Internet abuse

Xem 1-11 trên 11 kết quả Internet abuse
  • In this chapter, I discuss Internet abuse from a psychoanalytic perspective. Internet abuse refers to the misuse of the Internet that leads to deterioration of both public and individual welfares.

    pdf30p daisy15 31-08-2010 74 6   Download

  • Internet use among children in the EU27 is widespread and growing continually. The results of the Eurobarometer on “Internet safety” conducted in 2005/06 showed that 68% of children (6 to 17 yearsof- age) – in the opinion of one of their parents – had gone online4; this proportion increased to threequarters for this 2008 survey. Nevertheless, the number of children using the Internet varied considerably across Europe. The proportion of parents who thought that their child (6 to 17 years-of-age) used the Internet was the lowest in Italy (45%), Greece and Cyprus (both 50%).

    pdf0p bin_pham 05-02-2013 15 2   Download

  • As senior editor for this text, the responsibility to acknowledge and thank all the individuals who have contributed their expertise, time, energies, and efforts to the successful development of this text falls to me. This is no easy task. It is difficult to put into words the appreciation and gratitude I have for each of their efforts and to express appropriately to each of them my sincere thanks for giving their time and themselves to make this text a better product.

    pdf346p thuylinh 07-09-2009 142 11   Download

  • RFC 2821 is a recent update to the venerable RFC 821, which dates from the early 1980s. It defines the Simple Mail Transfer Protocol or SMTP. It specifies how to send mail round the network. For most people it’s not very interesting, but it does impose some restrictions such as the basic line length limit. Apart from this problem (which Microsoft abuses), most mail systems adhere to SMTP.

    pdf19p vinhnghi 17-08-2009 49 5   Download

  • Key planning considerations for federal agencies include recognizing that the transition is already under way, because IPv6-capable software and equipment already exists in agency networks. Other important agency planning considerations include developing inventories and assessing risks; creating business cases that identify organizational needs and goals; establishing policies and enforcement mechanisms; determining costs; and identifying timelines and methods for transition.

    pdf41p bin_pham 05-02-2013 26 5   Download

  • ADC’s ruggedized simplex and duplex cables provide factory standard guaranteed performance specifications. They are 100% optically tested and are offered with a variety of optical performance levels.

    pdf4p thuyvan 13-08-2009 51 3   Download

  • ADC's tactical cables provide factory standard guaranteed performance specifications. They are 100% optically tested and are offered with a variety of optical performance levels. Features: • 245/900 or 500/900 μm polyester buffer • Flame retardant polyurethane jacket • Survives repeated abuse, tangling and knots in retrieval • Superior abrasion resistance • Excellent performance at extreme temperature • Compatible with all industry standard connectors

    pdf4p thuyvan 13-08-2009 48 3   Download

  • Comorbidity, which signifies the simul- taneous occurrence in a person of two or more disorders, is a topic of consid- erable and growing interest in the context of health care. Research sup- ports the view that a number of men- tal disorders (e.g. depression, anxiety, substance abuse) occur in people suf- fering from both non-communicable and communicable diseases more often than would be expected by chance. And people suffering from chronic physical conditions have a greater probability of developing mental disorders such as depression.

    pdf25p thamgiacongdong 02-05-2013 15 3   Download

  • Archimedes and Sons, Inc. is a developer and distributor of science and mathematics training programs aimed at community colleges and technical schools. Rather than provide CD-ROMs, which the technically-adept students tend to copy prolifically for their friends (thereby depriving A & S of their revenue), the firm provides interactive web-based training to user accounts (which are still abused, but less so).

    pdf1p trungha 28-08-2009 44 2   Download

  • Electronic mail on the Internet has been an important form of communication for some years now. Various methods of securing electronic mail have been suggested (see our overview in section 2.5). One of the solutions that has seen commercial success is S/MIME. A major problem in using S/MIME to secure mail is locating certificates. Clients often support several methods to locate certificates, e.g., from LDAP servers or from white-pages on the Internet.

    pdf33p cao_can 02-01-2013 36 2   Download

  • The EU is considering a proposal to introduce filters for blocking of child abuse websites. European Digital Rights urges the Parliament and Council to rethink these plans. Child abuse and its portrayal on the Internet is a terrible crime that is sometimes of a severity that is scarcely believable. It must be treated seriously, with policies based on evidence and effectiveness and not on politics or gut reactions. We must avoid policies which give Member States the opportunity to adopt cosmetic measures that we have already seen being used as a replacement for real action.

    pdf16p doiroimavanchuadc 06-02-2013 20 3   Download


Đồng bộ tài khoản