Mostrando 161 - 180 Resultados de 197 Para Buscar '"Pornography"', tiempo de consulta: 0.08s Limitar resultados
  1. 161
    Publicado 2012
    Tabla de Contenidos: “….] -- Changing discourses of blame in nursing and healthcare / Hannah Cooke -- Hospital policies regarding violence in the workplace : a discourse analysis / Penny Powers -- Exploring violence in a forensic hospital : a theoretical exploration / Amélie Perron and Trudy Rudge -- Nurses' failure to report elder abuse in long-term care : an exploratory study / Gloria Hamel-Lauzon and Sylvie Lauzon -- Foucault and the nexus between violence and power : the context of intra/inter professional aggression / Isabelle St-Pierre -- Examining nurse-to-nurse horizontal violence and nurse-to-student vertical violence through the lens of phenomenology / Sandra P Thomas -- The rise of violence in HIV/AIDS prevention campaigns : a critical discourse analysis / Marilou Gagnon and Jean Daniel Jacob -- Bullying in the workplace : a qualitative study of newly licensed registered nurses / Shellie Simons and Barbara Mawn -- Sexual health nursing assessments : examining the symbolic violence of intimate exposures / Patrick O'Byrne and Corey Woodyatt -- Bullying on the back-channels : everyday interpersonal communicative relations in telephone talk, as a space for covert forms of professional manipulation / Jackie Cook and Colette Snowden -- Assessment of risk and special observations in mental health practice : a comparison of forensic and non-forensic settings / Elizabeth Mason-Whitehead and Tom Mason -- Policing pornography in high-secure care : the discursive construction of gendered inequality / David Mercer -- "Warning, this job contains strong language and adult themes" : do nurses require thick skins and broad shoulders to deal with encounters involving swearing? …”
    Libro
  2. 162
    Publicado 2010
    Tabla de Contenidos: “…CHAPTER THIRTEEN: The uncertainty principle in the psychoanalytic process CHAPTER FOURTEEN: Implicit and explicit pathways to psychoanalytic change; CHAPTER FIFTEEN: Life as performance art: Right and left brain function, implicit knowing, and felt coherence; CHAPTER SIXTEEN: Bridging neurobiology, cognitive science and psychoanalysis: Recent contributions to theories of therapeutic action; PART VI; CHAPTER SEVENTEEN: Lights, camera, attachment: Female embodiment as seen through the lens of pornography; CHAPTER EIGHTEEN: Purging as embodiment; CHAPTER NINETEEN: The incredible shrinking shrink…”
    Libro electrónico
  3. 163
    Publicado 2020
    Tabla de Contenidos: “…Une analyse des rapports du Bureau du coroner du Quebec entre 2000 et 2014 / Jean-François Cauchie, Patrice Corriveau et Linda Michel -- L'apport de la criminologie critique à l'elaboration d'une clinique en criminologie / Christophe Adam et Bastien Quirion -- Justice sociale ou efficience : exploration de la pratique reflexive chez les diplômees en criminologie / Genevieve Nault, Joanne Cardinal et Claudia Fradette -- Savoir-être, savoir-faire et contraintes lies aux demarches choregraphiques en prison en France : notes de terrain / Claire Jenny et Sylvie Frigon -- Pornographie et contrôle : du tort moral et social au tort à la sante publique / Isabelle Perreault, Michele Diotte et Simon Corneau -- Jeux de rôles et violences "fictives" : etude exploratoire de l'effet du jeu sur la reproduction de la violence sexuelle dans une communaute de jeu au Quebec / Alexis Hieu Truong et Isabelle Côte -- L'intervention communautaire en criminologie vue par le biais d'une approche gramscienne : etude d'un cas quebecois / Eduardo González Castillo et Martin Goyette -- Postface. …”
    Libro electrónico
  4. 164
    Publicado 2006
    “…It deals with important and relevant topics such as the treatment of sex offenders; the compulsive use of internet pornography; the psychosexual development of adolescents growing up with HIV; the psychodynamics of unsafe sex; refugees and sexuality; services for people with gender dysphoria; psychological treatment for survivors of rape and sexual assault; and loss of sexual interest."…”
    Libro electrónico
  5. 165
    “…While this moderation is often encouraged by governments - on the pretext that terrorism, bullying, pornography, “hate speech” and “fake news” will slowly disappear from the internet - it enables tech companies to censure our society. …”
    Electrónico
  6. 166
    por Draucker, Shannon
    Publicado 2024
    Tabla de Contenidos: “…Chapter Five: Orgasm in the Orchestra Box: Teleny's Musical Pornography -- "Natural Tastes": Teleny's Defense of Same-Sex Desire -- Aural Sex: Teleny's Queer Erotics -- Part Four: Intimacies -- Chapter Six: Fiddle Feelings: Human-Instrument Intimacies in Dickens, Eliot, Trollope, and Hardy -- "Corporeal Co-Dependence": Human-Instrument Relations in Victorian Acoustical Science -- Sympathetic Kinship: George Eliot's The Mill on the Floss -- Cello Friendship: Anthony Trollope's The Warden -- Passioned Pulsings: Thomas Hardy's "Haunting Fingers" -- Self-Playing Instruments…”
    Libro electrónico
  7. 167
    Publicado 2014
    Tabla de Contenidos: “…Intro -- Half Title -- Title Page -- Contents -- Introduction -- 100 Ideas that Changed the Web -- No.1 The Mundaneum -- No.2 The Space Race -- No.3 Hypertext -- No.4 The Modem -- No.5 Graphical User Interface -- No.6 The Mouse -- No.7 Markup Language -- No.8 XANADU -- No.9 The Personal Computer -- No.10 The Internet -- No.11 Internet Service Provider -- No.12 Bulletin Board Systems -- No.13 Hackers -- No.14 Cyberpunk -- No.15 Internet Protocol Suite -- No.16 Desktop Publishing -- No.17 Hypercard -- No.18 Graphics Interchange Format -- No.19 The Emoticon -- No.20 The Domain Name System -- No.21 The Project -- No.22 Web Browser -- No.23 The Cookie -- No.24 The JPEG -- No.25 Pornography -- No.26 Search -- No.27 WIFI -- No.28 Open Source -- No.29 Netiquette -- No.30 Apache Web Server -- No.31 Content Management Systems -- No.32 Web Analytics -- No.33 Massively Multi-Player Online Gaming -- No.34 Webcam -- No.35 Web Standards -- No.36 Geocities -- No.37 The Banner Ad -- No.38 Web Auction -- No.39 User-Centred Design -- No.40 Net Art -- No.41 Digital Fragility -- No.42 Information Architecture -- No.43 Web Chat -- No.44 Cascading Style Sheets -- No.45 Metadata -- No.46 The Webby Awards -- No.47 Pay Per Click -- No.48 Web Mapping -- No.49 Blogging -- No.50 Scaleable Vector Graphics -- No.51 Webmail -- No.52 Viral Content -- No.53 Internet Meme -- No.54 The Digital Wallet -- No.55 Ecommerce -- No.56 Collaborative Filtering -- No.57 The Drudge Report -- No.58 RSS Feeds -- No.59 Web Streaming -- No.60 The Independence Of Cyberspace -- No.61 The Blair Witch Project -- No.62 Peer-To-Peer -- No.63 Broadband -- No.64 Creative Commons -- No.65 The Dot-Com Bubble -- No.66 Web Tv -- No.67 The WIKI -- No.68 Infographics -- No.69 Augmented Reality -- No.70 Captcha -- No.71 Photo Sharing -- No.72 Podcast -- No.73 The Long Tail -- No.74 AJAX…”
    Libro electrónico
  8. 168
    por Shavers, Brett
    Publicado 2013
    Tabla de Contenidos: “…Other devices used by suspectSoftware used by suspect; Internet use by suspect; Online chat, email, forums, boards, online social networking; Peer-to-Peer Networking; File storage; Crime specific-child pornography; Crime specific-identity theft; Other alleged crimes; Questions for Victims; Computer crime victim questions-identity theft; Computer crime victim questions-harassment via email/text/online postings; Questions for Network Administrators; Customer accounts-Internet Service Provider, online data hosting, other online services; Summary; Bibliography; 3 Physical Investigations…”
    Libro electrónico
  9. 169
    por Aydemir, Murat
    Publicado 2007
    Tabla de Contenidos: “…The Specter Haunting Male Morphology: Othering the Body: A Comedy: The Deictic Veil and the Phallus/Penis: Every Temptation: Smile and Breast: Double-Crossing Gender -- Part III. Pornography -- 5. Significant Discharge: The Cum Shot and Narrativity -- Introducing the Cum Shot: Justine: "I can't believe you just came": The Climax of Involuntary Spasm: "I was not finished": Return and Repetition -- 6. …”
    Libro electrónico
  10. 170
    por Davis, Harold, 1953-
    Publicado 2006
    Tabla de Contenidos: “…Understanding Contextual RelevanceServing Ads; Dollars and Cents; CPC Program Vendors; Placing CPC Ads on Your Site; Signing Up; Selecting Ad Formats; Adding Code to Your Pages; Action Items; Profiting from Adult Sites; Creating Adult Sites; Legal Issues; Adult web traffic and obscenity; Children in pornography; Celebrities; Protecting the Children; Adult Web Hosting; Converting Traffic; Instant gratification; Product credibility; Targeting content to traffic; The Taxonomy of Desire; Making Money with Advertising; Types of Programs; Payment Plans; Webmaster Programs; Finding Sponsors…”
    Libro electrónico
  11. 171
    por Criddle, Linda
    Publicado 2006
    Tabla de Contenidos: “…Taking a Closer Look at the World of Online Pornography…”
    Libro electrónico
  12. 172
    por Fischer, Gayle V.
    Publicado 1992
    Tabla de Contenidos: “….) -- Australia/New Zealand -- Biography -- Individual and Collective Biographies -- Journals and Diaries -- Letters -- Oral History -- Birth Control -- l Abortion -- Fertility -- Infanticide -- Material Culture -- Reproductive Rights and Options -- Canada -- Economics (see also Work) -- Africa -- Asia -- Australia -- Europe -- Latin America -- Middle East/Near East -- North America -- Soviet Union -- Education Methods -- Students -- Teachers -- Ethnicity -- Asian -- European -- General Immigrants -- Jewish -- Latin American -- Europe -- Central Europ -- e Eastern Europe -- France -- Great Britain -- Northern Europe -- Southern Europe -- Family -- Childbirth -- Childcare -- Demographics -- Ethnicity -- Infant Mortality -- International -- Kinship -- Motherhood -- Feminism -- Biography -- General -- International Organizations -- Politics -- Religion -- Theory -- Friendship -- Health -- Health Care/Preventive Health Care -- Illness -- Maternity/Childbirth -- Medical Issues -- Psychology -- Latin America -- Law/Crime -- Courts, Trials, and Prisons -- Divorce, Family, and Marriage -- Female Criminality -- Lawyers -- Reproductive Rights and Illegitimacy -- Work and Protective Legislation -- Lifestages and Lifestyles (except married) -- Life Courses -- Old Age -- Never-Married Women -- Widowhood -- Youth -- Marriage/Divorce -- Courtship -- Demographics -- Divorce -- Ethnicity -- International -- Polygamy -- Material and Popular Culture -- Architecture/City Planning/Neighborhoods -- Books/Literary Images/Literature -- Crafts/Quilts/Embroidery Fashion/Textiles/Beauty -- Culture -- Food -- Photographs/Paintings/Visual Images/Movies Popular Culture/Mass Media/Advertising -- Science and Technology -- Middle East/Near East -- Military/War -- Home Front -- Jobs -- Peace -- Activism -- War Service -- Politics -- First Ladies -- Government Policy -- Political Participation -- International Relations -- Monarchies -- Office Holders Parties -- Women's Rights -- Pornography -- Professions -- Professional Career Choices -- White Collar Work -- Prostitution -- Religion -- Catholocism Missions and Missionaries -- Protestantism -- Religious Issues and Witchcraft -- Sexuality Ideology -- Lesbianism (see also Lifestages and Lifestyles) -- Practices -- Sexually Transmitted Diseases -- Virginity/Celibacy -- Social Reform/Community -- Organizing -- Family Planning and Aid To Children -- Health Reform -- Industrial Reform -- Moral Reform -- Social Movements/General Temperance -- Women's Clubs -- Women's Rights Movements -- Soviet Union -- Sports -- Suffrage -- Anti-Suffrage -- International Suffrage -- United States -- National -- East -- Midwest -- South -- West -- Construction/Deconstruction/Reconstruction -- Women's History/Feminist History -- Women's History Methodology and Other Disciplines -- Cross-Cultural Theory and Women's History -- Biography Women's History and Labor -- Historiography and Sources -- U.S. …”
    Libro electrónico
  13. 173
    por Banks, Michael A.
    Publicado 2008
    Tabla de Contenidos: “…Pimps and predators. Pornography unlimited -- And now, the Web .. -- Before the Web -- CompuServe buys The Source -- AOL buys CompuServe -- Mosaic-. …”
    Libro electrónico
  14. 174
    por Schwartz, Alan, 1970-
    Publicado 2004
    “… The annoyance factor for individual users whose email is crammed with pitches for pornography, absurd moneymaking schemes, and dubious health products is fierce. …”
    Libro electrónico
  15. 175
    Publicado 2023
    Tabla de Contenidos: “…INDAGACIONES A LA LUZ DEL PENSAMIENTO DE TOMÁS DE AQUINO(pp. 135-144)--CAPÍTULO 11 TENDIENDO PUENTES: EL CONCEPTO DE PERDÓN DE ENRIGHT Y LA TEORÍA MIMÉTICA DE RENÉ GIRARD(pp. 145-156)--CAPÍTULO 12 FACTORES SUBYACENTES A LA SEXUALIZACIÓN DE LAS RELACIONES PERSONALES(pp. 157-172)--CAPÍTULO 13 SEX DIFFERENCES IN THE VIRTUES AND VICES RELATED TO TEMPERANCE: CHASTITY, MODESTY, AND PORNOGRAPHY-USE(pp. 173-196)--PARTE IV. VIRTUDES, PSICOLOGÍA Y EDUCACIÓN--CAPÍTULO 14 LA IMPORTANCIA DEL EJEMPLO EN LA ADQUISICIÓN DE LA VIRTUD(pp. 199-210)--CAPÍTULO 15 VIRTUD, PSICOLOGÍA Y SALUD MENTAL: EDUCAR LA PERSONA PARA SANAR SUS HERIDAS(pp. 211-222)--CAPÍTULO 16 EDUCACIÓN CRISTIANA EN EL MODELO DE "DESARROLLO HUMANO INTEGRAL" (DHI)(pp. 223-236)--PARTE V. …”
    Libro electrónico
  16. 176
    por Wessels, Duane
    Publicado 2004
    Tabla de Contenidos: “…Blocking a Few Misbehaving Clients; 6.3.3. Denying Pornography; 6.3.4. Restricting Usage During Working Hours; 6.3.5. …”
    Libro electrónico
  17. 177
    Publicado 2021
    Tabla de Contenidos: “…Advertising -- Trust Marks -- Safe Harbors -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Information Management -- Data Governance -- Building a Data Inventory -- Data Classification -- Data Flow Mapping -- Data Lifecycle Management -- Workforce Training -- Cybersecurity Threats -- Threat Actors -- Incident Response -- Phases of Incident Response -- Preparation -- Detection and Analysis -- Containment, Eradication, and Recovery -- Post-incident Activity -- Building an Incident Response Plan -- Data Breach Notification -- Vendor Management -- Vendor Cybersecurity Incidents -- Summary -- Exam Essentials -- Chapter 5 Private Sector Data Collection -- FTC Privacy Protection -- General FTC Privacy Protection -- The Children's Online Privacy Protection Act (COPPA) -- Future of Federal Enforcement -- Medical Privacy -- The Health Insurance Portability and Accountability Act (HIPAA) -- The Health Information Technology for Economic and Clinical Health Act -- The 21st Century Cures Act -- Confidentiality of Substance Use Disorder Patient Records Rule -- Financial Privacy -- Privacy in Credit Reporting -- Gramm-Leach-Bliley Act (GLBA) -- Red Flags Rule -- Consumer Financial Protection Bureau -- Educational Privacy -- Family Educational Rights and Privacy Act (FERPA) -- Telecommunications and Marketing Privacy -- Telephone Consumer Protection Act (TCPA) and Telemarketing Sales Rule (TSR) -- The Junk Fax Prevention Act (JFPA) -- Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act -- Telecommunications Act and Customer Proprietary Network Information -- Cable Communications Policy Act -- Video Privacy Protection Act (VPPA) of 1988 -- Summary -- Exam Essentials -- Review Questions -- Chapter 6 Government and Court Access to Private Sector Information -- Law Enforcement and Privacy -- Access to Financial Data…”
    Libro electrónico
  18. 178
    por Guidetti, Oliver
    Publicado 2024
    Tabla de Contenidos: “…5.3.3 Automation of harassment tactics -- 5.3.4 Challenges for detection and response -- 5.4 Nefarious uses of generative AI -- 5.4.1 Social media -- 5.4.2 CEO fraud case -- 5.4.3 Virtual kidnapping scam -- 5.4.4 Revenge pornography -- 5.4.5 Manipulation in financial markets -- 5.4.6 AI-generated phishing emails -- 5.4.7 Synthetic identity fraud -- 5.4.8 Fabricated evidence in legal cases -- 5.4.9 Examination of tactics employed by harassers -- 5.5 Legal and ethical quandaries -- 5.5.1 Legal challenges in addressing generative AI-driven harassment -- 5.6 AI in creative industries and copyright challenges -- 5.6.1 Insufficiency of legislation in the face of AI advancements -- 5.6.2 Legal and regulatory frameworks for AI -- 5.6.3 Balancing free expression and user protection -- 5.7 Ethical concerns -- 5.8 AI governance, strategy, and the 'good society' -- 5.9 Strategies for detection and prevention -- 5.9.1 Advanced AI detection technologies -- 5.9.2 Collaborative industry efforts -- 5.9.3 Public awareness and education -- 5.10 Research and development -- 5.10.1 Investment in AI ethics research -- 5.10.2 Engaging the academic community -- 5.11 Legal and policy measures -- 5.11.1 Regulatory frameworks -- 5.11.2 International cooperation -- 5.12 Technology user policies -- 5.12.1 Robust platform policies -- 5.12.2 User reporting mechanisms -- 5.13 Ethical AI development -- 5.13.1 Ethical guidelines for AI developers -- 5.13.2 Incorporating ethical AI into design -- 5.14 Redress and mitigation -- 5.14.1 Victim support -- 5.14.2 Accountability of tech companies -- 5.14.3 Proactive monitoring for misuse -- 5.14.4 Collaboration with law enforcement -- 5.15 Policy and legal measures -- 5.15.1 Legal frameworks for redress -- 5.15.2 Regulations to prevent repeat offenses -- 5.16 Public awareness and advocacy -- 5.16.1 Awareness campaigns…”
    Libro electrónico
  19. 179
    Publicado 2025
    Tabla de Contenidos: “…-- The Chilling Effectiveness of Low-Tech Deception -- Breaking Bad: How Bad Actors Can Corrupt the Morals of AI Systems -- The Language of Generative AI -- A Quick Prompting Primer -- Adversarial Prompting: Gaslighting Is the New Programming Language -- When Jailbreaking Is Overrated: Uncensored AI Systems -- Disinformation and Manipulation -- Pornography and Exploitation -- Hate Speech and Radicalization -- Cybercrime and Scams…”
    Libro electrónico
  20. 180
    Publicado 1977
    Libro