Academic literature on the topic 'Menace Internet'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Menace Internet.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Menace Internet"

1

Cohen, Jillian. "The Menace or Blessing of Internet Pharmacy." Journal of Pharmaceutical Marketing & Management 16, no. 3 (2005): 5–11. http://dx.doi.org/10.1300/j058v16n03_03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hu, Qing, and Tamara Dinev. "Is spyware an Internet nuisance or public menace?" Communications of the ACM 48, no. 8 (2005): 61–66. http://dx.doi.org/10.1145/1076211.1076241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lankshear, Colin, and Michele Knobel. "Memes, Macros, Meaning, and Menace: Some Trends in Internet Memes." Journal of Communication and Media Studies 4, no. 4 (2019): 43–57. http://dx.doi.org/10.18848/2470-9247/cgp/v04i04/43-57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cohen, Jillian Clare. "The Menace or Blessing of Internet Pharmacy? Some Public Policy Considerations." Journal of Pharmaceutical Marketing & Management 16, no. 3 (2004): 5–11. http://dx.doi.org/10.3109/j058v16n03_03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kumar, Shankar, Dr Nandeshwar Pd Singh, and Dr Narendra Kumar. "Mechanism, Tools and Techniques to Mitigate Distributed Denial of Service Attacks." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 855–61. http://dx.doi.org/10.22214/ijraset.2023.48675.

Full text
Abstract:
Abstract: Attacks such as Distributed Denial of Service (DDoS) continue to menace the Internet. Attackers are able to use larger bandwidths because they concentrate on application layers. In order to create novel prevention strategies, it is crucial to understand the nature of distributed denial of service assaults. One of the most upsetting types of attacks on the Internet today is the distributed denial of service (DDoS) attack. When fundamental Internet infrastructure and services, such as the Domain Name System, are targeted or misused, such attacks become far more powerful and deadly (DNS
APA, Harvard, Vancouver, ISO, and other styles
6

Kaur, Gurleen, Debhjit Mukherjee, Bhavika Moza, Vaishali Pahwa, Kulwinder Kaur, and Kamaljeet Kaur. "The dark web: A hidden menace or a tool for privacy protection." IP International Journal of Forensic Medicine and Toxicological Sciences 8, no. 4 (2024): 160–67. http://dx.doi.org/10.18231/j.ijfmts.2023.034.

Full text
Abstract:
The dark web has long been a subject of debate, as it raises questions about its covert threats and privacy safeguarding capabilities. It's an internet realm requiring specific software or authorization, notorious for illegal activities and untraceable transactions. Researchers and law enforcement agencies use the dark web for intelligence gathering on cybercriminals, making it crucial in understanding the evolution of the internet and emerging criminal activities. Additionally, studying the dark web helps identify cybersecurity threats and vulnerabilities. This research explores the relations
APA, Harvard, Vancouver, ISO, and other styles
7

Przyswa, Éric, and Franck Guarnieri. "Contrefaçon de médicaments sur Internet?: prévenir une menace réelle sur la santé publique." Les Tribunes de la santé 40, no. 3 (2013): 77. http://dx.doi.org/10.3917/seve.040.0077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Arshinova, A. I. "Digital Inequality as Menace and Opportunity in Strategizing the Development of Educational Sphere." Economic Revival of Russia, no. 4 (78) (2023): 138–50. http://dx.doi.org/10.37930/1990-9780-2023-4-78-138-150.

Full text
Abstract:
Digital competence has been recognized in Europe as one of the 8 key competencies for lifelong learning. The problem of the digital divide as a binary division of the world population into those with and without access to the Internet is still relevant. However, even among the population provided with Internet access, significant differences persist, the so-called second-level digital divide. Digitalization brings enormous opportunities for the education sector with the constructive use of ICT, freeing up time, the most valuable resource in strategizing, from routine tasks to creative, innovat
APA, Harvard, Vancouver, ISO, and other styles
9

V, Mrs Pallavi K., Simran Banu H. Shirahatti, Soniya Devi T, Syed Owais Umair, and Syed Waseem Ahmed. "Phishing - A Common Cyber Menace to Combat." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 2307–10. http://dx.doi.org/10.22214/ijraset.2024.60283.

Full text
Abstract:
Abstract: Phishing is the most common type of cyber threat existing today. In this paper the aim is to do a quick survey about phishing. Phishing is an attack made to gain unauthorized access to the sensitive information about a person on internet by impersonating the websites they use. This paper also talks about the several means and mechanisms that exists to combat phishing attacks. The intruders mostly use emails, messages, or websites that appear to be from a trusted source to trick the victims into divulging sensitive information. Phished links are to be detected and the users must be pr
APA, Harvard, Vancouver, ISO, and other styles
10

Yashlavskii, A. "The Jihadists from Europe in the Middle East: Phantom and Real Menace." World Economy and International Relations, no. 10 (2015): 18–29. http://dx.doi.org/10.20542/0131-2227-2015-10-18-29.

Full text
Abstract:
The issue of foreign fighters from Europe who travel to fight on the side of radical jihadist groups in the Middle East (primarily in Syria and Iraq) is growing in importance in view of the threat those militants who return home present for their countries. On the other hand, although almost every armed conflict in the countries with predominantly Muslim population attracts foreign volunteers. In particular, the Syrian civil war became the main point of attraction of jihadists from all over the world. Syria is considered by some experts as an “incubator” for Islamist militants. According to so
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Menace Internet"

1

Mealer, Michael J. "Internet Radicalization : Actual Threat or Phantom Menace?" Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/17416.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Popular opinion expresses fear that accessing radical Islamic content and connecting with extremist networks through Internet functionalities causes radicalization and recruitment to commit terrorist acts. Anecdotal evidence has been used to support this assertion. The opinion assumes the Internet creates a new path that drives radicalization and recruitment. Whether computer-mediated communication (CMC) and Internet functionalities cause individuals to radicalize has not been thoroughly studied. This thesis explores whether a correlati
APA, Harvard, Vancouver, ISO, and other styles
2

Varin, Annie. "Risques technologiques et sécurité sur Internet : production d'un outil pour favoriser la prévention et fournir des pistes de solution." Mémoire, Université de Sherbrooke, 2011. http://savoirs.usherbrooke.ca/handle/11143/2674.

Full text
Abstract:
Ce mémoire production vise, en premier lieu, à fournir des pistes d'explication sur la popularité et l'unicité du média Internet, pourtant jeune si on le compare aux autres grands médias traditionnels (journaux, télévision, radio). Ses caractéristiques intéressantes ont toutefois tendance à «éclipser» le risque omniprésent qui sévit sur le réseau. Les menaces sont non seulement plus nombreuses, mais aussi plus sournoises, dangereuses et potentiellement lourdes de conséquences. Plusieurs ressources sont offertes aux utilisateurs pour les aider à se protéger sur Internet et, s'il est trop tard,
APA, Harvard, Vancouver, ISO, and other styles
3

Carvallo, Pamela. "Sécurité dans le cloud : framework de détection de menaces internes basé sur l'analyse d'anomalies." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLL008/document.

Full text
Abstract:
Le Cloud Computing (CC) ouvre de nouvelles possibilités pour des services plus flexibles et efficaces pour les clients de services en nuage (CSC). Cependant, la migration vers le cloud suscite aussi une série de problèmes, notamment le fait que, ce qui autrefois était un domaine privé pour les CSC, est désormais géré par un tiers, et donc soumis à ses politiques de sécurité. Par conséquent, la disponibilité, la confidentialité et l'intégrité des CSC doivent être assurées. Malgré l'existence de mécanismes de protection, tels que le cryptage, la surveillance de ces propriétés devient nécessaire.
APA, Harvard, Vancouver, ISO, and other styles
4

Carvallo, Pamela. "Sécurité dans le cloud : framework de détection de menaces internes basé sur l'analyse d'anomalies." Electronic Thesis or Diss., Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLL008.

Full text
Abstract:
Le Cloud Computing (CC) ouvre de nouvelles possibilités pour des services plus flexibles et efficaces pour les clients de services en nuage (CSC). Cependant, la migration vers le cloud suscite aussi une série de problèmes, notamment le fait que, ce qui autrefois était un domaine privé pour les CSC, est désormais géré par un tiers, et donc soumis à ses politiques de sécurité. Par conséquent, la disponibilité, la confidentialité et l'intégrité des CSC doivent être assurées. Malgré l'existence de mécanismes de protection, tels que le cryptage, la surveillance de ces propriétés devient nécessaire.
APA, Harvard, Vancouver, ISO, and other styles
5

Balduzzi, Marco. "Mesures automatisées de nouvelles menaces sur Internet." Paris, Télécom ParisTech, 2011. http://www.theses.fr/2011ENST0042.

Full text
Abstract:
Pendant les vingt dernières années, Internet s'est transformé d'un réseau simple de taille limitée à un système complexe de grandes dimensions. Alors qu'Internet était initialement utilisé pOUf offrir du contenu statique,organisé autour de simples sites web, aujourd'hui il fournit en même temps contenu et services complexes (comme chat, e-mail ou le web) ainsi que l'externalisation de calculs et d'applications (cloud computing). Les attaquants ne sont pas indifférents à l'évolution d'Internet Souvent motivées par un florissant marché noir, les attaquants sont constamment à la recherche de vuln
APA, Harvard, Vancouver, ISO, and other styles
6

Ben, Chaabene Nour El Houda. "Détection d'utilisateurs violents et de menaces dans les réseaux sociaux." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS001.

Full text
Abstract:
Les réseaux sociaux en ligne font partie intégrante de l'activité sociale quotidienne des gens. Ils fournissent des plateformes permettant de mettre en relation des personnes du monde entier et de partager leurs intérêts. Des statistiques récentes indiquent que 56% de la population mondiale utilisent ces médias sociaux. Cependant, ces services de réseau ont également eu de nombreux impacts négatifs et l'existence de phénomènes d'agressivité et d'intimidation dans ces espaces est inévitable et doit donc être abordée. L'exploration de la structure complexe des réseaux sociaux pour détecter les c
APA, Harvard, Vancouver, ISO, and other styles
7

Wenk, Christian. "Einsatz von Internet-Technologie für Maschinenbedienoberflächen /." [Norderstedt] : Books on Demand, 2005. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=014872006&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Issoufaly, Taher. "Physical Tracking : menaces, performances et applications." Thesis, La Réunion, 2019. http://www.theses.fr/2019LARE0017/document.

Full text
Abstract:
La récente émergence des smartphones et des objets connectés a révolutionné le mode de vie des utilisateurs. Ces dispositifs ubiquitaires et équipés de plusieurs interfaces sans fil de communication, sont rapidement devenus indispensables dans la vie quotidienne des utilisateurs avec une utilisation intensive. Les interfaces sans fil de ces objets connectés émettent périodiquement des informations, certaines sont spécifiques aux utilisateurs et permettent par effet de bord d’identifier et de suivre leur déplacements. Le suivi des utilisateurs via les informations fortuitement émis
APA, Harvard, Vancouver, ISO, and other styles
9

Ogandaga, Ghislain. "Stratégies cognitives dans la recherche des informations Internet." Paris 5, 2008. http://www.theses.fr/2008PA05H026.

Full text
Abstract:
L'étude de la recherche des informations sur Internet est associée à la théorie selon laquelle l'être humain est un système physique de manipulation de symboles ou de représentations mentales. En adoptant ce point de vue dans les deux premières expériences, nous obtenons des résultats qui sont en contradiction avec les bases de l'approche internaliste de manipulation de représentations mentales mais sont tout à fait conformes à ce qu'on trouve dans la littérature : les corrélations entre les temps d'exécution des tâches Internet et les aptitudes cognitives ne sont pas fortes, le niveau de la p
APA, Harvard, Vancouver, ISO, and other styles
10

Bružaitė, Laura. "Kūrybos proveržis internete. "YouTube" fenomenas." Bachelor's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110802_155600-29059.

Full text
Abstract:
Diplominiame darbe analizuojama mėgėjų ir profesionalų meno ribų problematika internete, kuri atsiskleidžia tinklalapyje „YouTube“. Darbo tikslas išanalizuoti interneto poveikį meno vystymuisi ir išsiaiškinti dėl kokių priežasčių nyksta riba tarp profesionalių menininkų ir mėgėjų bei pateikti interneto ir meno santykį lietuviškame kontekste. Šio tikslo siekiama analizuojant interneto raidą, jo poveikį kultūros vystymuisi, apžvelgiant institucinę meno teoriją, analizuojant tinklalapį „YouTube“, aptariant renginį „YouTube Play“. Taip pat atliekant tiesioginę menininkų apklausą ir sukuriant dokum
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Menace Internet"

1

Appelbaum, Jacob. Menace sur nos libertés: Comment Internet nous espionne. Comment résister. Robert Laffont, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Destouche, Grégory. Menace sur Internet: Des groupes subversifs et terroristes sur le Net. Michalon, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wautelet, M. Les cyberconflits: Internet, autoroutes de l'information et cyberespace : quelles menaces? Grip, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Guillebaud, Jean-Claude. Voulons-nous d'un monde désincarné?: Promesses et menaces de la cyberculture. Group Fides, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xavier, Raufer, and Laboratoire MINOS (Centre d'études de l'armement (France)), eds. Dictionnaire technique et critique des nouvelles menaces. Presses universitaires de France, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Des libertés numériques: Notre liberté est-elle menacée par l'Internet? Presses universitaires de France, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Danièle, Laruelle, ed. Shantorian. Bayard jeunesse, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Steven, Heller, ed. Red scared!: The commie menace in propaganda and pop culture. Chronicle Books, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Won, Kim, ed. The Human Society and the Internet: Internet-related socio-economic issues, First International Conference Human.Society@Internet 2001, Seoul, Korea, July 4-6, 2001 : proceedings. Springer, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Malkin, Michelle. Invasion: How America still welcomes terrorists, criminals, and other foreign menaces to our shores. Regnery Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Menace Internet"

1

Maurya, Sudhanshu, Shweta Arora, Kavita Ajay Joshi, et al. "To Combat the Menace of Forest Fires at Nainital and Almora District in Uttarakhand Using Internet of Things." In Cyber Technologies and Emerging Sciences. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2538-2_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Knittl, Silvia, Valentina Neuberger, and Simon Dieterle. "Das Internet of Things – zwischen Usability und Verlust der Datensouveränität." In Faktor Mensch. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-34524-2_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Höflich, Joachim R. "Internet und E-Mail – neue Wege schriftlicher Kommunikation?" In Der Mensch und seine Medien. Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-531-18683-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Höhler, Gertrud. "Interne Kommunikation als Führungsinstrument." In DIE RESSOURCE MENSCH im Mittelpunkt innovativer Unternehmensführung. Gabler Verlag, 1993. http://dx.doi.org/10.1007/978-3-322-96421-2_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Coy, Wolfgang. "Die Sprache(n) des Internets." In Der Mensch und seine Sprache(n). Böhlau Verlag, 2001. http://dx.doi.org/10.7767/9783205128663-010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Elsdörfer, Ulrike. "Wagnis der Freiheit – Begegnung, Internationalismus und Internet: Grenzerfahrungen im interkulturellen Spiritual Care and Counselling." In Wagnis Mensch werden. Vandenhoeck & Ruprecht, 2022. http://dx.doi.org/10.13109/9783666703270.169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pallasmaa, Juhani. "Corpo, mente e immaginazione: l’essenza mentale dell’architettura." In La mente in architettura. Firenze University Press, 2021. http://dx.doi.org/10.36253/978-88-5518-286-7.05.

Full text
Abstract:
In our culture, dominated by shallow rationality and reliance on the empirical, measur-able and demonstrable, the embodied, experiential and mental dimensions of design are supressed. Yet, there is an interest in the possibilities of neuroscience to reveal the roles of space, form, materiality, memory and imagery in our sensory experiences and mind. Neuroscience supports the mental objectives in design, which are in danger of being eliminated in the crudely rationalized, quantified and functionalized processes of de-sign. The task of architecture extends beyond its utilitarian purposes to the existential and mental sphere. Articulating lived existential space, architecture constitutes our sys-tem of externalized order, hierarchy, memory and meaning. Neuroscience will reveal how the external and internal, material and mental, utilitarian and poetic dimensions constitute an integrated existential experience. The interest in the mental dimensions of architecture will confirm the significance of intuition, empathy and imagination.
APA, Harvard, Vancouver, ISO, and other styles
8

Prodoehl, Hans Gerd. "Hit it and quit it! Das Internet als Treibhaus für die Evolution des abstrakten Menschen." In Der abstrakte Mensch. Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-13539-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mühlenfeld, Hans-Ullrich. "Exkurs: Voraussetzungen zur Durchführung audiovisueller Fernkommunikation mit Hilfe des Internets." In Der Mensch in der Online-Kommunikation. Deutscher Universitätsverlag, 2004. http://dx.doi.org/10.1007/978-3-322-81327-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jecker, Constanze, and Simone Huck-Sandhu. "Von der Information zur Orientierung. Zur (neuen) Rolle der internen Kommunikation in Selbstorganisationen." In Der Mensch in der Selbstorganisation. Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-27048-3_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Menace Internet"

1

Miao, Rui, Rahul Potharaju, Minlan Yu, and Navendu Jain. "The Dark Menace." In IMC '15: Internet Measurement Conference. ACM, 2015. http://dx.doi.org/10.1145/2815675.2815707.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kolawole Akinyokun, Oluyomi, Boniface Kayode Alese, Samuel A. Oluwadare, Mary O Iyare, and Gabriel Babatunde Iwasokun. "Contributory Indices to Cybercrime Activities in Nigeria." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2243.

Full text
Abstract:
The arrival of Internet has turned the world into a global village where geographical location or distance has to some extent ceased to be a major obstacle to communication and movement of goods and services. This development has also brought with it cybercrime and its level of sophistication. A lot of measures and institutions are being put in place to minimize the incidence of cybercrime in different countries; also, efforts are being made to identify the contributing factors to cybercrime. This research however, adopts a factor analytic approach to formulate the indices that may contribute
APA, Harvard, Vancouver, ISO, and other styles
3

Adeshina, Qozeem Adeniyi, and Baidya Nath Saha. "Using Machine Learning to Predict Distributed Denial-of-Service (DDoS) Attack." In Intelligent Computing and Technologies Conference. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.115.21.

Full text
Abstract:
The IT space is growing in all aspects ranging from bandwidth, storage, processing speed, machine learning and data analysis. This growth has consequently led to more cyber threat and attacks which now requires innovative and predictive security approach that uses cutting-edge technologies in order to fight the menace. The patterns of the cyber threats will be observed so that proper analysis from different sets of data will be used to develop a model that will depend on the available data. Distributed Denial of Service is one of the most common threats and attacks that is ravaging computing d
APA, Harvard, Vancouver, ISO, and other styles
4

Stütz, Lena, and Andreas Riener. "Let’s Chat Internal: User Acceptance of an In-Company Service Desk Chatbot." In MuC '21: Mensch und Computer 2021. ACM, 2021. http://dx.doi.org/10.1145/3473856.3474005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ali, Marlina, Johari Surif, Norasykin Mohd Zaid, Corrienna Abdul Talib, Abdul Halim Abdullah, and Nor Hasniza Ibrahim. "The Effectiveness of a Mentor-Mentee Program on Malaysian School Students' Interest in STEM." In 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE). IEEE, 2018. http://dx.doi.org/10.1109/tale.2018.8615161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stojáková, Monika. "Virtuálna mena – "vakcína" pre finančný trh." In IV.SLOVENSKO-ČESKÉ DNI DAŇOVÉHO PRÁVA. Univerzita Pavla Jozefa Šafárika, 2021. http://dx.doi.org/10.33542/scd21-0043-1-25.

Full text
Abstract:
Virtuálne platformy (virtuálne meny, digitálne meny alebo kryptomeny) vykazujú veľmi pôsobivú dynamiku rastu, ktorá je daná jednak rastúcim záujmom verejnosti o túto oblasť, jednak ich silným dopytom na trhu. Všeobecne téma virtuálnych mien aktuálne rezonuje v celej spoločnosti. Rozvoj technológií v 21. storočí podnietil používanie internetu, ktorému sa vďaka zavedeniu nového fenoménu - virtuálnych mien výrazne podarilo vyvinúť nové inovácie na finančnom trhu. V tomto príspevku sa pokúsime zaujať stanovisko k virtuálnym menám ako zdrojom akejsi „vakcíny“ pre finančný trh, a to aj vzhľadom na p
APA, Harvard, Vancouver, ISO, and other styles
7

Tsai, Janet Y., Daria Kotys-Schwartz, Beverly Louie, Virginia Ferguson, and Alyssa Berg. "Comparing Mentor and Mentee Perspectives in a Research-Based Undergraduate Mentoring Program." In ASME 2012 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/imece2012-87723.

Full text
Abstract:
At the University of Colorado Boulder (CU), a research-based undergraduate mentoring program is now in its second year of implementation. The program, Your Own Undergraduate Research Experience (YOU’RE@CU) has three main goals: improve the retention rate of diverse groups in undergraduate engineering, build undergraduate interest in engineering research, and prepare graduate students to take on leadership roles in either academia or industry-based research careers. In YOU’RE@CU, undergraduate students are paired with a graduate mentor and work in the graduate student’s lab several hours a week
APA, Harvard, Vancouver, ISO, and other styles
8

"Preliminary study for catalytic gasification of water hyacinth for syngas production." In Sustainable Processes and Clean Energy Transition. Materials Research Forum LLC, 2023. http://dx.doi.org/10.21741/9781644902516-50.

Full text
Abstract:
Abstract. Water hyacinth being one of the top invasive aquatic plants has brought upon various challenges towards the humanity and the environment. The magnitude of the menace of uncontrollable growth and spread of water hyacinth has sparked the interest of researchers in identifying its potential as a biomass feedstock for biofuel production. Biomass gasification is deemed as a promising green technology which is capable of converting biomass into value-added commodity. Conversion of such large quantity of biomass into biofuel via gasification does not only help to promote sustainable resourc
APA, Harvard, Vancouver, ISO, and other styles
9

Mohammad Iqbal, Abdul Ahad, and Ali Al-Alili. "Review of Solar Sorption Cooling Research in the MENA Region." In ASME 2016 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/imece2016-66352.

Full text
Abstract:
This paper provides a brief overview of closed sorption cooling technologies, and highlights the research performed on them in the Middle East and North Africa region. The main findings are summarized and presented in tabulated and graphical forms. The reviewed studies are compared in terms of the working pair, the Coefficient of Performance, the normalized collector area, etc. The results show that the average cyclic Coefficient of Performance for the adsorption chillers was 0.41, whereas the average chiller Coefficient of Performance for the absorption chillers was 0.677. The research trends
APA, Harvard, Vancouver, ISO, and other styles
10

Pareja Aparicio, Miguel, Raúl Terol Bolinches, and Nadia Alonso López. "La utilización del podcast como herramienta pedagógica. Caso de estudio de la asignatura Teoría y Ecología de los Medios Audiovisuales." In IN-RED 2019: V Congreso de Innovación Educativa y Docencia en Red. Editorial Universitat Politècnica de València, 2019. http://dx.doi.org/10.4995/inred2019.2019.10366.

Full text
Abstract:
La metodología de la clase inversa, o flipped classroom, cambia la forma de entender la docencia, aprovechando mucho mejor los tiempos que compartimos en el aula y distribuyendo de manera óptima el trabajo fuera de ella. Por otra parte, en los últimos meses hemos observado un crecimiento notable en consumo de audio en Internet. El podcast, como ejemplo de ello, se concibe como audio a la carta con la principal intención de acabar con la fugacidad del mensaje sonoro, haciendo posible que el oyente pueda acudir al recurso auditivo las veces que desee. En el presente trabajo nos hemos planteado l
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Menace Internet"

1

Espeleta Maradei, Mónica. Apuntes sobre conceptos básicos de psicoanálisis. Ediciones Universidad Cooperativa de Colombia, 2023. http://dx.doi.org/10.16925/gcnc.65.

Full text
Abstract:
El psicoanálisis es conocido como la primera fuerza de la psicología, ya que sus planteamientos teóricos dan cuenta de la comprensión profunda de la mente humana. Sigmund Freud es el fundador del movimiento psicoanalítico entre los años 1885 y 1939. El psicoanálisis inició como una técnica derivada de la hipnosis para tratar pacientes con histeria. A partir de la recopilación de estos casos clínicos surge la “técnica psicoanalítica”, y posteriormente se deriva una teoría de personalidad, cuyo tema principal se expone en este texto. Hablaremos de cuatro temas principales; características del ps
APA, Harvard, Vancouver, ISO, and other styles
2

Mbaye, Safiétou, Rémi Kouabenan, and Philippe Sarnin. L'explication naïve et la perception des risques comme des voies pour améliorer les pratiques de REX: des études dans l'industrie chimique et l'industrie nucléaire. Fondation pour une culture de sécurité industrielle, 2009. http://dx.doi.org/10.57071/311rex.

Full text
Abstract:
L’analyse de l’accident soulève de nombreux enjeux dont le poids préfigure également des biais possibles dans l’explication causale et laisse apparaître que l’explication de l’accident peut difficilement être neutre. En l’occurrence, les difficultés rencontrées dans la conduite du REX relèvent en grande partie de conflits qui surviennent lors des analyses d’accidents. Ce document présente quatre études de terrain qui visaient à comprendre l’origine des conflits entre les acteurs du REX lors des analyses d’accidents et à mieux appréhender le rôle de la perception des risques et du climat de séc
APA, Harvard, Vancouver, ISO, and other styles
3

Saudi-China Collaboration on Renewable Energy Supply Chains. King Abdullah Petroleum Studies and Research Center, 2023. http://dx.doi.org/10.30573/ks--2022-wb13.

Full text
Abstract:
Many countries in the Middle East and North Africa (MENA) region have reinforced their interest in enhancing domestic value creation from renewable energy industries while striving to achieve their green energy transition targets. The Kingdom of Saudi Arabia has identified key segments in the wind and solar supply chain for localization in the short term, medium term, and long term as part of its ongoing efforts to diversify its energy portfolio and protect its economy from external shocks.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!