Adolescentes, exclusión y vulnerabilidades [PDF]
publishedVersio
Carreteiro, Teresa Cristina
core
Abstract Bioclimatic variables, widely used in ecological and biogeographical studies, are typically derived from 30‐year averages of monthly data (e.g. 1971–2000). Unfortunately, the use of these long‐term averaged variables often creates a temporal mismatch with the observational data collected, which potentially undermines how environmental ...
Gonzalo E. Pinilla‐Buitrago +1 more
wiley +1 more source
Desarrollo de un modelo para calcular el nivel de seguridad en sitios Web, basado en el top 10 de vulnerabilidades más explotadas en 2017 según el marco de referencia OWASP [PDF]
Trabajo de InvestigaciónEn la actualidad la seguridad de la información es una prioridad para las grandes, medianas y pequeñas empresas, por este motivo se han desarrollado técnicas, marcos de referencia y metodologías para hacer un análisis de ...
Rodríguez-Rodríguez, Rafael Enrique +1 more
core
Online Risk Behaviours Among Adolescents: Identifying Areas of Digital Vulnerability
ABSTRACT As a period during which they undergo important physical, emotional and social changes, adolescence is of great importance for minors. In addition, adolescence is an initial stage in terms of children's use of their own mobile devices and their first access to the internet and social networks, an activity that becomes a generalised habit in ...
Sonia Carcelén‐García +2 more
wiley +1 more source
Violência, sofrimento e (re)existências: narrativas de travestis e mulheres trans
Pessoas trans são expostas a diferentes formas de violência que geram sofrimento. Trata-se de um fenômeno coletivo e dialético de subjugação/resistência. Entrevistamos 15 mulheres trans residentes na área metropolitana de Salvador-BA.
Macelo Machado de Almeida +3 more
doaj +1 more source
Intervención psicosocial en crisis comunitarias: el sostenimiento de las vulnerabilidades [PDF]
Es fácilmente comprensible la necesidad de abarcar la mayor cantidad de elementos que enriquezcan nuestro marco teórico y ...
Navarrete, Larry
core +3 more sources
A multi‐network approach to assess how physical templates shape stream fish ecological strategies
This multi‐network framework identifies a continuous topological gradient of fish ecological strategies—comprising Dispersal Gateways, Integrated Connectors, and Mass Effect Dominated species—within the dendritic river template. The functional role of stream reaches is scale‐sensitive, particularly at headwater extremes where sites operate as critical ...
Mauricio Cetra, Rodrigo da Silva Almeida
wiley +1 more source
Security analysis of JXME-Proxyless version [PDF]
JXME es la especificación de JXTA para dispositivos móviles con J2ME. Hay dos versiones diferentes de la aplicación JXME disponibles, cada una específica para un determinado conjunto de dispositivos, de acuerdo con sus capacidades.
Arnedo Moreno, Joan +2 more
core
estar: An R package to measure ecological stability
Abstract Assessing ecological stability is a key task in biodiversity monitoring and conservation. Quantifying stability is not trivial because its different aspects can be measured with various properties. However, to date, no software enables measuring different stability properties on ecological time‐series data.
Ludmilla Figueiredo +6 more
wiley +1 more source
EL ANÁLISIS DE RIESGO EN LA SEGURIDAD DE LA INFORMACIÓN // RISK ANALYSIS ON THE INFORMATION SECURITY
El propósito de este artículo consiste en ofrecer un conjunto de reflexiones conceptuales sobre la seguridad de la información y específicamente sobre el análisis de riesgos y su importancia en las organizaciones.
Manuel Mújica , Yanney Alvarez
doaj

