Results 121 to 130 of about 150,090 (260)

The role of child language ability and parental mentalization in early child dysregulation

open access: yesInfant Mental Health Journal: Infancy and Early Childhood, Volume 47, Issue 1, January 2026.
Abstract Dysregulation in early childhood is associated with increased vulnerability to psychopathology and poor psychosocial outcomes. While there is evidence that both child language ability and parental mentalization are associated with dysregulation in early childhood, there is little understanding of the relationships between these variables, and ...
Sara Cibralic   +6 more
wiley   +1 more source

A trust model for cloud computing environment [PDF]

open access: yes, 2015
Este artigo apresenta uma proposta de um modelo de gestão contendo requisitos relacionados com a confiabilidade dos sistemas no ambiente de Computação em Nuvem (CN).
Júnior, Teófilo Teixeira Branco   +1 more
core   +1 more source

Risks of Time and Chronology as an Underpinning Infrastructure for Critical Systems: Emerging Chronorisks and Chronosecurity Needs

open access: yesJournal of Critical Infrastructure Policy, Volume 7, Issue 1, Spring/Summer 2026.
ABSTRACT Time and chronology form the invisible architecture upon which modern civilization depends, governing synchronization across markets, power grids, communication networks, transportation, and defense. Yet, this shared temporal framework, engineered through atomic clocks, satellites, and digital synchronization, faces growing vulnerabilities ...
Bilal M. Ayyub
wiley   +1 more source

Análisis de los factores de seguridad de un sitio web [PDF]

open access: yes, 2013
Se pretende desarrollar un documento que posibilite una ayuda sobre los factores principales de seguridad que existen en los sitios web, que contenga un análisis de estos factores. describiendo la características, pros y contras que se pudieran encontrar.
Arboleda Calderon, Jhon Edinson   +1 more
core  

Blockchain and Quantum Technologies for Securing the Global Nuclear Supply Chain: Synergies, Applications, Technical Challenges and Opportunities

open access: yesJournal of Critical Infrastructure Policy, Volume 7, Issue 1, Spring/Summer 2026.
ABSTRACT The infiltration of counterfeit, fraudulent, and suspect items into civil nuclear supply chains, notably within power generation and medical isotope production, poses severe safety and security threats. The ever‐increasing growth in nuclear installations (70 power plants are under construction and another 100 are in the planning stage) and the
Hafiz Ahmed
wiley   +1 more source

Estudio para mejoramiento del proceso administración de la seguridad institucional correspondiente a la Vicerrectoría Administrativa y financiera de la Universidad Tecnológica de Pereira [PDF]

open access: yes, 2015
El presente trabajo está orientado a la propuesta de mejoramiento de procesos, resultados e indicadores que miden un proceso, es importante porque permite identificar oportunidades de mejora en la Vicerrectoría Administrativa y Financiera en el proceso ...
Carvajal Morales, Andrés Felipe   +1 more
core  

VULNERABILIDADES EM SAÚDE: O DIAGNÓSTICO DOS CALOIROS DE UMA UNIVERSIDADE PORTUGUESA [PDF]

open access: yes, 2014
O ingresso na universidade apresenta-se como uma fase crucial na vida do estudante, fase em que há aumento da autonomia e liberdade, do sentido de responsabilidade e a da autodisciplina, mas propicia mais acesso aos riscos à saúde.
Lopes, M. J., Mendes, Felismina
core   +2 more sources

Heterogeneity and vulnerability of livestock in forest plantations of Uruguay [PDF]

open access: yes, 2012
In this paper we study the situation of livestock farmers related to the afforestation of the northwest region of Uruguay and suggest that their vulnerability has characteristics that vary according to characteristics of the modified ecosystem in which ...
Carriquiry, R.   +3 more
core  

Guía de ataques, vulnerabilidades, técnicas y herramientas para aplicaciones Web

open access: yesReCIBE, 2015
En la actualidad el riesgo para los sistemas informáticos ha aumentado debido a un crecimiento en la complejidad en las tecnologías de la información. Hoy en día cualquier computadora conectada a internet está expuesta a diversas amenazas.
Ana Laura Hernández Saucedo   +1 more
doaj  

COBIT: UN MARCO DE TRABAJO PARA EL DESARROLLO DE UNA AUDITORÍA EFICAZ

open access: yesQuipukamayoc, 2014
El desarrollo de la tecnología es percibida en formaglobal, como un disparador de cambios permanentesen el ambiente de negocios. Sin embargo, existe unaidea primordial que aparece inmóvil contra esta fuerzatecnológica que implica que las organizaciones ...
Carlos Alberto Pastor Carrasco   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy