LEADER 01077nam a2200265 i 4500 001 991000454809707536 008 040928s2002 it 101 0 ita d 020 $a8814098859 035 $ab13223665-39ule_inst 040 $aDip.to Studi Giuridici$bita 082 0 $a346.0138 245 13$aLa riforma dell'interdizione e dell'inabilitazione :$batti del convegno di studi su "Capacità ed autonomia delle persone", Roma 20 giugno 2002 /$ca cura di Salvatore Patti 260 $aMilano :$bGiuffré,$c2002 300 $a168 p. ;$c24 cm 440 0$aFamilia. Quaderni ;$v1 650 4$aInterdizione$xDiritto 650 4$aInabilitazione$xDiritto 650 4$aCapacità giuridica$xCongressi$zRoma$y2002 700 1 $aPatti, Salvatore 907 $a.b13223665$b02-04-14$c28-09-04 912 $a991000454809707536 945 $aLE027 346.01 PAT01.01$g1$i2027000066995$lle027$o-$pE12.50$q-$rl$s- $t0$u1$v0$w1$x0$y.i1388444x$z28-09-04 996 $aRiforma dell'interdizione e dell'inabilitazione$9982103 997 $aUNISALENTO 998 $ale027$b28-09-04$cm$da $e-$fita$git $h3$i0 LEADER 03106nam 22005653 450 001 996565572803316 005 20231009084510.0 010 $a90-485-5815-8 024 7 $a10.1515/9789048558155 035 $a(CKB)27291323200041 035 $a(MiAaPQ)EBC30607324 035 $a(Au-PeEL)EBL30607324 035 $a(DE-B1597)663279 035 $a(DE-B1597)9789048558155 035 $a(OCoLC)1381165174 035 $a(EXLCZ)9927291323200041 100 $a20231009d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe Riddle of Literary Quality $eA Computational Approach 205 $a1st ed. 210 1$aAmsterdam :$cAmsterdam University Press,$d2023. 210 4$d©2023. 215 $a1 online resource (234 pages) 311 $a9789048558148 327 $tFrontmatter -- $tContents -- $t1. The Riddle -- $t2. The National Reader Survey -- $t3. Romance, Suspense, and Translations -- $t4. Literary Novels Written by Women -- $t5. Literary Novels Written by Men -- $t6. Style, Gender, and Genre -- $t7. The Riddle of Literary Quality Solved? -- $tAppendix 1: The Survey -- $tAppendix 2: The Books -- $tAppendix 3: The Website -- $tBibliography -- $tTables -- $tFigures -- $tAcknowledgements -- $tIndex 330 $aWhat is literature? Can we measure 'literariness' in texts themselves? The innovative Computational Humanities project The Riddle of Literary Quality asked thousands of Dutch readers for their opinion about contemporary Dutch and translated novels. The public shared which novels they had read, what they really thought of them, and how they judged their quality. Their judgments of the same novels were compared with the results of computational analysis of the books. Using evidence from almost 14,000 readers and building on more textual data than ever before, Van Dalen-Oskam and her team uncovered unconscious biases that shed new light on prejudices many people assumed no longer existed. This monograph explains in an accessible way how the project unfolded, which methods were used, and how the results may change the future of Literary Studies. 606 $aCriticism$xData processing 606 $aDigital humanities$xData processing 606 $aDutch literature$xHistory and criticism 606 $aText data mining$zNetherlands 606 $aLANGUAGE ARTS & DISCIPLINES / Writing / Fiction Writing$2bisacsh 610 $aComputational Literary Studies, Literary fiction, Bestsellers, Bias, Readability. 615 0$aCriticism$xData processing. 615 0$aDigital humanities$xData processing. 615 0$aDutch literature$xHistory and criticism. 615 0$aText data mining 615 7$aLANGUAGE ARTS & DISCIPLINES / Writing / Fiction Writing. 676 $a801.950285 700 $avan Dalen-Oskam$b Karina$01429664 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996565572803316 996 $aThe Riddle of Literary Quality$93568852 997 $aUNISA LEADER 01619nas 2200433-a 450 001 9910140035703321 005 20240413014708.0 035 $a(CKB)1000000000815532 035 $a(CONSER)sf-92095653- 035 $a(DE-599)ZDB2375840-5 035 $a(EXLCZ)991000000000815532 100 $a19920506a19uu9999 --- a 101 0 $aeng 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAnnual review /$f[prepared by Economic Research Department, Central Bank of the Islamic Republic of Iran] 210 $a[Tehran] $cCentral Bank of the Islamic Republic of Iran 215 $a1 online resource 311 08$aPrint version: Annual review (B?nk-i Markaz?-i Jumh?r?-i Isl?m?-i ?r?n) 1560-4764 (DLC)sf 92095653 (OCoLC)25771876 531 1 $aAnnu. rev. - Cent. Bank Islam. Repub. Iran 606 $aBanks and banking$zIran$vStatistics$vPeriodicals 606 $aBanks and banking$2fast$3(OCoLC)fst00826867 606 $aEconomic history$2fast$3(OCoLC)fst00901974 607 $aIran$xEconomic conditions$vPeriodicals 607 $aIran$xEconomic conditions$vStatistics$vPeriodicals 607 $aIran$2fast 608 $aPeriodicals.$2fast 608 $aStatistics.$2fast 615 0$aBanks and banking 615 7$aBanks and banking. 615 7$aEconomic history. 676 $a332.110955 712 02$aB?nk-i Markaz?-i Jumh?r?-i Isl?m?-i ?r?n.$bId?rah-i Bar?ras?h?-yi Iqti??d?. 906 $aJOURNAL 912 $a9910140035703321 920 $aexl_impl conversion 996 $aAnnual Review$91926758 997 $aUNINA LEADER 01726nas 2200469- 450 001 9910870697303321 005 20240723213017.0 035 $a(OCoLC)983204714 035 $a(CKB)5600000000854580 035 $a(CONSER)--2024237652 035 $a(EXLCZ)995600000000854580 100 $a20170420a20179999 --- - 101 0 $aeng 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aJournal of intellectual property studies 210 1$aJodhpur :$cNational Law University,$d[2017]- 215 $a1 online resource ( volumes) 300 $a"The Journal of Intellectual Property Studies (JIPS) is a student-run, online law journal published by National Law University, Jodhpur. The objective of the Journal is to enhance discourse on intellectual property rights between policy makers, practitioners and scholars"--About us. 311 $a2583-5297 517 1 $aJIPS 517 1 $aJ. intell. prot. stud. 531 1 $aJ. intellect. prop. stud. 606 $aIntellectual property$vPeriodicals 606 $aPropriété intellectuelle$vPériodiques 606 $aIntellectual property$2fast$3(OCoLC)fst00975774 608 $aperiodicals.$2aat 608 $aLaw reviews.$2fast 608 $aPeriodicals.$2fast 608 $aLaw reviews.$2lcgft 608 $aPeriodicals.$2lcgft 608 $aRevues de droit.$2rvmgf 608 $aPériodiques.$2rvmgf 615 0$aIntellectual property 615 6$aPropriété intellectuelle 615 7$aIntellectual property. 712 02$aNational Law University, Jodhpur, 906 $aJOURNAL 912 $a9910870697303321 996 $aJournal of Intellectual Property Studies$94174158 997 $aUNINA LEADER 08153oam 2200781 a 450 001 9910962521303321 005 20200520144314.0 010 $a9798400636509 010 $a9786610373864 010 $a9781280373862 010 $a1280373865 010 $a9780313016196 010 $a0313016194 024 7 $a10.5040/9798400636509 035 $a(CKB)111087026965102 035 $a(OCoLC)614602171 035 $a(CaPaEBR)ebrary10005662 035 $a(SSID)ssj0000134306 035 $a(PQKBManifestationID)11134111 035 $a(PQKBTitleCode)TC0000134306 035 $a(PQKBWorkID)10056441 035 $a(PQKB)11752631 035 $a(Au-PeEL)EBL3000517 035 $a(CaPaEBR)ebr10005662 035 $a(OCoLC)847167752 035 $a(MiAaPQ)EBC3000517 035 $a(OCoLC)1034908783 035 $a(DLC)BP9798400636509BC 035 $a(Perlego)4202649 035 $a(EXLCZ)99111087026965102 100 $a20010614e20012024 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCyber-threats, information warfare, and critical infrastructure protection $edefending the U.S. homeland /$fAnthony H. Cordesman with Justin G. Cordesman 205 $a1st ed. 210 1$aWestport, Conn. :$cPraeger,$d2001. 210 2$aLondon :$cBloomsbury Publishing,$d2024 215 $a1 online resource (192 p.) 300 $a"Published in cooperation with the Center for Strategic and International Studies, Washington, D.C." 311 08$a9780275974237 311 08$a0275974235 320 $aIncludes bibliographical references. 327 $aCover -- Cyber-threats, Information Warfare, and Critical Infrastructure Protection -- Contents -- Acknowledgments -- Chapter 1 The Changing Nature of Critical Infrastructure Protection -- THE PROBLEM OF EVOLVING TECHNOLOGY -- THE UNCERTAIN BALANCE OF RISKS AND NON-RISKS IN CYBER-ATTACKS -- The Disconnect between Cyber-defense and Cyber-offense -- The Lack of Credible Risk and Vulnerability Assessments -- GOVERNMENTAL AND PRIVATE SECTOR EFFORTS TO RESPOND -- Chapter 2 Threat Assessment -- THE PRESIDENT'S COMMISSION ON CRITICAL INFRASTRUCTURE PROTECTION CHARACTERIZATION OF THE THREAT -- THE NATIONAL INFRASTRUCTURE PROTECTION CENTER'S (NIPC) VIEW OF THE THREAT -- INTELLIGENCE COMMUNITY ASSESSMENTS OF THE THREAT -- CIA Testimony on the Threat -- National Intelligence Council's Estimate of the Threat -- Incidents of "Cyber-warfare": The Kosovo Crisis -- Serbia's Role in Information Warfare -- NATO's Role in Information Warfare -- Is Information Warfare and Retaliation Legal and Worth Its Costs? -- Lower-Level Incidents of "Cyber-warfare" -- Moonlight Maze -- Solar Sunrise -- Rome Labs Incident -- THE COMPUTER SECURITY INSTITUTE'S SURVEY OF THE THREAT -- COMPUTER EMERGENCY RESPONSE TEAM'S (CERT) ASSESSMENT OF THREAT -- CHALLENGES IN IMPROVING THE ASSESSMENT OF THE THREAT -- Chapter 3 Evolving U.S. Policy and Response -- THE BEGINNINGS: THE COMPUTER SECURITY ACT AND CLINGER-COHEN ACT -- THE FEDERAL GOVERNMENT REDEFINES CRITICAL INFRASTRUCTURE AND AGENCY RESPONSIBILITIES -- Executive Order 13010 -- The President's Commission on Critical Infrastructure Protection -- Presidential Decision Directive-63 (PDD-63) -- Lead Agencies for Sector Liaison -- Lead Agencies for Special Functions -- A New Structure for Interagency Coordination -- National Infrastructure Protection Center (NIPC) -- Information Sharing and Analysis Center (ISAC). 327 $aNational Infrastructure Assurance Council -- National Infrastructure Assurance Plan -- Studies and Research -- Cooperation with the Private and Civil Sectors -- Annual Report on Implementation -- NATIONAL PLAN FOR INFORMATION SYSTEMS PROTECTION -- National Plan for Information Systems Protection, Version One -- GAO Comments on the National Plan for Information Systems Protection -- Oplan 3600 -- THE SUCCESS OF THE FEDERAL GOVERNMENT EFFORT TO DATE -- Chapter 4 Analyzing Federal Critical Infrastructure Programs by Department and Agency -- THE NATIONAL PLAN FOR INFORMATION SYSTEMS ESTIMATE -- THE OMB ANALYSIS -- ANNUAL REPORT TO CONGRESS ON COMBATING TERRORISM -- Government-wide Spending on CIP -- EFFORTS BY FEDERAL AGENCIES -- Department of Agriculture -- Department of Commerce -- Critical Infrastructure Assurance Office -- Department of Energy -- Environmental Protection Agency and GAO Audits -- Health and Human Services -- Department of Interior -- Department of Justice -- NASA -- GAO Assessments of NASA Information Security -- NATIONAL SCIENCE FOUNDATION -- NATIONAL SECURITY COMMUNITY -- The Role of the Department of Defense -- Patterns of Attack and Response -- Major DoD Cyber-defense Programs -- GAO Critiques of DoD Efforts: The 1996 Study -- The GAO's 1999 Recommendations -- DoD Progress in Addressing Security Weaknesses -- Cyber and Information Warfare and the Role of the Intelligence Community -- Total Spending on National Security Activity -- Department of State -- Department of Transportation -- Department of Treasury -- Department of Veterans Affairs -- Chapter 5 Assessments of Effectiveness -- INDEPENDENT U.S. GOVERNMENT EFFORTS TO ASSESS RISK, COST, AND BENEFITS: GAO TESTIMONY OF OCTOBER 6, 1999 -- Management Recommendations Within Brock's Testimony. 327 $aINDEPENDENT U.S. GOVERNMENT EFFORTS TO ASSESS RISK, COST, AND BENEFITS: GAO TESTIMONY OF MARCH 29, 2000 -- Weaknesses in Controls -- Raise Awareness -- Implement Software Patches -- Routinely Use Automated Tools to Monitor Security -- Identify and Propagate Pockets of Excellence -- Focus on the Most Common Vulnerabilities First -- Enforce a Strong Management Approach -- PRELIMINARY ANALYSIS OF GAO FINDINGS -- OTHER EFFORTS TO ASSESS RISK, COST, AND BENEFITS -- TECHNICAL RISKS, TESTS, AND EVALUATIONS OF IW PROGRAMS -- Chapter 6 Role of State and Local Governments -- Chapter 7 Role of Private Industry -- Chapter 8 Lessons from Other Nations: International Vulnerability -- Chapter 9 Conclusions and Recommendations -- Notes -- About the Authors. 330 8 $aDuring the last two decades, the infrastructure of the U.S. economy has undergone a fundamental set of changes. It has steadily increased its reliance on its service sector and high-technology economy. The U.S. has come to depend on computers, electronic data storage and transfers, and highly integrated communications networks. The result is the rapid development of a new form of critical infrastructure--and one that is exceedingly vulnerable to a new family of threats, loosely grouped together as information warfare. This detailed volume examines these threats and the evolving U.S. policy response. After examining the dangers posed by information warfare and efforts at threat assessment, Cordesman considers the growing policy response on the part of various federal agencies, state and local governments, and the private sector. The changing nature of the threats is leading these actors to reassess the role they must play in critical infrastructure protection. Government at all levels, industry, and even friendly and neutral foreign governments are learning that an effective response requires coordination in deterrence, defense, and counterattack. 606 $aElectronic data processing$xSecurity measures$zUnited States 606 $aTelecommunication$xDefense measures$zUnited States 606 $aComputer networks$xSecurity measures$zUnited States 606 $aInformation warfare$zUnited States 615 0$aElectronic data processing$xSecurity measures 615 0$aTelecommunication$xDefense measures 615 0$aComputer networks$xSecurity measures 615 0$aInformation warfare 676 $a005.8 700 $aCordesman$b Anthony H$0567761 701 $aCordesman$b Justin G$01798490 712 02$aCenter for Strategic and International Studies (Washington, D.C.) 801 0$bDLC 801 1$bDLC 801 2$bDLC 906 $aBOOK 912 $a9910962521303321 996 $aCyber-threats, information warfare, and critical infrastructure protection$94341296 997 $aUNINA