verifies portions of an external
Huang, Andrew "bunnie"
core  

Home - About - Disclaimer - Privacy