Results for 'Security protocols'

1000+ found
Order:
  1. LTL model checking for security protocols.Alessandro Armando, Roberto Carbone & Luca Compagna - 2009 - Journal of Applied Non-Classical Logics 19 (4):403-429.
    Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that greatly complicate or even prevent their applicability in some important cases. For instance, most techniques assume that communication between honest principals is controlled by a Dolev-Yao intruder, i.e. a malicious agent capable to overhear, divert, and fake messages. Yet we might be interested in establishing the security of a protocol that relies on a less unsecure (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  2.  91
    To know or not to know: epistemic approaches to security protocol verification.Francien Dechesne & Yanjing Wang - 2010 - Synthese 177 (S1):51-76.
    Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the agents. Since BAN-logic, there have been several initiatives and attempts to incorpórate epistemics into the analysis of security protocols. In this paper, we give an overview of work in the field and present it in a unified perspective, with comparisons on technical subtleties that have been employed in different approaches. Also, we study to which degree the use of epistemics is essential for (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  3.  58
    Update Semantics of Security Protocols.Arjen Hommersom, John-Jules Meyer & Erik De Vink - 2004 - Synthese 142 (2):229 - 267.
    We present a model-theoretic approach for reasoning about security protocols, applying recent insights from dynamic epistemic logics. This enables us to describe exactly the subsequent epistemic states of the agents participating in the protocol, using Kripke models and transitions between these based on updates of the agent's beliefs associated with steps in the protocol. As a case study we will consider the SRA Three Pass protocol and discuss the Wide-Mouthed Frog protocol.
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  4.  22
    From dignity to security protocols: a scientometric analysis of digital ethics.René Mahieu, Nees Jan van Eck, David van Putten & Jeroen van den Hoven - 2018 - Ethics and Information Technology 20 (3):175-187.
    Our lives are increasingly intertwined with the digital realm, and with new technology, new ethical problems emerge. The academic field that addresses these problems—which we tentatively call ‘digital ethics’—can be an important intellectual resource for policy making and regulation. This is why it is important to understand how the new ethical challenges of a digital society are being met by academic research. We have undertaken a scientometric analysis to arrive at a better understanding of the nature, scope and dynamics of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  5.  34
    A New Secure Protocol for Authenticated Key Agreement.H. Elkamchouchi, M. R. M. Rizk & Fatma Ahmed - forthcoming - Complexity.
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  15
    Sat-based verification of security protocols via translation to networks of automata.Mirosław Kurkowski, Wojciech Penczek & Andrzej Zbrzezny - 2007 - In A. Lomuscio & S. Edelkamp (eds.), Model Checking and Artificial Intelligence. Springer. pp. 146--165.
  7.  13
    Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis.Carlos Caleiro, Luca Viganò & David Basin - 2005 - Logic Journal of the IGPL 13 (6):637-663.
    In previous work, we introduced a version of distributed temporal logic that is well-suited both for verifying security protocols and as a metalogic for reasoning about, and relating, different security protocol models. In this paper, we formally investigate the relationship between our approach and strand spaces, which is one of the most successful and widespread formalisms for analyzing security protocols. We define translations between models in our logic and strand-space models of security protocols, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  8. Workshop on Approaches or Methods of Security Engineering (AMSE 2006, Sess. A)-A Robust Routing Protocol by a Substitute Local Path in Ad Hoc Networks.Mary Wu, SangJoon Jung, Seunghwan Lee & Chonggun Kim - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 93-103.
    No categories
     
    Export citation  
     
    Bookmark  
  9. Minisymposia-XV Approaches or Methods of Security Engineering (AMSE)-Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications.Jin Kwak, Soohyun Oh & Dongho Won - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3732--1009.
     
    Export citation  
     
    Bookmark  
  10.  44
    Dutch Protocols for Deliberately Ending the Life of Newborns: A Defence.Matthew Tedesco - 2017 - Journal of Bioethical Inquiry 14 (2):251-259.
    The Groningen Protocol, introduced in the Netherlands in 2005 and accompanied by revised guidelines published in a report commissioned by the Royal Dutch Medical Association in 2014, specifies conditions under which the lives of severely ill newborns may be deliberately ended. Its publication came four years after the Netherlands became the first nation to legalize the voluntary active euthanasia of adults, and the Netherlands remains the only country to offer a pathway to protecting physicians who might engage in deliberately ending (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  14
    Pollinators and Global Food Security: the Need for Holistic Global Stewardship.Jeroen P. van der Sluijs & Nora S. Vaage - 2016 - Food Ethics 1 (1):75-91.
    Over the past decades, both wild and domesticated insect pollinators are in dramatic decline, which puts at stake the existence of species, ecosystem resilience and global food security. Globally, 87 of major food crops depend on animal pollination. Together these account for 35 % of the world food production volume. Pollinator mediated crops are indispensable for essential micronutrients in the human diet. Many ornamental plants as well as crops for fibre, fodder, biofuels, timber and phytopharmaceuticals also depend on insect (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  12.  4
    Technology, ethics and the protocols of modern war.Artur Gruszczak & Pawel Frankowski (eds.) - 2018 - New York, NY: Routledge/Taylor & Francis Group.
    Contemporary security has expanded its meaning, content and structure in response to globalization and the emergence of greatly improved world-wide communication. This book addresses how and why the nature of security has changed and what this means for the security actors involved and the wider society. The expert contributors reflect upon new communication methods, post-modern concepts of warfare, technological determinants and cultural preferences to provide new theoretical and analytical insights into a changing security environment and the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  26
    Network security situation awareness forecasting based on statistical approach and neural networks.Pavol Sokol, Richard Staňa, Andrej Gajdoš & Patrik Pekarčík - 2023 - Logic Journal of the IGPL 31 (2):352-374.
    The usage of new and progressive technologies brings with it new types of security threats and security incidents. Their number is constantly growing.The current trend is to move from reactive to proactive activities. For this reason, the organization should be aware of the current security situation, including the forecasting of the future state. The main goal of organizations, especially their security operation centres, is to handle events, identify potential security incidents, and effectively forecast the network (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  21
    Secure UAV-Based System to Detect Small Boats Using Neural Networks.Moisés Lodeiro-Santiago, Pino Caballero-Gil, Ricardo Aguasca-Colomo & Cándido Caballero-Gil - 2019 - Complexity 2019:1-11.
    This work presents a system to detect small boats to help tackle the problem of this type of perilous immigration. The proposal makes extensive use of emerging technologies like Unmanned Aerial Vehicles combined with a top-performing algorithm from the field of artificial intelligence known as Deep Learning through Convolutional Neural Networks. The use of this algorithm improves current detection systems based on image processing through the application of filters thanks to the fact that the network learns to distinguish the aforementioned (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  9
    Privacy and Security within Biobanking: The Role of Information Technology.Raymond Heatherly - 2016 - Journal of Law, Medicine and Ethics 44 (1):156-160.
    Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the investigator to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Cyber security norms in the Euro-Atlantic region: NATO and the EU as norm entrepreneurs and norm diffusers.Joe Burton - 2018 - In Artur Gruszczak & Pawel Frankowski (eds.), Technology, ethics and the protocols of modern war. New York, NY: Routledge/Taylor & Francis Group.
     
    Export citation  
     
    Bookmark  
  17.  76
    A Simple Model of Secure Public Communication.Hannu Vartiainen - 2009 - Theory and Decision 67 (1):101-122.
    Public communication is secure if a hostile third-party cannot decode the messages exchanged by the communicating parties. In Nash equilibrium, communication by computationally unbounded players cannot be secure. We assume complexity averse players, and show that a simple, secure, and costless communication protocol becomes available as the marginal complexity cost tends to zero.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Complicating security: The multiple narratives emerging from the Ukraine crisis.Crister S. Garrett - 2018 - In Artur Gruszczak & Pawel Frankowski (eds.), Technology, ethics and the protocols of modern war. New York, NY: Routledge/Taylor & Francis Group.
     
    Export citation  
     
    Bookmark  
  19.  12
    Technology and Security Analysis of Cryptocurrency Based on Blockchain.Chao Yu, Wenke Yang, Feiyu Xie & Jianmin He - 2022 - Complexity 2022:1-15.
    Blockchain technology applied to cryptocurrencies is the dominant factor in maintaining the security of cryptocurrencies. This article reviews the technological implementation of cryptocurrency and the security and stability of cryptocurrency and analyzes the security support from blockchain technology and its platforms based on empirical case studies. Our results show that the security support from blockchain technology platforms is significantly insufficient and immature. In addition, we further Zyskind and Nathan and Choi and find that the top ten (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20. Private security and military companies and foreign fighters: possible interactions and potential practical implications.Iveta Hlouchova - 2018 - In Artur Gruszczak & Pawel Frankowski (eds.), Technology, ethics and the protocols of modern war. New York, NY: Routledge/Taylor & Francis Group.
     
    Export citation  
     
    Bookmark  
  21.  48
    People Trafficking: Conceptual issues with the United Nations Trafficking Protocol 2000. [REVIEW]Marta Iñiguez de Heredia - 2008 - Human Rights Review 9 (3):299-316.
    This paper examines the UN 2000 Trafficking Protocol in the context of international responses to the issue of people trafficking. Attention is drawn to the conceptual flaws in this new instrument regarding the failure to address domestic trafficking, not incorporating the purchasing and selling of people as defining characteristics of trafficking, and the lack of clarity around issues of prostitution. Framing the discussion within feminist theory, the essay concludes that women’s campaigning will continue to be crucial to putting issues such (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  22.  10
    Practical Approach in Verification of Security Systems Using Satisfiability Modulo Theories.Agnieszka M. Zbrzezny, Sabina Szymoniak & Miroslaw Kurkowski - 2022 - Logic Journal of the IGPL 30 (2):289-300.
    The paper presents a novel method for the verification of security protocols’ time properties. The new method uses a translation to satisfiability modulo theories problem. In our approach, we model protocol users’ behaviours using networks of synchronized timed automata. Suitably specified correctness properties are defined as a reachability property of some chosen states in an automata network. Then, the network of timed automata and the property are translated to an SMT problem and checked using an SMT-solver and a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  28
    A critique of the rhetoric, ambivalence, and promise in the protocol to the African charter on human and people’s rights on the rights of women in Africa.’Dejo Olowu - 2006 - Human Rights Review 8 (1):78-101.
    The desire to formulate a viable treaty framework for women’s rights that will meet the challenges of the sociocultural peculiarities in Africa led to the emergence of the original draft Protocol to the African Charter on Human and People's Rights on the Rights of Women in the twilight years of the Organization of African Unity (OAU). Without doubt, the recent adoption of the African Women’s Protocol by the Assembly of African Heads of State and Government in July 2003 is a (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  24.  29
    Beta Hebbian Learning for intrusion detection in networks with MQTT Protocols for IoT devices.Álvaro Michelena, María Teresa García Ordás, José Aveleira-Mata, David Yeregui Marcos del Blanco, Míriam Timiraos Díaz, Francisco Zayas-Gato, Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Héctor Alaiz-Moretón & José Luis Calvo-Rolle - 2024 - Logic Journal of the IGPL 32 (2):352-365.
    This paper aims to enhance security in IoT device networks through a visual tool that utilizes three projection techniques, including Beta Hebbian Learning (BHL), t-distributed Stochastic Neighbor Embedding (t-SNE) and ISOMAP, in order to facilitate the identification of network attacks by human experts. This work research begins with the creation of a testing environment with IoT devices and web clients, simulating attacks over Message Queuing Telemetry Transport (MQTT) for recording all relevant traffic information. The unsupervised algorithms chosen provide a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25. Dilemmas of security and social justice: The Maoist insurgency in India.Veena Thadani - 2018 - In Artur Gruszczak & Pawel Frankowski (eds.), Technology, ethics and the protocols of modern war. New York, NY: Routledge/Taylor & Francis Group.
     
    Export citation  
     
    Bookmark  
  26.  42
    A Phenomenological Analysis of the Experience of Security and Contentment for Latency Aged Children in Shared-time Parenting Arrangements.Christina Sadowski & Jennifer E. McIntosh - 2015 - Journal of Phenomenological Psychology 46 (1):69-104.
    This study explored the lived experience of security and contentment, and their absence, for latency-aged children living in shared-time parenting arrangements following their parents’ separation. A descriptive phenomenological methodology was utilized. Sixteen children living in shared-time were interviewed about their experiences of two phenomena: “feeling secure and content living in shared-time” and “not feeling secure and content living in shared-time.” The eight richest protocols were selected for analysis. The two resultant general structures and their core constituents are presented, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  27. Protocolo de prevención de caídas.Fall Prevention Protocol - forthcoming - Horizonte.
     
    Export citation  
     
    Bookmark  
  28. Technology, development, global commons and international security: A global commons and interdisciplinary approach to global security.M. Matheswaran - 2018 - In Artur Gruszczak & Pawel Frankowski (eds.), Technology, ethics and the protocols of modern war. New York, NY: Routledge/Taylor & Francis Group.
     
    Export citation  
     
    Bookmark  
  29. Cyberspace's ontological implications for national security.Dighton Fiddner - 2018 - In Artur Gruszczak & Pawel Frankowski (eds.), Technology, ethics and the protocols of modern war. New York, NY: Routledge/Taylor & Francis Group.
     
    Export citation  
     
    Bookmark  
  30. European military and dual-use technology transfers to Russia: The impact on European and Transatlantic security.Simona R. Soare - 2018 - In Artur Gruszczak & Pawel Frankowski (eds.), Technology, ethics and the protocols of modern war. New York, NY: Routledge/Taylor & Francis Group.
     
    Export citation  
     
    Bookmark  
  31. Strategic communication and contemporary European security.Michael O. Holenweger & Alexandre C. Hochuli - 2018 - In Artur Gruszczak & Pawel Frankowski (eds.), Technology, ethics and the protocols of modern war. New York, NY: Routledge/Taylor & Francis Group.
     
    Export citation  
     
    Bookmark  
  32.  17
    Network Working Group B. Callaghan Request for Comments: 1813 B. Pawlowski Category: Informational P. Staubach Sun Microsystems, Inc. June 1995. [REVIEW]Protocol Specification - 1995 - Philosophy 8:1-7.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  33. Illan Rua Wall.Turbulent Legality : Sovereignty, Security & The Police - 2018 - In Andreas Philippopoulos-Mihalopoulos (ed.), Routledge Handbook of Law and Theory. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark  
  34. The Very Idea of Theory in Business History.Alan Roberts & Isma Centre for Education and Research in Securities Markets - 1998 - University of Reading, Department of Economics, and Isma Centre for Education and Research in Securities Markets.
     
    Export citation  
     
    Bookmark  
  35.  71
    The case of the hidden hand.Hans P. van Ditmarsch - 2005 - Journal of Applied Non-Classical Logics 15 (4):437-452.
    In unconditionally secure protocols, a sender and receiver are able to communicate their secrets to each other without the eavesdropper(s) being able to learn the secret, even when the eavesdropper intercepts the entire communication. We investigate such protocols for the special case of deals of cards over players, where two players aim to communicate to each other their hand of cards without the remaining player(s) learning a single card from either hand. In this contribution we show that a (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  36.  27
    Hybrid Real-Time Protection System for Online Social Networks.Muneer Bani Yassein, Shadi Aljawarneh & Yarub Wahsheh - 2020 - Foundations of Science 25 (4):1095-1124.
    The impact of Online Social Networks on human lives is foreseen to be very large with unprecedented amount of data and users. OSN users share their ideas, photos, daily life events, feelings and news. Since OSNs’ security and privacy challenges are more potential than ever before, it is necessary to enhance the protection and filtering approaches of OSNs contents. This paper explores OSNs’ threats and challenges, and categorize them into: account-based, URL-based and content-based threats. In addition, we analyze the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  28
    Crossing the Olentangy River: The Figure of the Earth and the Military-Industrial-Academic-Complex, 1947–1972.John Cloud - 2000 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 31 (3):371-404.
    This paper explores the history of a unique assemblage of researchers in the geodetic and allied sciences organised at Ohio State University (OSU) in 1947 at the beginning of the Cold War. From about 1950 to 1970, the OSU geodetic sciences group was the most significant group of geodetic researchers in the world. Funded almost entirely by military and intelligence agencies, they pioneered the technologies, organised the research initiatives, ordered the data sets, and trained the generation of geodesists who eventually (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  38.  31
    Living in an Impossible World: Real-izing the Consequences of Intransitive Trust. [REVIEW]Bruce Christianson - 2013 - Philosophy and Technology 26 (4):411-429.
    Many accounts of online trust are based upon mechanisms for building reputation. Trust is portrayed as desirable, and handing off trust is easier if trust is modelled to be transitive. But in the analysis of cyber-security protocols, trust is usually used as a substitute for certain knowledge: it follows that if there is no residual risk, then there is no need for trust. On this grimmer understanding, the less that users are required to trust, the better. Involuntary transitivity (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  39.  11
    Crossing Hands in the Russian Cards Problem.Tor Hagland & Thomas Ågotnes - 2021 - In Sujata Ghosh & Thomas Icard (eds.), Logic, Rationality, and Interaction: 8th International Workshop, Lori 2021, Xi’an, China, October 16–18, 2021, Proceedings. Springer Verlag. pp. 102-110.
    The Russian Cards Problem has been extensively studied as an example of a problem of an unconditionally secure protocol where the sender and receiver are able to transmit secret information safely over a public non-secure channel without the secret being learned by a third party with access to the channel. Epistemic logic in general and public announcement logic in particular have been very useful in this study, as it involves careful analysis of subtle properties of nested knowledge. A long standing (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  25
    Society semantics and the logic way to collective intelligence.Walter Carnielli & Mamede Lima-Marques - 2017 - Journal of Applied Non-Classical Logics 27 (3-4):255-268.
    The so-called phenomenon of collective intelligence is now a burgeoning movement, with several guises and examples in many areas. We briefly survey some relevant aspects of collective intelligence in several formats, such as social software, crowdfunding and convergence, and show that a formal version of this paradigm can also be posed to logic systems, by employing the notion of logic societies. The paradigm of logical societies has lead to a new notion of distributed semantics, the society semantics, with theoretical advances (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  17
    Tableaux for logics of time and knowledge with interactions relating to synchrony.Clare Dixon, Cláudia Nalon & Michael Fisher - 2004 - Journal of Applied Non-Classical Logics 14 (4):397-445.
    The paper describes tableaux based proof methods for temporal logics of knowledge allowing non-trivial interaction axioms between the modal and temporal components, namely those of synchrony and no learning and synchrony and perfect recall. The interaction axioms allow the description of how knowledge evolves over time and makes reasoning in such logics theoretically more complex. Such logics can be used to specify systems that involve the knowledge of processes or agents and which change over time, for example agent based systems, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  42.  19
    Quantum Bit Commitment and the Reality of the Quantum State.R. Srikanth - 2018 - Foundations of Physics 48 (1):92-109.
    Quantum bit commitment is insecure in the standard non-relativistic quantum cryptographic framework, essentially because Alice can exploit quantum steering to defer making her commitment. Two assumptions in this framework are that: Alice knows the ensembles of evidence E corresponding to either commitment; and system E is quantum rather than classical. Here, we show how relaxing assumption or can render her malicious steering operation indeterminable or inexistent, respectively. Finally, we present a secure protocol that relaxes both assumptions in a quantum teleportation (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  43.  48
    Knowledge condition games.Sieuwert van Otterloo, Wiebe Van Der Hoek & Michael Wooldridge - 2006 - Journal of Logic, Language and Information 15 (4):425-452.
    Understanding the flow of knowledge in multi-agent protocols is essential when proving the correctness or security of such protocols. Current logical approaches, often based on model checking, are well suited for modeling knowledge in systems where agents do not act strategically. Things become more complicated in strategic settings. In this paper we show that such situations can be understood as a special type of game – a knowledge condition game – in which a coalition “wins” if it (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44. The mindsponge and BMF analytics for innovative thinking in social sciences and humanities.Quan-Hoang Vuong, Minh-Hoang Nguyen & Viet-Phuong La (eds.) - 2022 - Berlin, Germany: De Gruyter.
    Academia is a competitive environment. Early Career Researchers (ECRs) are limited in experience and resources and especially need achievements to secure and expand their careers. To help with these issues, this book offers a new approach for conducting research using the combination of mindsponge innovative thinking and Bayesian analytics. This is not just another analytics book. 1. A new perspective on psychological processes: Mindsponge is a novel approach for examining the human mind’s information processing mechanism. This conceptual framework is used (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   78 citations  
  45. Brain to computer communication: Ethical perspectives on interaction models. [REVIEW]Guglielmo Tamburrini - 2009 - Neuroethics 2 (3):137-149.
    Brain Computer Interfaces (BCIs) enable one to control peripheral ICT and robotic devices by processing brain activity on-line. The potential usefulness of BCI systems, initially demonstrated in rehabilitation medicine, is now being explored in education, entertainment, intensive workflow monitoring, security, and training. Ethical issues arising in connection with these investigations are triaged taking into account technological imminence and pervasiveness of BCI technologies. By focussing on imminent technological developments, ethical reflection is informatively grounded into realistic protocols of brain-to-computer communication. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  46.  6
    Dokumentarisches Erzählen in der deutschsprachigen Prosa vor und nach der Wende des Jahres 1989.Elżbieta Tomasi-Kapral - 2022 - Acta Universitatis Lodziensis. Folia Germanica 16:103-120.
    This article focuses on documentary narration in literary prose, which is analyzed with regard to its function and poetics using the example of selected texts of GDR protocol literature and German documentary literature of the post-reunification years. The question of what constitutes the peculiarity of documentary literature and what caused its popularity in the pre- and post-reunification period will be explored. Furthermore, selected examples will be used to illustrate how the levels of the factual and the fictional intermingle and complement (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  41
    Sobre el abuso de sistemas de presentación en línea, falsos comentarios de pares Y cuentas creadas Por el editor.Jaime Teixeira da Silva - 2016 - Persona y Bioética 20 (2).
    Many journals and publishers employ online submission systems to process manuscripts. In some cases, one “template” format exists, but it is then molded slightly to suit the specific needs of each journal, a decision made by the editor-in-chief or editors. In the past few years, there has been an increase in the number of cases in which OSSs have been abused, mostly by the authorship, either through the creation of fake identities or the use of false e-mail accounts. Although the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  48.  10
    Logiḳah be-peʻulah =.Doron Avital - 2012 - Or Yehudah: Zemorah-Bitan, motsiʼim le-or.
    Logic in Action/Doron Avital Nothing is more difficult, and therefore more precious, than to be able to decide (Napoleon Bonaparte) Introduction -/- This book was born on the battlefield and in nights of secretive special operations all around the Middle East, as well as in the corridors and lecture halls of Western Academia best schools. As a young boy, I was always mesmerized by stories of great men and women of action at fateful cross-roads of decision-making. Then, like as today, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  35
    Sobre el abuso de sistemas de presentación en línea, falsos comentarios de pares Y cuentas creadas Por el editor.da Silva Jaime A. Teixeira - 2016 - Persona y Bioética 20 (2).
    Many journals and publishers employ online submission systems to process manuscripts. In some cases, one “template” format exists, but it is then molded slightly to suit the specific needs of each journal, a decision made by the editor-in-chief or editors. In the past few years, there has been an increase in the number of cases in which OSSs have been abused, mostly by the authorship, either through the creation of fake identities or the use of false e-mail accounts. Although the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  67
    COVID-19 Pandemic on Fire: Evolved Propensities for Nocturnal Activities as a Liability Against Epidemiological Control.Marco Antonio Correa Varella, Severi Luoto, Rafael Bento da Silva Soares & Jaroslava Varella Valentova - 2021 - Frontiers in Psychology 12.
    Humans have been using fire for hundreds of millennia, creating an ancestral expansion toward the nocturnal niche. The new adaptive challenges faced at night were recurrent enough to amplify existing psychological variation in our species. Night-time is dangerous and mysterious, so it selects for individuals with higher tendencies for paranoia, risk-taking, and sociability. During night-time, individuals are generally tired and show decreased self-control and increased impulsive behaviors. The lower visibility during night-time favors the partial concealment of identity and opens more (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 1000