LEADER 00988nam--2200349---450- 001 990002079770203316 005 20090710120115.0 035 $a000207977 035 $aUSA01000207977 035 $a(ALEPH)000207977USA01 035 $a000207977 100 $a20041014d1980----km-y0itay0103----ba 101 0 $afre 102 $aFR 105 $a||||||||001yy 200 1 $a<> cassation en matière civile$fJacques Boré$gpréface de Pierre Raynaud 210 $aParis$cSirey$d1980 215 $aXXXI, 1159 p.$d24 cm 410 0$12001 454 1$12001 461 1$1001-------$12001 700 1$aBORE,$bJacques$0406739 702 1$aRAYNAUD,$bPierre 801 0$aIT$bsalbc$gISBD 912 $a990002079770203316 951 $aXXVII.1.H 70 (IG I 905)$b13543 G.$cIG I$d00240524 959 $aBK 969 $aGIU 979 $aSIAV1$b10$c20041014$lUSA01$h0856 979 $aRSIAV4$b90$c20090710$lUSA01$h1201 996 $aCassation en matiere civile$9680523 997 $aUNISA LEADER 00967nam a22002771i 4500 001 991004100359707536 005 20021108130402.0 008 020628s1990 it |||||||||||||||||ita 020 $a8806118013 035 $ab11912777-39ule_inst 035 $aARCHE-000260$9ExL 040 $aDip.to Filologia Ling. e Lett.$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a302.5 100 1 $aAgamben, Giorgio$035813 245 13$aLa comunità che viene /$cGiorgio Agamben 260 $aTorino :$bG. Einaudi,$c[1990] 300 $aVI, 77 p. ;$c17 cm 490 0 $aSaggi brevi [Einaudi] 650 4$aErmeneutica 650 4$aComunità$xConcetto 907 $a.b11912777$b28-04-17$c01-04-03 912 $a991004100359707536 945 $aLE008 Cr O IX 62$g1$i2008000248819$lle008$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i12181390$z01-04-03 996 $aComunità che viene$9678174 997 $aUNISALENTO 998 $ale008$b01-04-03$cm$da $e-$fita$git $h3$i1 LEADER 01173nam 2200373 450 001 9910713442903321 005 20200428155815.0 035 $a(CKB)5470000002501225 035 $a(OCoLC)1152201029 035 $a(EXLCZ)995470000002501225 100 $a20200428d1969 ua 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRegulation of the press in Thailand /$fprepared by Mya Saw Shin 210 1$aWashington, D.C. :$cFar Eastern Law Division, Law Library, Library of Congress,$d1969. 215 $a1 online resource (3 pages) 300 $aTypescript. 300 $a"December 1969"--Page 3. 320 $aIncludes bibliographical references. 606 $aPress law$zThailand 606 $aGovernment and the press$zThailand 615 0$aPress law 615 0$aGovernment and the press 700 $aMya Saw Shin$01386422 712 02$aLibrary of Congress.$bFar Eastern Law Division, 801 0$bDLC 801 1$bGPO 906 $aBOOK 912 $a9910713442903321 996 $aRegulation of the press in Thailand$93477455 997 $aUNINA LEADER 00704nam a2200217 i 4500 001 991004378027507536 005 20250502181257.0 008 250502s1996 it er 001 f ita d 020 $a8806140639 040 $aBibl. Dip.le Aggr. Studi Umanistici - Sez. Filosofia$bita$cSocioculturale Scs 041 0 $aita 082 04$a853.914$223 100 1 $aMancinelli, Laura$0198295 245 12$aI tre cavalieri del Graal /$cLaura Mancinelli 260 $aTorino :$bEinaudi,$c1996 300 $a90 p. ;$c20 cm 490 1 $aEinaudi Tascabili. Letteratura ;$v381 830 0$aEinaudi Tascabili.$pLetteratura ;$v381 912 $a991004378027507536 996 $aTre cavalieri del Graal$94373780 997 $aUNISALENTO LEADER 04075nam 2200781Ia 450 001 9911019201703321 005 20200520144314.0 010 $a9786611841355 010 $a9781281841353 010 $a1281841358 010 $a9780470997635 010 $a047099763X 035 $a(CKB)1000000000556306 035 $a(EBL)366847 035 $a(OCoLC)476202062 035 $a(SSID)ssj0000354864 035 $a(PQKBManifestationID)12080768 035 $a(PQKBTitleCode)TC0000354864 035 $a(PQKBWorkID)10315939 035 $a(PQKB)10193402 035 $a(SSID)ssj0000264759 035 $a(PQKBManifestationID)11216999 035 $a(PQKBTitleCode)TC0000264759 035 $a(PQKBWorkID)10292733 035 $a(PQKB)10482455 035 $a(MiAaPQ)EBC366847 035 $a(Perlego)2788721 035 $a(EXLCZ)991000000000556306 100 $a20071116d2008 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aUnderstanding the stigma of mental illness $etheory and interventions /$fedited by Julio Arboleda-Florez and Norman Sartorius 210 $aChichester, England ;$aHoboken, NJ $cJohn Wiley & Sons$dc2008 215 $a1 online resource (227 p.) 300 $aDescription based upon print version of record. 311 08$a9780470997642 311 08$a0470997648 311 08$a9780470723289 311 08$a0470723289 320 $aIncludes bibliographical references and index. 327 $aUnderstanding the Stigma of Mental Illness; Contents; List of contributors; Foreword; Preface; 1 The rights of a powerless legion; 2 Cross-cultural aspects of the stigma of mental illness; 3 The WPA Global Programme against Stigma and Discrimination because of Schizophrenia; 4 'Fighting stigma and discrimination because of schizophrenia - Open the Doors': a collaborative review of the experience from the German project centres; 5 Stigma and health care staff; 6 Evaluating programmatic needs concerning the stigma of mental illness; 7 Using the Internet for fighting the stigma of schizophrenia 327 $a8 Building an evidence base for anti-stigma programming9 Other people stigmatize . . . but, what about us? Attitudes of mental health professionals towards patients with schizophrenia; 10 Implementing anti stigma programmes in Boulder, Colorado and Calgary, Alberta; 11 Stigma measurement approaches: conceptual origins and current applications; Appendix Inventories to measure the scope and impact of stigma experiences from the perspective of those who are stigmatized - consumer and family versions; Index 330 $aMany mentally ill people are the victims of stigma, which leads to additional suffering and humiliation. Negative stereotypes and prejudicial attitudes against them are often reinforced by their media representation as unpredictable, violent and dangerous. Hence the importance of the study of stigma as an explanatory construct of much that transpires in the management of the mentally ill in our societies.This book describes the experience of stigmatization at the level of the individual, and seeks to measure stigma and discrimination from the following perspectives: Self imposed st 606 $aMental illness$xPublic opinion 606 $aMental illness$xSocial aspects 606 $aSchizophrenia$xPublic opinion 606 $aSchizophrenia$xSocial aspects 606 $aStigma (Social psychology) 615 0$aMental illness$xPublic opinion. 615 0$aMental illness$xSocial aspects. 615 0$aSchizophrenia$xPublic opinion. 615 0$aSchizophrenia$xSocial aspects. 615 0$aStigma (Social psychology) 676 $a362.2 676 $a362.26 676 $a616.89 701 $aArboleda-Florez$b J$g(Julio),$f1939-$01839916 701 $aSartorius$b N$0888186 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911019201703321 996 $aUnderstanding the stigma of mental illness$94419317 997 $aUNINA LEADER 08410nam 22006015 450 001 9910637731903321 005 20251008153552.0 010 $a9783031219207$b(electronic bk.) 010 $z9783031219191 024 7 $a10.1007/978-3-031-21920-7 035 $a(MiAaPQ)EBC7165863 035 $a(Au-PeEL)EBL7165863 035 $a(CKB)25913877600041 035 $a(DE-He213)978-3-031-21920-7 035 $a(PPN)267813562 035 $a(EXLCZ)9925913877600041 100 $a20221230d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCountering Cyberterrorism $eThe Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity /$fby Reza Montasari 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (175 pages) 225 1 $aAdvances in Information Security,$x2512-2193 ;$v101 311 08$aPrint version: Montasari, Reza Countering Cyberterrorism Cham : Springer International Publishing AG,c2023 9783031219191 320 $aIncludes bibliographical references. 327 $aIntroduction -- References -- Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom -- Abstract -- Introduction -- The Most Prevalent Cyber Threats -- The UK Cyber Landscape -- How Cyber Threats Are Identified in the UK Threats -- Types of Cyber-Attacks -- The UK Cybersecurity Policies and Practices Cybersecurity in Government Policies and Strategies -- Current Policies, Strategies, and Practices -- National Cyber Security Centre -- Active Cyber Defence Programme -- National Cyber Security Strategy 2022-2030 -- Recommendations -- Criticisms of the NCSC and Recommendations -- Criticisms of the ACD and Recommendations -- Criticisms of the NCSS 2022-2030 and Recommendations -- Recommendations for the Government?s Role -- Discussion and Conclusion- Key Findings -- Limitations of the Chapter -- Concluding Remarks -- References -- Internet of Things and Artificial Intelligence in National Security: Applications and Issues -- Abstract -- Introduction -- Background -- Definitions -- National and Domestic Security -- Definition of Artificial Intelligence -- The Internet of Things -- The Internet of Things Forensics -- AI and IoT in National and Domestic Security -- The Role of AI and IoT in Digital Security -- AI for Protecting IoT Devices against Hacking -- The Malicious Use of AI to Hack IoT Devices -- The Use of AI in the Military to Hack IoT Devices. - The Use of AI by Institutions to Safeguard Citizens -- AI and IoT in Political Security -- Deepfake and Mis- and Disinformation -- AI and the Formation of Filter Bubbles -- AI and Online Content Moderation -- AI and IoT in Physical Security -- Augmented Intelligence Analysis -- Military Weaponisation of AI and the IoT -- Privacy Implications of AI Algorithms -- Impacts of AI Algorithms on User Privacy -- Legal Frameworks for Privacy Relating AI Algorithms -- Potential Solutions for Privacy Implications -- Conclusion -- References -- Artificial Intelligence and the Internet of Things -- Forensics in a National Security Context -- Abstract -- Introduction -- AI Techniques in Automating Tasks of IoT Forensics -- A Brief Summary of IoT Forensics from Chapter 3 -- Types of AI Techniques Relevant to IoT Forensics -- Natural Language Processing -- Machine Learning -- Machine Learning and Anomaly Detection -- Machine Learning and Detection of Steganography -- Machine Learning and Detection of Steganography -- Sources and Detection of Algorithmic Bias -- Algorithmic Bias -- Sources of Algorithmic Bias -- Algorithmic Transparency and Military AI -- Recommendations -- Recommendations for Detecting Algorithmic Bias -- Recommendation for Algorithmic Transparency in Military AI Applications -- Conclusion -- References -- The Application of Big Data Predictive Analytics and Surveillance Technologies in the Field of Policing -- Abstract -- Introduction -- Key Concepts and History of AI- Predictive Policing -- History of AI -- Facial Recognition Technology -- 3D Facial Recognition -- Machine Learning -- SupervisedLearning -- Unsupervised Learning -- Reinforcement Learning -- Support Vector Machine -- Natural Language Processing -- Big Data -- RQ 1: The Use of AI by Law Enforcement I -- Big Data Predictive Analytics -- PredPol -- CompStat -- Person-Based Forecasting -- Innovative Surveillance Technology -- Hard and Soft Technology -- Closed-Circuit Television -- Facial Recognition Technology -- Body-Worn Cameras -- Social Media -- RQ 2: The Use of AI by Law Enforcement II -- ML and Data Mining in Policing -- Police Discrimination and Big Data -- DNA Databases and Big Data -- Recommendations -- Accountability and Transparency -- Bias in ML Algorithms -- Conclusion -- References -- The Potential Impacts of the National Security Uses of Big Data Predictive Analytics on Human Rights -- Abstract -- Introduction -- Background -- Big Data Predictive Analytics -- The Application of Predictive Policing -- Civil Liberties and National Security -- RQ 1: The Use of AI by Law Enforcement I -- Civil Liberties and National Security -- ChillingEffect, Privacy Rights and Freedom of Speech -- The Fourth Amendment and Stop and Search -- Striking a Smart Balance -- RQ 2: The Use of AI by Law Enforcement II -- Overpolicing of Certain Areas -- Focus on Crimes of the Poor -- System Avoidance -- Recommendations -- Conclusion -- References -- National Artificial Intelligence Strategies: A Comparison of the UK, EU and US Approaches with Those Adopted by State Adversaries -- Abstract -- Introduction -- AI Strategies of the UK, EU and US -- The UK AI Strategy -- The EU AI Strategy -- AI Strategies of Russia and China -- The Chinese AI Strategy -- The Russian AI Strategy -- Shortcomings and Recommendations -- Shortcomings of the UK AI Strategy -- Shortcomings of the EU AI Strategy -- Shortcomings of the US AI Strategy -- Shortcomings of the Chinese AI Strategy -- Shortcomings of the Russian AI Strategy -- Conclusion -- References. . 330 $aThis book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the context of the United Kingdom (UK), United States (US) and European Union (EU) national cybersecurity. More specifically, this book explores ways in which the adoption of AI algorithms (such as Machine Learning, Deep Learning, Natural Language Processing, and Big Data Predictive Analytics (BDPAs) transforms law enforcement agencies (LEAs) and intelligence service practices. It explores the roles that these technologies play in the manufacture of security, the threats to freedom and the levels of social control in the surveillance state. This book also examines the malevolent use of AI and associated technologies by state and non-state actors. Along with this analysis, it investigates the key legal, political, ethical, privacy and human rights implications of the national security uses of AI in the stated democracies. This book provides a set of policy recommendations to help to mitigate these challenges. Researchers working in the security field as well advanced level students in computer science focused on security will find this book useful as a reference. Cyber security professionals, network security analysts, police and law enforcement agencies will also want to purchase this book. . 410 0$aAdvances in Information Security,$x2512-2193 ;$v101 606 $aComputer networks$xSecurity measures 606 $aArtificial intelligence 606 $aComputer crimes 606 $aMobile and Network Security 606 $aArtificial Intelligence 606 $aCybercrime 615 0$aComputer networks$xSecurity measures. 615 0$aArtificial intelligence. 615 0$aComputer crimes. 615 14$aMobile and Network Security. 615 24$aArtificial Intelligence. 615 24$aCybercrime. 676 $a060 676 $a363.325 700 $aMontasari$b Reza$01068733 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910637731903321 996 $aCountering Cyberterrorism$93003832 997 $aUNINA