Results 91 to 100 of about 1,334,311 (342)

Stand in the Place Where Data Live: Data Breaches as Article III Injuries [PDF]

open access: yes, 2020
Every day, another hacker gains unauthorized access to information, be it credit card data from grocery stores or fingerprint records from federal databases.
Wasserman, Jason
core   +1 more source

Mechanisms of Mitochondrial Toxicity and Cytotoxicity Caused by Pseudomonas aeruginosa Pyocyanin in Human Nasal Epithelial Cells

open access: yesInternational Forum of Allergy &Rhinology, EarlyView.
ABSTRACT Background Pseudomonas aeruginosa is an opportunistic pathogen in cystic fibrosis‐related chronic rhinosinusitis (CF‐CRS) that produces phenazine metabolites pyocyanin and 1‐hydroxyphenazine (1‐HP), which may have detrimental effects on mitochondria, reactive oxygen species (ROS), Ca2+ signaling, and apoptosis.
Joel C. Thompson   +8 more
wiley   +1 more source

Back Again to the Future: A New Era for Cerebroprotection

open access: yesAnnals of Neurology, EarlyView.
Cerebroprotection is a fresh framework for designing neurological therapy that targets glia and vascular cells, in addition to neurons. In the future, successful cerebroprotection will involve targeting all elements of the neurovascular unit. Preclinical trials must include functional outcomes, as well as lesion morphometry.
Patrick Lyden
wiley   +1 more source

Child Pornography\u27s Forgotten Victims [PDF]

open access: yes, 2008
The goal of this paper is to demonstrate that possession of child pornography is not a victimless crime. It will illustrate the problem and explain the harm suffered by its victims.
Rogers, Audrey
core   +2 more sources

The volume and source of cyberabuse influences victim blame and perceptions of attractiveness [PDF]

open access: yes, 2018
Cyberabuse is an escalating problem in society, as opportunities for abuse to occur in online public domains increase. Such acts are often defined by the frequency of abuse, and in many cases multiple individuals play a part in the abuse.
Hand, Christopher J.   +2 more
core   +3 more sources

Dr. Hans Kohn and the political takeover of the Berlin Medical Society by the National Socialist regime in 1933

open access: yesThe Anatomical Record, EarlyView.
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley   +1 more source

The role that USAID and other development funders play in furthering mental health research

open access: yesCambridge Prisms: Global Mental Health
Feb. 19, 2024.
Lyla Schwartz   +1 more
doaj   +1 more source

Children and Pets: The Hidden Victims of Domestic Violence & Abuse (DVA): Where Action & Activism merge! [PDF]

open access: yes, 2019
Children and Pets: The Hidden Victims of Domestic Violence & Abuse (DVA): Where Action & Activism merge! Researchers such as Harne (2011) and Radford et al (2011) have long championed the area of Children’s rights in the DVA field and the Government ...
McKie, Ruth, Turgoose, Di
core  

Under the Shade of a Coolabah Tree: A Second Cache of Tulas From the Boulia District, Western Queensland

open access: yesArchaeology in Oceania, EarlyView.
ABSTRACT This paper reports on the excavation of a cache of stone artefacts, buried on the bank of a waterhole or ‘billabong’ in central western Queensland. This is an extremely rare find, and yet it is the second such site to be reported within less than a 10 km radius.
Yinika L. Perston   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy