Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Internet 13
- Pornografía 13
- Computer crimes 8
- History 8
- Pornography 8
- Social aspects 8
- Philosophy 5
- Pornografia 5
- RELIGION 5
- Aspectos sociales 4
- Filosofía 4
- Law and legislation 4
- Mujeres 4
- Psychology 4
- Sex 4
- Aspectes socials 3
- Aspectos morales 3
- Children 3
- Computer security 3
- Crime 3
- Criminology, Penology & Juvenile Delinquency 3
- English literature 3
- Ethics 3
- Historia 3
- Història i crítica 3
- Investigation 3
- Mass media 3
- Moral and ethical aspects 3
- Political Philosophy 3
- Political philosophy 3
-
161Publicado 2012Tabla de Contenidos: “….] -- Changing discourses of blame in nursing and healthcare / Hannah Cooke -- Hospital policies regarding violence in the workplace : a discourse analysis / Penny Powers -- Exploring violence in a forensic hospital : a theoretical exploration / Amélie Perron and Trudy Rudge -- Nurses' failure to report elder abuse in long-term care : an exploratory study / Gloria Hamel-Lauzon and Sylvie Lauzon -- Foucault and the nexus between violence and power : the context of intra/inter professional aggression / Isabelle St-Pierre -- Examining nurse-to-nurse horizontal violence and nurse-to-student vertical violence through the lens of phenomenology / Sandra P Thomas -- The rise of violence in HIV/AIDS prevention campaigns : a critical discourse analysis / Marilou Gagnon and Jean Daniel Jacob -- Bullying in the workplace : a qualitative study of newly licensed registered nurses / Shellie Simons and Barbara Mawn -- Sexual health nursing assessments : examining the symbolic violence of intimate exposures / Patrick O'Byrne and Corey Woodyatt -- Bullying on the back-channels : everyday interpersonal communicative relations in telephone talk, as a space for covert forms of professional manipulation / Jackie Cook and Colette Snowden -- Assessment of risk and special observations in mental health practice : a comparison of forensic and non-forensic settings / Elizabeth Mason-Whitehead and Tom Mason -- Policing pornography in high-secure care : the discursive construction of gendered inequality / David Mercer -- "Warning, this job contains strong language and adult themes" : do nurses require thick skins and broad shoulders to deal with encounters involving swearing? …”
Libro -
162Publicado 2010Tabla de Contenidos: “…CHAPTER THIRTEEN: The uncertainty principle in the psychoanalytic process CHAPTER FOURTEEN: Implicit and explicit pathways to psychoanalytic change; CHAPTER FIFTEEN: Life as performance art: Right and left brain function, implicit knowing, and felt coherence; CHAPTER SIXTEEN: Bridging neurobiology, cognitive science and psychoanalysis: Recent contributions to theories of therapeutic action; PART VI; CHAPTER SEVENTEEN: Lights, camera, attachment: Female embodiment as seen through the lens of pornography; CHAPTER EIGHTEEN: Purging as embodiment; CHAPTER NINETEEN: The incredible shrinking shrink…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
163Publicado 2020Tabla de Contenidos: “…Une analyse des rapports du Bureau du coroner du Quebec entre 2000 et 2014 / Jean-François Cauchie, Patrice Corriveau et Linda Michel -- L'apport de la criminologie critique à l'elaboration d'une clinique en criminologie / Christophe Adam et Bastien Quirion -- Justice sociale ou efficience : exploration de la pratique reflexive chez les diplômees en criminologie / Genevieve Nault, Joanne Cardinal et Claudia Fradette -- Savoir-être, savoir-faire et contraintes lies aux demarches choregraphiques en prison en France : notes de terrain / Claire Jenny et Sylvie Frigon -- Pornographie et contrôle : du tort moral et social au tort à la sante publique / Isabelle Perreault, Michele Diotte et Simon Corneau -- Jeux de rôles et violences "fictives" : etude exploratoire de l'effet du jeu sur la reproduction de la violence sexuelle dans une communaute de jeu au Quebec / Alexis Hieu Truong et Isabelle Côte -- L'intervention communautaire en criminologie vue par le biais d'une approche gramscienne : etude d'un cas quebecois / Eduardo González Castillo et Martin Goyette -- Postface. …”
Libro electrónico -
164Publicado 2006“…It deals with important and relevant topics such as the treatment of sex offenders; the compulsive use of internet pornography; the psychosexual development of adolescents growing up with HIV; the psychodynamics of unsafe sex; refugees and sexuality; services for people with gender dysphoria; psychological treatment for survivors of rape and sexual assault; and loss of sexual interest."…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
165“…While this moderation is often encouraged by governments - on the pretext that terrorism, bullying, pornography, “hate speech” and “fake news” will slowly disappear from the internet - it enables tech companies to censure our society. …”
Electrónico -
166por Draucker, ShannonTabla de Contenidos: “…Chapter Five: Orgasm in the Orchestra Box: Teleny's Musical Pornography -- "Natural Tastes": Teleny's Defense of Same-Sex Desire -- Aural Sex: Teleny's Queer Erotics -- Part Four: Intimacies -- Chapter Six: Fiddle Feelings: Human-Instrument Intimacies in Dickens, Eliot, Trollope, and Hardy -- "Corporeal Co-Dependence": Human-Instrument Relations in Victorian Acoustical Science -- Sympathetic Kinship: George Eliot's The Mill on the Floss -- Cello Friendship: Anthony Trollope's The Warden -- Passioned Pulsings: Thomas Hardy's "Haunting Fingers" -- Self-Playing Instruments…”
Publicado 2024
Libro electrónico -
167Publicado 2014Tabla de Contenidos: “…Intro -- Half Title -- Title Page -- Contents -- Introduction -- 100 Ideas that Changed the Web -- No.1 The Mundaneum -- No.2 The Space Race -- No.3 Hypertext -- No.4 The Modem -- No.5 Graphical User Interface -- No.6 The Mouse -- No.7 Markup Language -- No.8 XANADU -- No.9 The Personal Computer -- No.10 The Internet -- No.11 Internet Service Provider -- No.12 Bulletin Board Systems -- No.13 Hackers -- No.14 Cyberpunk -- No.15 Internet Protocol Suite -- No.16 Desktop Publishing -- No.17 Hypercard -- No.18 Graphics Interchange Format -- No.19 The Emoticon -- No.20 The Domain Name System -- No.21 The Project -- No.22 Web Browser -- No.23 The Cookie -- No.24 The JPEG -- No.25 Pornography -- No.26 Search -- No.27 WIFI -- No.28 Open Source -- No.29 Netiquette -- No.30 Apache Web Server -- No.31 Content Management Systems -- No.32 Web Analytics -- No.33 Massively Multi-Player Online Gaming -- No.34 Webcam -- No.35 Web Standards -- No.36 Geocities -- No.37 The Banner Ad -- No.38 Web Auction -- No.39 User-Centred Design -- No.40 Net Art -- No.41 Digital Fragility -- No.42 Information Architecture -- No.43 Web Chat -- No.44 Cascading Style Sheets -- No.45 Metadata -- No.46 The Webby Awards -- No.47 Pay Per Click -- No.48 Web Mapping -- No.49 Blogging -- No.50 Scaleable Vector Graphics -- No.51 Webmail -- No.52 Viral Content -- No.53 Internet Meme -- No.54 The Digital Wallet -- No.55 Ecommerce -- No.56 Collaborative Filtering -- No.57 The Drudge Report -- No.58 RSS Feeds -- No.59 Web Streaming -- No.60 The Independence Of Cyberspace -- No.61 The Blair Witch Project -- No.62 Peer-To-Peer -- No.63 Broadband -- No.64 Creative Commons -- No.65 The Dot-Com Bubble -- No.66 Web Tv -- No.67 The WIKI -- No.68 Infographics -- No.69 Augmented Reality -- No.70 Captcha -- No.71 Photo Sharing -- No.72 Podcast -- No.73 The Long Tail -- No.74 AJAX…”
Libro electrónico -
168por Shavers, BrettTabla de Contenidos: “…Other devices used by suspectSoftware used by suspect; Internet use by suspect; Online chat, email, forums, boards, online social networking; Peer-to-Peer Networking; File storage; Crime specific-child pornography; Crime specific-identity theft; Other alleged crimes; Questions for Victims; Computer crime victim questions-identity theft; Computer crime victim questions-harassment via email/text/online postings; Questions for Network Administrators; Customer accounts-Internet Service Provider, online data hosting, other online services; Summary; Bibliography; 3 Physical Investigations…”
Publicado 2013
Libro electrónico -
169por Aydemir, MuratTabla de Contenidos: “…The Specter Haunting Male Morphology: Othering the Body: A Comedy: The Deictic Veil and the Phallus/Penis: Every Temptation: Smile and Breast: Double-Crossing Gender -- Part III. Pornography -- 5. Significant Discharge: The Cum Shot and Narrativity -- Introducing the Cum Shot: Justine: "I can't believe you just came": The Climax of Involuntary Spasm: "I was not finished": Return and Repetition -- 6. …”
Publicado 2007
Libro electrónico -
170por Davis, Harold, 1953-Tabla de Contenidos: “…Understanding Contextual RelevanceServing Ads; Dollars and Cents; CPC Program Vendors; Placing CPC Ads on Your Site; Signing Up; Selecting Ad Formats; Adding Code to Your Pages; Action Items; Profiting from Adult Sites; Creating Adult Sites; Legal Issues; Adult web traffic and obscenity; Children in pornography; Celebrities; Protecting the Children; Adult Web Hosting; Converting Traffic; Instant gratification; Product credibility; Targeting content to traffic; The Taxonomy of Desire; Making Money with Advertising; Types of Programs; Payment Plans; Webmaster Programs; Finding Sponsors…”
Publicado 2006
Libro electrónico -
171por Criddle, LindaTabla de Contenidos: “…Taking a Closer Look at the World of Online Pornography…”
Publicado 2006
Libro electrónico -
172por Fischer, Gayle V.Tabla de Contenidos: “….) -- Australia/New Zealand -- Biography -- Individual and Collective Biographies -- Journals and Diaries -- Letters -- Oral History -- Birth Control -- l Abortion -- Fertility -- Infanticide -- Material Culture -- Reproductive Rights and Options -- Canada -- Economics (see also Work) -- Africa -- Asia -- Australia -- Europe -- Latin America -- Middle East/Near East -- North America -- Soviet Union -- Education Methods -- Students -- Teachers -- Ethnicity -- Asian -- European -- General Immigrants -- Jewish -- Latin American -- Europe -- Central Europ -- e Eastern Europe -- France -- Great Britain -- Northern Europe -- Southern Europe -- Family -- Childbirth -- Childcare -- Demographics -- Ethnicity -- Infant Mortality -- International -- Kinship -- Motherhood -- Feminism -- Biography -- General -- International Organizations -- Politics -- Religion -- Theory -- Friendship -- Health -- Health Care/Preventive Health Care -- Illness -- Maternity/Childbirth -- Medical Issues -- Psychology -- Latin America -- Law/Crime -- Courts, Trials, and Prisons -- Divorce, Family, and Marriage -- Female Criminality -- Lawyers -- Reproductive Rights and Illegitimacy -- Work and Protective Legislation -- Lifestages and Lifestyles (except married) -- Life Courses -- Old Age -- Never-Married Women -- Widowhood -- Youth -- Marriage/Divorce -- Courtship -- Demographics -- Divorce -- Ethnicity -- International -- Polygamy -- Material and Popular Culture -- Architecture/City Planning/Neighborhoods -- Books/Literary Images/Literature -- Crafts/Quilts/Embroidery Fashion/Textiles/Beauty -- Culture -- Food -- Photographs/Paintings/Visual Images/Movies Popular Culture/Mass Media/Advertising -- Science and Technology -- Middle East/Near East -- Military/War -- Home Front -- Jobs -- Peace -- Activism -- War Service -- Politics -- First Ladies -- Government Policy -- Political Participation -- International Relations -- Monarchies -- Office Holders Parties -- Women's Rights -- Pornography -- Professions -- Professional Career Choices -- White Collar Work -- Prostitution -- Religion -- Catholocism Missions and Missionaries -- Protestantism -- Religious Issues and Witchcraft -- Sexuality Ideology -- Lesbianism (see also Lifestages and Lifestyles) -- Practices -- Sexually Transmitted Diseases -- Virginity/Celibacy -- Social Reform/Community -- Organizing -- Family Planning and Aid To Children -- Health Reform -- Industrial Reform -- Moral Reform -- Social Movements/General Temperance -- Women's Clubs -- Women's Rights Movements -- Soviet Union -- Sports -- Suffrage -- Anti-Suffrage -- International Suffrage -- United States -- National -- East -- Midwest -- South -- West -- Construction/Deconstruction/Reconstruction -- Women's History/Feminist History -- Women's History Methodology and Other Disciplines -- Cross-Cultural Theory and Women's History -- Biography Women's History and Labor -- Historiography and Sources -- U.S. …”
Publicado 1992
Libro electrónico -
173por Banks, Michael A.Tabla de Contenidos: “…Pimps and predators. Pornography unlimited -- And now, the Web .. -- Before the Web -- CompuServe buys The Source -- AOL buys CompuServe -- Mosaic-. …”
Publicado 2008
Libro electrónico -
174por Schwartz, Alan, 1970-“… The annoyance factor for individual users whose email is crammed with pitches for pornography, absurd moneymaking schemes, and dubious health products is fierce. …”
Publicado 2004
Libro electrónico -
175Publicado 2023Tabla de Contenidos: “…INDAGACIONES A LA LUZ DEL PENSAMIENTO DE TOMÁS DE AQUINO(pp. 135-144)--CAPÍTULO 11 TENDIENDO PUENTES: EL CONCEPTO DE PERDÓN DE ENRIGHT Y LA TEORÍA MIMÉTICA DE RENÉ GIRARD(pp. 145-156)--CAPÍTULO 12 FACTORES SUBYACENTES A LA SEXUALIZACIÓN DE LAS RELACIONES PERSONALES(pp. 157-172)--CAPÍTULO 13 SEX DIFFERENCES IN THE VIRTUES AND VICES RELATED TO TEMPERANCE: CHASTITY, MODESTY, AND PORNOGRAPHY-USE(pp. 173-196)--PARTE IV. VIRTUDES, PSICOLOGÍA Y EDUCACIÓN--CAPÍTULO 14 LA IMPORTANCIA DEL EJEMPLO EN LA ADQUISICIÓN DE LA VIRTUD(pp. 199-210)--CAPÍTULO 15 VIRTUD, PSICOLOGÍA Y SALUD MENTAL: EDUCAR LA PERSONA PARA SANAR SUS HERIDAS(pp. 211-222)--CAPÍTULO 16 EDUCACIÓN CRISTIANA EN EL MODELO DE "DESARROLLO HUMANO INTEGRAL" (DHI)(pp. 223-236)--PARTE V. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
176por Wessels, DuaneTabla de Contenidos: “…Blocking a Few Misbehaving Clients; 6.3.3. Denying Pornography; 6.3.4. Restricting Usage During Working Hours; 6.3.5. …”
Publicado 2004
Libro electrónico -
177Publicado 2021Tabla de Contenidos: “…Advertising -- Trust Marks -- Safe Harbors -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Information Management -- Data Governance -- Building a Data Inventory -- Data Classification -- Data Flow Mapping -- Data Lifecycle Management -- Workforce Training -- Cybersecurity Threats -- Threat Actors -- Incident Response -- Phases of Incident Response -- Preparation -- Detection and Analysis -- Containment, Eradication, and Recovery -- Post-incident Activity -- Building an Incident Response Plan -- Data Breach Notification -- Vendor Management -- Vendor Cybersecurity Incidents -- Summary -- Exam Essentials -- Chapter 5 Private Sector Data Collection -- FTC Privacy Protection -- General FTC Privacy Protection -- The Children's Online Privacy Protection Act (COPPA) -- Future of Federal Enforcement -- Medical Privacy -- The Health Insurance Portability and Accountability Act (HIPAA) -- The Health Information Technology for Economic and Clinical Health Act -- The 21st Century Cures Act -- Confidentiality of Substance Use Disorder Patient Records Rule -- Financial Privacy -- Privacy in Credit Reporting -- Gramm-Leach-Bliley Act (GLBA) -- Red Flags Rule -- Consumer Financial Protection Bureau -- Educational Privacy -- Family Educational Rights and Privacy Act (FERPA) -- Telecommunications and Marketing Privacy -- Telephone Consumer Protection Act (TCPA) and Telemarketing Sales Rule (TSR) -- The Junk Fax Prevention Act (JFPA) -- Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act -- Telecommunications Act and Customer Proprietary Network Information -- Cable Communications Policy Act -- Video Privacy Protection Act (VPPA) of 1988 -- Summary -- Exam Essentials -- Review Questions -- Chapter 6 Government and Court Access to Private Sector Information -- Law Enforcement and Privacy -- Access to Financial Data…”
Libro electrónico -
178por Guidetti, OliverTabla de Contenidos: “…5.3.3 Automation of harassment tactics -- 5.3.4 Challenges for detection and response -- 5.4 Nefarious uses of generative AI -- 5.4.1 Social media -- 5.4.2 CEO fraud case -- 5.4.3 Virtual kidnapping scam -- 5.4.4 Revenge pornography -- 5.4.5 Manipulation in financial markets -- 5.4.6 AI-generated phishing emails -- 5.4.7 Synthetic identity fraud -- 5.4.8 Fabricated evidence in legal cases -- 5.4.9 Examination of tactics employed by harassers -- 5.5 Legal and ethical quandaries -- 5.5.1 Legal challenges in addressing generative AI-driven harassment -- 5.6 AI in creative industries and copyright challenges -- 5.6.1 Insufficiency of legislation in the face of AI advancements -- 5.6.2 Legal and regulatory frameworks for AI -- 5.6.3 Balancing free expression and user protection -- 5.7 Ethical concerns -- 5.8 AI governance, strategy, and the 'good society' -- 5.9 Strategies for detection and prevention -- 5.9.1 Advanced AI detection technologies -- 5.9.2 Collaborative industry efforts -- 5.9.3 Public awareness and education -- 5.10 Research and development -- 5.10.1 Investment in AI ethics research -- 5.10.2 Engaging the academic community -- 5.11 Legal and policy measures -- 5.11.1 Regulatory frameworks -- 5.11.2 International cooperation -- 5.12 Technology user policies -- 5.12.1 Robust platform policies -- 5.12.2 User reporting mechanisms -- 5.13 Ethical AI development -- 5.13.1 Ethical guidelines for AI developers -- 5.13.2 Incorporating ethical AI into design -- 5.14 Redress and mitigation -- 5.14.1 Victim support -- 5.14.2 Accountability of tech companies -- 5.14.3 Proactive monitoring for misuse -- 5.14.4 Collaboration with law enforcement -- 5.15 Policy and legal measures -- 5.15.1 Legal frameworks for redress -- 5.15.2 Regulations to prevent repeat offenses -- 5.16 Public awareness and advocacy -- 5.16.1 Awareness campaigns…”
Publicado 2024
Libro electrónico -
179Publicado 2025Tabla de Contenidos: “…-- The Chilling Effectiveness of Low-Tech Deception -- Breaking Bad: How Bad Actors Can Corrupt the Morals of AI Systems -- The Language of Generative AI -- A Quick Prompting Primer -- Adversarial Prompting: Gaslighting Is the New Programming Language -- When Jailbreaking Is Overrated: Uncensored AI Systems -- Disinformation and Manipulation -- Pornography and Exploitation -- Hate Speech and Radicalization -- Cybercrime and Scams…”
Libro electrónico -
180Publicado 1977Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universidad de Deusto)Libro