Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: ENISA.

Zeitschriftenartikel zum Thema „ENISA“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "ENISA" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Štitilis, Darius, Irmantas Rotomskis, Marius Laurinaitis, Sergiy Nadvynychnyy und Nadiya Khorunzhak. „National cyber security strategies: management, unification and assessment“. Independent Journal of Management & Production 11, Nr. 9 (01.11.2020): 2341. http://dx.doi.org/10.14807/ijmp.v11i9.1431.

Der volle Inhalt der Quelle
Annotation:
Cyber security has become an important issue both on the EU and the national level. Cyber security is now perceived as a part of national security. The newly emerging cyber security policy, comprising national cyber security strategies as an important constituent part, has been recently paid considerable attention. Speaking of national cyber security strategies, a positive thing is that the majority of EU member states have already approved such strategies. However, the approved strategies differ considerably in terms of their content and implementation. The present article aims at identifying reasons for differences in individual national strategies and analyses aspects of their unifications in expectation to find out an optimum balance between the degree of unification and the need to retain differences arising from intrinsic national singularities. To this end, the article analyses the issue of national cyber security on the basis of Lithuania's cyber security strategy as a sample in the context of ENISA good practices for the development of cyber security strategies and by application of ENISA developed KPIs and testing ENISA cyber security strategy evaluation tool. Finally, the article suggests recommendations on further development of national cyber security strategies in terms of their unification and national singularities.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

McKenna, Brian. „ENISA set to join Internet governance debate“. Computer Fraud & Security 2004, Nr. 10 (Oktober 2004): 1. http://dx.doi.org/10.1016/s1361-3723(04)00115-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Samonek, Aleksandra. „What Is the Future of European Cyber Security? Three Principles of European Cooperation and the Hybrid Joint Strategy of Cyber Defence“. Studia Europejskie - Studies in European Affairs 24, Nr. 2 (19.07.2020): 43–60. http://dx.doi.org/10.33067/se.2.2020.3.

Der volle Inhalt der Quelle
Annotation:
The author argues that EU member states should pursue a joint strategy of cyber security and cyber defence. This claim does not immediately imply support for current EU legislation, in particular for enforcing the NIS Directive or the operation of ENISA in its currently planned capacity. Instead, three principles of European cooperation are discussed and followed by a proposal to centre the joint strategic effort around promoting and explicating the practical and procedural consequences of these principles. A bottom-up approach to joining and uniformization of European cyber defence is presented, aligned with the notion of Europeanization in security policy in the sense of E. Gross and R. Ladrech. This approach requires that European cyber security agencies, including ENISA, focus their efforts on addressing the trust defi cit among the member states through facilitating the environment for safe information exchange, instead of communicating with the member states through the medium of regulations and prescribing security standards. More generally, the author postulates that the European authorities embrace the inherent political character of international trust-building and aspire to the role of mediator, as opposed to presenting themselves as apolitical agents focused on the purely technical aspects of European cyber security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Liu, Chiang Lung, Wei Hsiu Chen und Der Kuo Tung. „Identification of Critical Security Issues for Cloud Computing“. Applied Mechanics and Materials 145 (Dezember 2011): 272–76. http://dx.doi.org/10.4028/www.scientific.net/amm.145.272.

Der volle Inhalt der Quelle
Annotation:
Cloud computing is a new service style with many significant advantages and becoming a trend in the world nowadays. Although cloud computing can provide many significant advantages, it also brings us new security problems which present strong barriers for individuals/enterprises to adapt into cloud computing. Including European Network and Information Security Agency (ENISA), many international organizations have issued their reports on the issue of cloud computing security. However, the identification of risks the cloud computing faces also mix with traditional security problems. In this paper, we aim at identifying the critical security issues which are cloud computing-designated. The results of our identification are divided into three categories, namely, policy and organizational, technical, and legal issues, which were adopted by ENISA. We also carefully analyzed the literature on cloud computing security to identify critical cloud computing-designated risk items for each category. Detailed explanations about how the risk items were identified as the critical cloud computing-designated ones are also given to show the adequacy of the proposed identifications. Most of the cloud computing-designated security issues pointed out in this paper is still open and can be taken into consideration for cloud computing service providers when designing a new cloud computing technique.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Wellerdt, Alexander. „Entwicklung eines europäischen Agentur(un)wesens im Energiebinnenmarkt? – Handeln der ACER auf Messers Schneide im Lichte der EuGH-Rechtsprechung“. Europarecht 56, Nr. 3 (2021): 292–306. http://dx.doi.org/10.5771/0531-2485-2021-3-292.

Der volle Inhalt der Quelle
Annotation:
Europäische Agenturen gewinnen an Bedeutung für den Verwaltungsvollzug in der EU. Ihre Befugnisse werden über Konsultationen und Empfehlungen hinaus ausgeweitet. Insbesondere die Ermächtigung der ACER zum Erlass von Leitlinien zur Festlegung von Methoden für nationale Regulierungsbehörden und Übertragungsnetzbetreiber hat Konsequenzen für den Verwaltungsvollzug im Energiebinnenmarkt. Das erscheint im Lichte der Rechtsprechung des EuGHs in den Rechtssachen von Meroni über ENISA bis zu ESMA und im Hinblick auf das institutionelle Gleichgewicht rechtlich grenzwertig.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Popescu, Florin, George Bucăţa und Sorin Pistol. „Quantum Internet and Security of Military Communications“. Land Forces Academy Review 26, Nr. 4 (01.12.2021): 293–98. http://dx.doi.org/10.2478/raft-2021-0038.

Der volle Inhalt der Quelle
Annotation:
Abstract In general, the Internet relies on complex codes to protect information, but hackers are becoming more adept at defeating such systems. These cyberattacks lead to privacy breaches of government officials, as well as large corporations, costing billions of euros per year in total and compromising customer data. According to ENISA reports, these numbers are set to rise. Quantum technology is seen by scientists as a revolutionary replacement for standard encryption techniques.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

ENNS-BRAY, William S., und Kim ROCHAT. „Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance“. International Journal of Information Security and Cybercrime 9, Nr. 2 (30.12.2020): 12–17. http://dx.doi.org/10.19107/ijisc.2020.02.02.

Der volle Inhalt der Quelle
Annotation:
The rapid evolution of information technology over the past 50 years is transforming our healthcare institutions from paper-based organizations into smart hospitals, a term now used by European Union Agency for Cybersecurity (ENISA). These changes are also associated with the systematic reliance on medical devices by both patients and healthcare providers. While these devices have the potential to advance personalized health solutions and improving the quality and efficacy of care, they nevertheless present significant security risks and challenges throughout the healthcare sector.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Андрущак, І., В. Марценюк, I. Андрощук, В. Чудовець und М. Потейчук. „CLOUD COMPUTING AND ANALYSIS FEATURES OF CLOUD INFORMATION SECURITY“. КОМП’ЮТЕРНО-ІНТЕГРОВАНІ ТЕХНОЛОГІЇ: ОСВІТА, НАУКА, ВИРОБНИЦТВО, Nr. 37 (28.12.2019): 5–9. http://dx.doi.org/10.36910/6775-2524-0560-2019-37-1.

Der volle Inhalt der Quelle
Annotation:
The article discusses the current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. The standards, regulations and guidance documents in the field of cloud computing information security are developed and analyzed, developed by the Cloud Security Alliance (CSA), the European Network and Information Security Agency (ENISA) and the National Institute of Standards and Technology (NIST), and the results of a detailed analysis of the issues information security in the cloud.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

ZACHARIS, Alexandros, Eloise JABES, Ifigenia LELLA und Evangelos REKLEITIS. „Cyber Awareness Exercises: Virtual vs On-site Participation & the Hybrid Approach“. International Journal of Information Security and Cybercrime 10, Nr. 2 (29.12.2021): 31–36. http://dx.doi.org/10.19107/ijisc.2021.02.04.

Der volle Inhalt der Quelle
Annotation:
This paper examines the advantages and disadvantages of executing cyber awareness exercises in two different formats: Virtual vs On-site participation. Two EU Agencies, EUSPA and ENISA have organized in the previous years Cyber Awareness exercises; a very important tool to enhance and test the organization's ability to put up resistance and respond to different cyber threats. The objective of this paper is to compare the outcomes of these awareness exercises, executed on-site through physical attendance prior to 2019 and virtually, in a remote setup in 2020, due to the restrictions posed by the pandemic of COVID-19. ENISA in collaboration with EUSPA have accumulated raw and diverse data from the evaluation reports of the cyber events mentioned above. The comparison of these data will focus on the most important success factors of a cyber awareness exercise such as: participation, cooperation (social interaction/teambuilding), effectiveness, fun, tools and identify how the location of the participants affects them. The aim of this work is to highlight through statistical analysis the benefits of a hybrid approach to the exercise’s setup, once combining elements of both virtual and on-site. Depending on the different kind of exercises, such a hybrid setup, will provide more flexibility to an exercise organizer and help maximize effectiveness, while adapting to the fluctuating working regimes of the near future; namely Teleworking. Furthermore, a modular exercise design will be proposed in order to adapt to the location limitations without impacting negatively the rate of the rest of factors analyzed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Martí Pellón, José. „Asimetría informativa y financiación de pymes: el papel de los préstamos participativos“. ICE, Revista de Economía, Nr. 904 (03.09.2018): 71–83. http://dx.doi.org/10.32796/ice.2018.904.6665.

Der volle Inhalt der Quelle
Annotation:
Ante las dificultades de las pymes para financiarse, por los problemas derivados de la existencia de información asimétrica, en este trabajo se describe el papel de los préstamos participativos como alternativa a otros planteamientos de apoyo promovidos desde el sector público. La combinación de características de los recursos propios y de la deuda, unida a una selección cuidadosa de los proyectos, determina un positivo efecto sobre las empresas beneficiarias, que se analiza en el caso de los préstamos participativos concedidos por ENISA. Las empresas beneficiarias crecen más que empresas similares y son capaces de obtener endeudamiento bancario adicional.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Garcia, Bruno. „Information and security in cyberspace: The influence of globalization on the intensification of risks and threats in the last decade“. Ciências e Políticas Públicas / Public Sciences & Policies 7, Nr. 1 (2021): 213–31. http://dx.doi.org/10.33167/2184-0644.cpp2021.vviin1/pp.213-231.

Der volle Inhalt der Quelle
Annotation:
This article provides a brief history of information security, with emphasis on cybersecurity threats and how these are influenced by globalization. A comparative analysis of three different sources is conducted to capture some patterns about this relationship: 1) ENISA reports on cyberthreats, 2) The Global Risks Report, on global threats and the 3) DHLGlobal Connectedness report for globalization indicators. To avoid dispersion, the analysis is circumscribed roughly to the last decade. This report points to an intensification of cyber threats in the last few years, while the globalization indicators suggest a slowdown in global interconnections. A number of hypotheses to explain these patterns are recommended for further research.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Garcia, Bruno. „Informação e Segurança no Ciberespaço: A influência da globalização na intensificação de riscos e ameaças na última década“. Ciências e Políticas Públicas / Public Sciences & Policies 7, Nr. 1 (2021): 193–212. http://dx.doi.org/10.33167/2184-0644.cpp2021.vviin1/pp.193-212.

Der volle Inhalt der Quelle
Annotation:
Este artigo fornece uma breve história da segurança de informação, com ênfase nas ameaças à segurança cibernética e como estas são influenciadas pela globalização. É realizada uma análise comparativa de três fontes diferentes para captar alguns padrões sobre esta relação: 1) relatórios da ENISA sobre ameaças cibernéticas, 2) relatório global de riscos, sobre ameaças globais e 3) relatório DHL – Global Connectedness para indicadores de globalização. Para evitar dispersão, a análise é circunscrita aproximadamente à última década. Este relatório aponta para uma intensificação das ameaças cibernéticas nos últimos anos, enquanto os indicadores de globalização sugerem um abrandamento nas interligações globais. São recomendadas para investigação adicional algumas hipóteses para explicar estes padrões
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Szádeczky, Tamás. „Cybersecurity Authorities and Related Policies in the EU and Hungary“. Central and Eastern European eDem and eGov Days 331 (12.07.2018): 287–99. http://dx.doi.org/10.24989/ocg.v331.24.

Der volle Inhalt der Quelle
Annotation:
Parallel with the evolving of cyber conflicts, the need for appropriate handling of the public administration tasks also appeared. Governmental tasks were necessary, which includes defense (military), diplomatic, law enforcement and public administrative factors also. This paper shows an analysis of the institutional background of cybersecurity administration in the European Union and Hungary in parallel. This includes the regulations about ENISA, the European Union Cybersecurity Agency, the Hungarian cybersecurity authorities, and the cybersecurity strategies for both entities, namely Regulation (EC) No 460/2004, Cybersecurity Strategy of the European Union of 2017, Regulation (EU) 526/2013, COM/2016/0410 final, 2017/0225 (COD) Proposal, Hungarian Government decree no. 223/2009, Government Decision no. 1139/2013, Act L of 2013, and Government Decree 187/2015. The research has been supported by the ÚNKP-17-4-III-NKE-26 New National Excellence Program of the Ministry of Human Capacities.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Smith, Robert. „Reviewer Acknowledgements“. Journal of Education and Training Studies 4, Nr. 3 (28.02.2016): 235. http://dx.doi.org/10.11114/jets.v4i3.1425.

Der volle Inhalt der Quelle
Annotation:
Journal of Education and Training Studies (JETS) would like to acknowledge the following reviewers for their assistance with peer review of manuscripts for this issue. Many authors, regardless of whether JETS publishes their work, appreciate the helpful feedback provided by the reviewers. Their comments and suggestions were of great help to the authors in improving the quality of their papers. Each of the reviewers listed below returned at least one review for this issue. Reviewers for Volume 4, Number 3 Baraka M. Ngussa Betsy Diegel Cassandra Smith Charlotte Alverson Chris Prince Udochukwu Njoku Donna Smith Ebrahim Mohammadpour Enisa Mede Erickzon Astorga Fátima Pereira Hassan Shaaban Laima Kyburiene Lisa Marie Portugal Lorna Enerva Michael Baron Richard H. Martin Wang Kin Chiu Robert Smith Editorial Assistant On behalf of, The Editorial Board of Journal of Education and Training Studies Redfame Publishing 9450 SW Gemini Dr. #99416 Beaverton, OR 97008, USA URL: http://jets.redfame.com
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Singh, Jitendra, und Kamlesh Kumar Raghuvanshi. „Regulations and Standards in Public Cloud“. Journal of Information Technology Research 13, Nr. 3 (Juli 2020): 21–36. http://dx.doi.org/10.4018/jitr.2020070102.

Der volle Inhalt der Quelle
Annotation:
Security is a critical issue particularly in public cloud as it rests with the cloud providers. During security implementation, prevailing security threats and regulatory standards are borne in mind. Regulatory compliance varies from one cloud provider to another according to their maturity and location of the data center. Thus, subscribers need to verify the security requirement meeting their objective and the one implemented by the public cloud provider. To this end, subscribers need to visit each cloud provider's site to view the compliance. This is a time-consuming activity at the same time difficult to locate on a website. This work presents the prominent security standards suggested by the leading security institutions including NIST, CSA, ENISA, ISO, etc., that are applicable to the public cloud. A centrally-driven scheme is proposed in order to empower the subscriber to know the regulation and standards applicable according to their services need. The availability of an exhaustive list at one place will lower the users hassle at subscription time.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Smith, Robert. „Reviewer Acknowledgements“. Journal of Education and Training Studies 4, Nr. 5 (28.04.2016): 262. http://dx.doi.org/10.11114/jets.v4i5.1582.

Der volle Inhalt der Quelle
Annotation:
Journal of Education and Training Studies (JETS) would like to acknowledge the following reviewers for their assistance with peer review of manuscripts for this issue. Many authors, regardless of whether JETS publishes their work, appreciate the helpful feedback provided by the reviewers. Their comments and suggestions were of great help to the authors in improving the quality of their papers. Each of the reviewers listed below returned at least one review for this issue. Reviewers for Volume 4, Number 5 Ardi Marwan Begoña Montero-Fleta Cynthia M. Compton Dodzi Amemado Elena Jerves Enisa Mede Jeyavel Sundaramoorthy John Cowan Katya De Giovanni Laima Kyburiene Mara Carsote Marcie Zaharee Michael Baron Mustafa Çakır Richard Beresford Richard H. Martin Sahar Younes Othman Sandra Kaplan Yerlan Seisenbekov Robert Smith Editorial Assistant On behalf of, The Editorial Board of Journal of Education and Training Studies Redfame Publishing 9450 SW Gemini Dr. #99416 Beaverton, OR 97008, USA URL: http://jets.redfame.com
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Smith, Robert. „Reviewer Acknowledgements“. Journal of Education and Training Studies 4, Nr. 6 (30.05.2016): 241. http://dx.doi.org/10.11114/jets.v4i6.1645.

Der volle Inhalt der Quelle
Annotation:
Journal of Education and Training Studies (JETS) would like to acknowledge the following reviewers for their assistance with peer review of manuscripts for this issue. Many authors, regardless of whether JETS publishes their work, appreciate the helpful feedback provided by the reviewers. Their comments and suggestions were of great help to the authors in improving the quality of their papers. Each of the reviewers listed below returned at least one review for this issue. Reviewers for Volume 4, Number 6 Cynthia M. Compton David A. Compton Donna Smith Elena Jerves Enisa Mede Hoi-yung Leung Intakhab Khan Laima Kyburiene Lorna Enerva Mara Carsote Marcie Zaharee Mustafa Çakır Richard Beresford Richard H. Martin Richard Penny Sahar Younes Othman Torok Marianna Wang Kin Chiu Yerlan Seisenbekov Robert Smith Editorial Assistant On behalf of, The Editorial Board of Journal of Education and Training Studies Redfame Publishing 9450 SW Gemini Dr. #99416 Beaverton, OR 97008, USA URL: http://jets.redfame.com
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

DI FRANCO, Fabio, Konstantinos PAPADATOS und Konstantinos RANTOS. „Re-Visiting Cyber Security Training in the COVID-19 Era“. International Journal of Information Security and Cybercrime 10, Nr. 2 (29.12.2021): 16–20. http://dx.doi.org/10.19107/ijisc.2021.02.02.

Der volle Inhalt der Quelle
Annotation:
Cyber security training, as many other aspects in our lives, has been adapted to address concerns related to travel restrictions and group gatherings resulting from the COVID-19 pandemic. In this context, ENISA, the European Union Agency for Cybersecurity, had to re-visit and significantly modify its already established course on Information Security Management and ICT security, which is provided under the auspices of the European Security and Defence College (ESDC). The program provides public employees the opportunity to gain the necessary knowledge and skills to assume an Information Security Management role. The restructured course was introduced to address the COVID-19 restrictions and has proven to be equally effective to the classroom-delivered course, if not more effective at some parts. This paper presents the main structure of the fully online training, its innovative elements, and the assessment results which prove that COVID-19 pandemic has triggered the introduction of innovative and successful on-line training scenarios.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Meily, Meily. „XYZ Web App Information Security Management Risk Assessment“. ACMIT Proceedings 1, Nr. 1 (18.03.2014): 59–89. http://dx.doi.org/10.33555/acmit.v1i1.19.

Der volle Inhalt der Quelle
Annotation:
Cloud computing is one of the strategic technology trends. It’s pay as you go characteristic and the fact that the service is provided via a broad network, such as a web browser is what makes cloud providers incentivised by profits by providing cloud services, and cloud customers are interested in the chance of eliminating costs that come with in-house service provision. Due to its infrastructure where cloud providers maintain everything cloud customers are wary and concerned about their data and system security. Hence this paper was tries to address and answer cloud customers’ concern on security by doing an overall risk analysis using ENISA framework and Commonwealth of Virginia risk assessment guide on XYZ Web App, an application provided by XYZ Company for the insurance industry that connects insurers, repairers, adjusters and other third parties for claim processing and policy creation. This paper answers all the concerns by resulting it in overall risk summaries, likelihood, impact and overall risk rating that later in used for recommendation to improve XYZ Web App security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Smith, Robert. „Reviewer Acknowledgements“. Journal of Education and Training Studies 4, Nr. 4 (22.03.2016): 295. http://dx.doi.org/10.11114/jets.v4i4.1484.

Der volle Inhalt der Quelle
Annotation:
Journal of Education and Training Studies (JETS) would like to acknowledge the following reviewers for their assistance with peer review of manuscripts for this issue. Many authors, regardless of whether JETS publishes their work, appreciate the helpful feedback provided by the reviewers. Their comments and suggestions were of great help to the authors in improving the quality of their papers. Each of the reviewers listed below returned at least one review for this issue. Reviewers for Volume 4, Number 4 Ardi Marwan Chris Prince Udochukwu Njoku Damodar Khanal David A. Compton Enisa Mede Erickzon Astorga Hoi-yung Leung Jayaluxmi Naidoo John Cowan Laima Kyburiene Lisa Marie Portugal Lorna Enerva Mahmoud Radwan Marieke van der Schaaf Min Gui Mu-hsuan Chou Mustafa Çakır Puneet S. Gill Richard Beresford Richard H. Martin Richard Penny Sahar Younes Othman Sandra Kaplan Seyyedeh Mina Hamedi Torok Marianna Wang Kin Chiu Yerlan Seisenbekov Robert Smith Editorial Assistant On behalf of, The Editorial Board of Journal of Education and Training Studies Redfame Publishing 9450 SW Gemini Dr. #99416 Beaverton, OR 97008, USA URL: http://jets.redfame.com
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Čelik, Petar. „Institutional Measures for Increasing the Cyber Security for Business in the European Union“. Economic Themes 57, Nr. 3 (01.09.2019): 351–64. http://dx.doi.org/10.2478/ethemes-2019-0020.

Der volle Inhalt der Quelle
Annotation:
AbstractNumerous research and analytical studies envisage a new wave of disruptive innovations that will completely change the economic landscape, organization and business models in the short term, as well as ways of managing companies. This wave of innovation, followed by the use of new digital technologies, such as Big Data, mobile applications, social networking, robotics, 3D printing, nanotechnology, quantum informatics, cloud computing, etc., through various forms and modes of cyber vulnerability, contribute to reducing the ability to achieve effective protection, not only for companies and public services, but also for other services available to citizens. The current research preoccupation is focused on finding adequate solutions, in terms of protecting the digital economy and digital business from all modern threats and risks that the modern disruptive technologies carry along with. The thematic focus is on strengthening the institutional and operational capacities of existing and newly-formed specialized agencies, such as: ENISA, EC3 and EUROPOL, in order to provide an integrated institutional response to a wide range of hybrid and cyber threats. The final section of the paper presents an overview of comprehensive strategic, regulatory and institutional approach of the EU to cyber incidents and crises in the digital space.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Mackita, Masky, Soo-Young Shin und Tae-Young Choe. „ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing“. Future Internet 11, Nr. 9 (10.09.2019): 195. http://dx.doi.org/10.3390/fi11090195.

Der volle Inhalt der Quelle
Annotation:
Many companies are adapting cloud computing technology because moving to the cloud has an array of benefits. During decision-making, having processed for adopting cloud computing, the importance of risk management is progressively recognized. However, traditional risk management methods cannot be applied directly to cloud computing when data are transmitted and processed by external providers. When they are directly applied, risk management processes can fail by ignoring the distributed nature of cloud computing and leaving numerous risks unidentified. In order to fix this backdrop, this paper introduces a new risk management method, Enterprise Risk Management for Operationally Critical Threat, Asset, and Vulnerability Evaluation (ERMOCTAVE), which combines Enterprise Risk Management and Operationally Critical Threat, Asset, and Vulnerability Evaluation for mitigating risks that can arise with cloud computing. ERMOCTAVE is composed of two risk management methods by combining each component with another processes for comprehensive perception of risks. In order to explain ERMOCTAVE in detail, a case study scenario is presented where an Internet seller migrates some modules to Microsoft Azure cloud. The functionality comparison with ENISA and Microsoft cloud risk assessment shows that ERMOCTAVE has additional features, such as key objectives and strategies, critical assets, and risk measurement criteria.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Smith, Robert. „Reviewer Acknowledgements“. Journal of Education and Training Studies 3, Nr. 6 (29.10.2015): 298. http://dx.doi.org/10.11114/jets.v3i6.1178.

Der volle Inhalt der Quelle
Annotation:
Journal of Education and Training Studies (JETS) would like to thank the following reviewers for reviewing manuscripts from July 1, 2015, to October 31, 2015. Their comments and suggestions were of great help to the authors in improving the quality of their papers. Many authors, regardless of whether JETS publishes their work, appreciate the helpful feedback provided by the reviewers. Redfame Publishing appreciates the following reviewers’ rigorous and conscientious efforts for this journal. Each of the reviewers listed below returned at least one review during this period. Ardi MarwanBaraka M. Ngussa Betsy Diegel Cassandra Smith Charlotte Alverson Davy Seligin Ebrahim Mohammadpour Ebrahim Rahimi Enisa Mede Greg Rickwood Hassan Shaaban Hoi-yung Leung Jayaluxmi Naidoo Jeyavel Sundaramoorthy John Cowan Leann Stadtlander Leonor Thomson Lisa Marie Portugal Marcie Zaharee Michael Baron Min Gui Mu-hsuan Chou Mustafa Çakır R.-L. Etienne Barnett Richard Beresford Richard H. Martin Richard Penny Sahar Younes Othman Seyed Jalal Abdolmanafi Rokni Seyyedeh Mina Hamedi Vasiliki Brinia Veronica Rosa Wang Kin Chiu Robert Smith Editorial Assistant On behalf of, The Editorial Board of Journal of Education and Training Studies Redfame Publishing 9450 SW Gemini Dr. #99416 Beaverton, OR 97008, USA URL: http://jets.redfame.com
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Smith, Robert. „Reviewer Acknowledgements“. Journal of Education and Training Studies 4, Nr. 1 (07.12.2015): 238. http://dx.doi.org/10.11114/jets.v4i1.1238.

Der volle Inhalt der Quelle
Annotation:
Journal of Education and Training Studies (JETS) would like to acknowledge the following reviewers for their assistance with peer review of manuscripts for this issue. Many authors, regardless of whether JETS publishes their work, appreciate the helpful feedback provided by the reviewers. Their comments and suggestions were of great help to the authors in improving the quality of their papers. Each of the reviewers listed below returned at least one review for this issue. Reviewers for Volume 4, Number 1 Ardi Marwan Betsy Diegel Cassandra Smith Charlotte Alverson Davy Seligin Ebrahim Mohammadpour Ebrahim Rahimi Enisa Mede Greg Rickwood Hassan Shaaban Hoi-yung Leung Jayaluxmi Naidoo Jeyavel Sundaramoorthy John Cowan Leann Stadtlander Leonor Thomson Lisa Marie Portugal Marcie Zaharee Michael Baron Min Gui Mu-hsuan Chou Mustafa Çakır Prof.Baraka M. Ngussa Richard Beresford Richard H. Martin Richard Penny Sahar Younes Othman Seyed Jalal Abdolmanafi Rokni Seyyedeh Mina Hamedi Vasiliki Brinia Veronica Rosa Wang Kin Chiu Robert Smith Editorial Assistant On behalf of, The Editorial Board of Journal of Education and Training Studies Redfame Publishing 9450 SW Gemini Dr. #99416 Beaverton, OR 97008, USA URL: http://jets.redfame.com
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Smith, Robert. „Reviewer Acknowledgements“. Journal of Education and Training Studies 4, Nr. 2 (07.01.2016): 198. http://dx.doi.org/10.11114/jets.v4i2.1291.

Der volle Inhalt der Quelle
Annotation:
Journal of Education and Training Studies (JETS) would like to acknowledge the following reviewers for their assistance with peer review of manuscripts for this issue. Many authors, regardless of whether JETS publishes their work, appreciate the helpful feedback provided by the reviewers. Their comments and suggestions were of great help to the authors in improving the quality of their papers. Each of the reviewers listed below returned at least one review for this issue. Reviewers for Volume 4, Number 2 Ardi Marwan Arlene Kent-Wilkinson Betsy Diegel Cassandra Smith Charlotte Alverson Davy Seligin Ebrahim Mohammadpour Ebrahim Rahimi Enisa Mede Greg Rickwood Hassan Shaaban Hoi-yung Leung Jayaluxmi Naidoo Jeyavel Sundaramoorthy John Cowan Leann Stadtlander Leonor Thomson Lisa Marie Portugal Lorna Enerva Marcie Zaharee Marlo Jackson Michael Baron Min Gui Mu-hsuan Chou Mustafa Çakır Baraka M. Ngussa Richard Beresford Richard H. Martin Richard Penny Sahar Younes Othman Sandra Kaplan Seyed Jalal Abdolmanafi Rokni Seyyedeh Mina Hamedi Vasiliki Brinia Veronica Rosa Wang Kin Chiu Zoi Nikiforidou Robert Smith Editorial Assistant On behalf of, The Editorial Board of Journal of Education and Training Studies Redfame Publishing 9450 SW Gemini Dr. #99416 Beaverton, OR 97008, USA URL: http://jets.redfame.com
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Rajca, Mikołaj. „Problematyka reklamy produktów leczniczych w Internecie – krytyczna analiza“. internetowy Kwartalnik Antymonopolowy i Regulacyjny 5, Nr. 8 (2016): 34–53. http://dx.doi.org/10.7172/2299-5749.ikar.8.5.3.

Der volle Inhalt der Quelle
Annotation:
Advertising medicinal products en bloc generates a great deal of heated debate among professionals of various scientifi c orientations. In spite of this fact, on 2 July 2016, the Polish Minister of Health issued an ordinance summoning a special committee with the objective of preparing certain recommendations and references concerning, among others, advertising of medicinal products, dietary supplements and medical devices. The following article is structured so as to critically asses and analyze the legal framework governing the advertisement of medicinal products, with emphasis on their on-line advertisement. Particular signifi cance is placed on: 1) the issue of pharmaceutical spam, including a discussion of the dangers it poses and the possible responses it can face, including those initiated by EU agencies (ENISA and EMA), and 2) the advertisement of medicinal products on social media (Web 2.0). The discussion provides an in-depth coverage of decisions issued by the Polish Chief Pharmacy Inspectorate (regulatory board; GIF) in relation to medicinal advertising (on-line) and features a brief summary of chosen foreign practices. The analysis also covers the issue of supervision over advertising medicinal products. In the course of the article, the author uses a formal-dogmatic assessment method, operated and supported by the legal theory of law in action, in order to close the article with conclusions and de lege ferenda postulates
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Zhuravel, Mariana. „INCREASING YOUR CYBERSECURITY AWARENESS: UNDERSTANDING CYBERCRIME AND FINDING WAYS TO FIGHT IT“. Legal Ukraine, Nr. 2 (27.02.2020): 14–29. http://dx.doi.org/10.37749/2308-9636-2020-2(206)-2.

Der volle Inhalt der Quelle
Annotation:
Dependency on global cyberspace is rapidly increasing nowadays. Virtual reality generates opportunities for enterprises, governments and individuals; however it also poses significant threats to security on different levels including the national level, whereby key state infrastructures can become a target of cyber attacks. This was seen during the Covid-19 pandemic when the healthcare system in a number of countries experienced cyber threats, which in the example of the Czech Republic, led to severe disruption of the medical processes in a hospital. Thus, cybercrime can cause detrimental effects not only to individuals or business entities, but also to a large group of stakeholders. Infinite cyberspace, the anonymous character of cyber attackers, advances in technology and a lack of cyber security measures in place – these all give cybercrime a sophisticated and aggressive nature and as a result, make us more vulnerable to it. This article will consider different categories of cybercrime, namely, crimes against the person; crimes against property, and crimes against the government, drawing examples from real life cases. This will be followed by an exploration of the methods which should be employed in the fight against cybercrime. In addition, the EU legislative framework will be considered as an example of legal measures against cybercrime. Key words: Internet, cyberspace, cybercrime, cyber attack, cyber threat, cybersecurity, ransomware, cyber terrorism, European Union legal framework, NIS Directive, ENISA, ways.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Kirimov, Tair Nuridinovich. „Historiography of life and creative path of the devotee of the Crimean Tatar literature and enlightenment Y. N. Baiburtlu“. Филология: научные исследования, Nr. 7 (Juli 2021): 84–90. http://dx.doi.org/10.7256/2454-0749.2021.7.36067.

Der volle Inhalt der Quelle
Annotation:
This article gives a brief overview of the life and creative heritage of the figure of Crimean Tatar literature and enlightenment of the early XX century Yahya-Naji Bayburtlu (1876-1943). The author introduces into the scientific discourse the poorly studied biographical and bibliographic archival materials, which include the prewar literary and historiographical texts transliterated from the Arabic script to the Roman script. The article also employs the reminiscences of the relatives and contemporaries of Y. N. Baiburtlu that have been published in modern national press and give a better perspective of the creative path and environment of Y. N. Baiburtlu: the newspaper article of the writer's daughter Niyara Baiburtlu, autobiographical texts of the prominent Crimean Tatar publicistic writer Shamil Alyadinov. The methodological framework is comprised of the biographical, comparative-typological, and meta-critical analysis. The theoretical framework is based on the works of Arslan Krichinsky, Cemil Kermenchikli, Ismail Kerimov, Dmitry Ursu, Natalia Yablonovskaya, Mukhiddin Khairuddinov, Enisa Abibullayeva. Therefore, the overview of the life and literary-enlightenment activity of Y. N. Baiburtlu reveals his creative personality, outlines the prospects for the aspectual research of his biography as a writer and playwright, translator of literary works, public figure, and enlightener of his time. The author believes that the examination of the versatile literary-pedagogical heritage may significantly enrich the scientific representations of the traditions, factors of development and formation of the Crimean Tatar literary elite of the prewar period in Crimea.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

CAMPEAN, Sorana. „The Human Factor at the Center of a Cyber Security Culture“. International Journal of Information Security and Cybercrime 8, Nr. 1 (28.06.2019): 51–58. http://dx.doi.org/10.19107/ijisc.2019.01.07.

Der volle Inhalt der Quelle
Annotation:
With the issuing of the Resolution of 3 October 2017, on the fight against cybercrime, the European Parliament stressed once again that although the awareness about the risk posed by cybercrime has increased, “precautionary measures taken by individual users, public institutions and business, remain wholly inadequate, primarily due to lack of knowledge and resources”. (own emphasis) Consequently, there is a vital need to enable the end-users with easy-to-understand technical terminology, so that the goal becomes to maximise to the greatest extent feasible the human-factor as the strong link at the end of an IP address. Considering also the recent guidelines issued by ENISA on this topic, the paper proposes a simple, easy-to-implement model of a cyber-savvy digital user, as a possible way to approach the overall (mis)interpretation of “the human as the weakest link of cyber security”. Cyber security is often perceived as either belonging to the State or to organizations who can afford to implement it, or it is poorly put in place by small and medium size businesses due to financial constraints. This is, de facto, what is fuelling the perception of human as the weakest link of cyber security. Consequently, cyber security needs more recognition and increased visibility in the European Union. This paper proposes that the best manner to address this is via a human-centered approach to learning, trainings and awareness raising initiatives, tailored to suit all levels of digital literacy and regardless of demographics such as age or level of income.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Szádeczky, Tamás. „Governmental Regulation of Cybersecurity in the EU and Hungary after 2000“. Academic and Applied Research in Military and Public 19, Nr. 1 (2020): 83–93. http://dx.doi.org/10.32565/aarms.2020.1.7.

Der volle Inhalt der Quelle
Annotation:
The term information security evolved to cybersecurity nowadays, which emphasises the interdependence of information assets and the importance of cyber-physical systems. Parallel to this, the need for appropriate management of the EU and government strategies and new public administration tasks also appeared. In the European Union, the first measure concerning this issue was the establishment of the European Union Agency for Network and Information Security (ENISA) in 2004, mostly with consultative tasks. The first official cybersecurity strategy in the EU, called the Open, Safe and Secure Cyberspace, was accepted in 2013. Afterwards, ENISA’s role has been strengthened as well as its range of tasks were broadened. Beside the critical infrastructure protection efforts, the Network Information Security (NIS) directive and related legislation were a giant leap towards a common level of cybersecurity in the community. The formation of an EU Cybersecurity Act and filling NIS with more practical guidance is an ongoing process nowadays. Despite being a post-socialist country, Hungary is in the first line of legislation on cybersecurity in the community. Since 2005 there were several government decrees, from 2009 the first act-level rules on the information security of some governmental services. Based on the National Security Strategy, the National Cybersecurity Strategy was formed in 2013. The same year the first information security act applicable to all government, local government, governmental data processing and critical infrastructure service providers has come into force. The alignment of the National Cybersecurity Strategy to NIS directive happens these days. Thus, the regulation of cybersecurity in the EU and in Hungary are heading in the right direction, but the practical implementation today is far away from the strategic objectives. The community is lagging far behind the United States of America and China, just to mention the most important players in the field.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Esposito, Stephen. „HEL(L)ENISM?“ Classical Review 54, Nr. 2 (Oktober 2004): 453–55. http://dx.doi.org/10.1093/cr/54.2.453.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

PELLINEN, MARKKU J. „Description of a new species of Enispa Walker, 1866 (Lepidoptera: Erebidae, Boletobiinae) from Thailand“. Zootaxa 4272, Nr. 4 (31.05.2017): 587. http://dx.doi.org/10.11646/zootaxa.4272.4.8.

Der volle Inhalt der Quelle
Annotation:
The genus Enispa Walker, 1866, type species: Enispa eosarialis Walker, 1866 [Borneo, Sarawak] (= Micraeschus Butler, 1878, type species: Hyria elataria Walker, 1861 [Sri Lanka]), contains several species, about 20 of which described and many still undescribed, some also probably misplaced. The genus occurs in Indo-Australian tropics and subtropics. Presently there are 5 species known from Borneo, with mention of several undescribed Enispa-like species (Holloway, 2009). From Thailand there are 8 species illustrated in Kononenko & Pinratana's (2013) book, 5 of which unidentified and some others, based on specimens originated from present author, which most probably are not Enispa. Nielsen & al. (1996) mentioned 7 species in Australia.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Hached, Khaled, Perrine Goguet, Sophie Charrasse, Suzanne Vigneron, Maria P. Sacristan, Thierry Lorca und Anna Castro. „ENSA and ARPP19 differentially control cell cycle progression and development“. Journal of Cell Biology 218, Nr. 2 (09.01.2019): 541–58. http://dx.doi.org/10.1083/jcb.201708105.

Der volle Inhalt der Quelle
Annotation:
Greatwall (GWL) is an essential kinase that indirectly controls PP2A-B55, the phosphatase counterbalancing cyclin B/CDK1 activity during mitosis. In Xenopus laevis egg extracts, GWL-mediated phosphorylation of overexpressed ARPP19 and ENSA turns them into potent PP2A-B55 inhibitors. It has been shown that the GWL/ENSA/PP2A-B55 axis contributes to the control of DNA replication, but little is known about the role of ARPP19 in cell division. By using conditional knockout mouse models, we investigated the specific roles of ARPP19 and ENSA in cell division. We found that Arpp19, but not Ensa, is essential for mouse embryogenesis. Moreover, Arpp19 ablation dramatically decreased mouse embryonic fibroblast (MEF) viability by perturbing the temporal pattern of protein dephosphorylation during mitotic progression, possibly by a drop of PP2A-B55 activity inhibition. We show that these alterations are not prevented by ENSA, which is still expressed in Arpp19Δ/Δ MEFs, suggesting that ARPP19 is essential for mitotic division. Strikingly, we demonstrate that unlike ARPP19, ENSA is not required for early embryonic development. Arpp19 knockout did not perturb the S phase, unlike Ensa gene ablation. We conclude that, during mouse embryogenesis, the Arpp19 and Ensa paralog genes display specific functions by differentially controlling cell cycle progression.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Furrer, Albert. „News from ENSA“. Neutron News 9, Nr. 1 (Januar 1998): 43–44. http://dx.doi.org/10.1080/10448639808232015.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Lebech, Bente. „ENSA reports on the 9th meeting of the ENSA committee“. Neutron News 9, Nr. 4 (Januar 1998): 10–11. http://dx.doi.org/10.1080/10448639808233469.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Kumm, Elena J., Oliver Pagel, Stepan Gambaryan, Ulrich Walter, René P. Zahedi, Albert Smolenski und Kerstin Jurk. „The Cell Cycle Checkpoint System MAST(L)-ENSA/ARPP19-PP2A is Targeted by cAMP/PKA and cGMP/PKG in Anucleate Human Platelets“. Cells 9, Nr. 2 (18.02.2020): 472. http://dx.doi.org/10.3390/cells9020472.

Der volle Inhalt der Quelle
Annotation:
The cell cycle is controlled by microtubule-associated serine/threonine kinase-like (MASTL), which phosphorylates the cAMP-regulated phosphoproteins 19 (ARPP19) at S62 and 19e/α-endosulfine (ENSA) at S67and converts them into protein phosphatase 2A (PP2A) inhibitors. Based on initial proteomic data, we hypothesized that the MASTL-ENSA/ARPP19-PP2A pathway, unknown until now in platelets, is regulated and functional in these anucleate cells. We detected ENSA, ARPP19 and various PP2A subunits (including seven different PP2A B-subunits) in proteomic studies of human platelets. ENSA-S109/ARPP19–S104 were efficiently phosphorylated in platelets treated with cAMP- (iloprost) and cGMP-elevating (NO donors/riociguat) agents. ENSA-S67/ARPP19-S62 phosphorylations increased following PP2A inhibition by okadaic acid (OA) in intact and lysed platelets indicating the presence of MASTL or a related protein kinase in human platelets. These data were validated with recombinant ENSA/ARPP19 and phospho-mutants using recombinant MASTL, protein kinase A and G. Both ARPP19 phosphorylation sites S62/S104 were dephosphorylated by platelet PP2A, but only S62-phosphorylated ARPP19 acted as PP2A inhibitor. Low-dose OA treatment of platelets caused PP2A inhibition, diminished thrombin-stimulated platelet aggregation and increased phosphorylation of distinct sites of VASP, Akt, p38 and ERK1/2 MAP kinases. In summary, our data establish the entire MASTL(like)–ENSA/ARPP19–PP2A pathway in human platelets and important interactions with the PKA, MAPK and PI3K/Akt systems.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Crovetto, Angel. „La IA y la ciudadanía digital“. Futuro Hoy 2, Nr. 2 (30.06.2021): 47–49. http://dx.doi.org/10.52749/fh.v2i2.10.

Der volle Inhalt der Quelle
Annotation:
Los avances tecnológicos en el campo de la Inteligencia Artificial ponen al debate la capacidad de ejercer, de forma efectiva, la ciudadanía digital. El propósito de este artículo es brindar una línea de reflexión sobre los problemas éticos y de ciudadanía digital entorno a la nueva Estrategia Nacional de Inteligencia Artificial (ENIA) propuesta por el Estado Peruano, para ello hemos estudiado al detalle la ENIA identificando las posibles oportunidades de mejora de la Estrategia. Finalmente consideramos que la propuesta de la ENIA contribuye al debate poniendo en relevancia la necesidad de promover la ciudadanía digital.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Regina, Maja. „Intervju z Eniso Murgić, udeleženko programa Začetna integracija priseljencev (ZIP)“. Andragoška spoznanja 21, Nr. 3 (28.10.2015): 81–84. http://dx.doi.org/10.4312/as.21.3.81-84.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Martin, Hélène. „Nicole Van Enis : Féminismes pluriels“. Nouvelles Questions Féministes 33, Nr. 2 (2014): 121. http://dx.doi.org/10.3917/nqf.332.0121.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Furrer, Albert. „ENSA holds its eighth meeting“. Neutron News 9, Nr. 3 (Januar 1998): 4. http://dx.doi.org/10.1080/10448639808233452.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Lebech, Bente. „ENSA Committee holds tenth meeting“. Neutron News 10, Nr. 3 (Januar 1999): 12–13. http://dx.doi.org/10.1080/10448639908233680.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Paziak-Doma�ska, Beata. „Zagro�enia mikrobiologiczne �ywno�ci“. PRZEMYS� SPO�YWCZY 1, Nr. 1 (05.01.2015): 15–19. http://dx.doi.org/10.15199/65.2015.1.3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Keser, Prof Dr Hafize. „Message from editor“. International Journal of Learning and Teaching 9, Nr. 4 (10.11.2017): 410. http://dx.doi.org/10.18844/ijlt.v9i4.2657.

Der volle Inhalt der Quelle
Annotation:
Dear Readers,It is the great honor for us to publish 9th volume, 4th issue of International Journal of Learning and Teaching.International Journal of Learning and Teaching (IJLT) is an international and multi-disciplinary which aims to provide a platform for the publication of the most advanced scientific research in the areas of learning, development, instruction and teaching. The journal welcomes original empirical investigations. The papers may represent a variety of theoretical perspectives and different methodological approaches. They may refer to any age level, from infants to adults and to a diversity of learning and instructional settings, from laboratory experiments to field studies. The major criteria in the review and the selection process concern the significance of the contribution to the area of learning and teaching. IJLT covers all aspects of education; trends in education, the emerging and educational settings, instructional design, learning-teaching methods and applications, instructional multimedia, new education environments, theoretical principles, assessment and evaluation and related fields.A total number of thirteen (13) manuscripts were submitted for this issue and each paper has been subjected to double-blind peer review process by the reviewers specialized in the related field. At the end of the review process, a total number of four (4) high quality research papers were selected and accepted for publication.Aim of this issue is to give the researchers an opportunity to share the results of their academic studies. There are different research topics discussed in the articles. For example, Enisa Mede, Gulcin Cosgun and Derin Atay carried out a qualitative study in order to find out and compare the speaking techniques that are used by native (NESTs) and non-native (NNESTs) instructors of English Preparatory Programs at universities around Turkey. They concluded that there are both similarities and differences among NESTs and NNESTs about implementing various techniques in EFL speaking classes. Nevertheless, Azhar Mahmood and Irshad Hussain aimed to find out the relationship between teacher empowerment and principal effectiveness in secondary schools of Islamabad and figured out that there are significant relationships between teacher empowerment and principal effectiveness. In addition, Remziye Ergul examined the problem-solving skills of teachers and showed that teachers were partially successful to solve the two-variables problem, but they failed to solve the three-variables problem. Finally, R. Vinothkanna, V. Swetha Reddy and M. Saritha Reddy conducted a study in order to intellectualize undergraduate education as a process of improving students along the path from novice towards proficient understanding within a given discipline.The topics of the next issue will be different. You can make sure that we will be trying to serve you with our journal with a rich knowledge in which different kinds of topics are discussed in 2017 Volume.I would like to present many thanks to all the contributors who helped to publish this issue.Best regards,Assoc. Prof. Dr. Olga PilliEditor – in Chief
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

POLAT-, Ali. „BİR EDEBİ ŞAHSİYET OLARAK ENİS BATUR“. Journal of Academic Social Sciences 100, Nr. 100 (2020): 352–71. http://dx.doi.org/10.29228/asos.37403.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Richter, D. „ENSA collaborates with European Science Foundation“. Neutron News 6, Nr. 3 (Januar 1995): 12–13. http://dx.doi.org/10.1080/10448639508217692.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Llanos, Renán Quispe, Rofilia Ramírez Ramírez, Martha Tizón Palacios, Claudio Flores Flores, Alfredo Borda-Olivas, Roger Araujo Castillo, Juan Guanira, Risof Solis Condor, Manuel Catacora Villasante und Yamilée Hurtado-Roca. „Health Survey in a Peruvian health system (ENSSA)“. Revista de Saúde Pública 53 (26.03.2019): 33. http://dx.doi.org/10.11606/s1518-8787.2019053001135.

Der volle Inhalt der Quelle
Annotation:
OBJECTIVE: To report the design, methodology and initial results of the National Socioeconomic Survey of Access to Health of the EsSalud Insured. RESULTS: There were interviews in 25,000 homes, surveying 79,874 people, of which 62,659 were affiliated to EsSalud. The insured people are mainly males (50.6%) with a higher technical education level (39.7%). The insured population has mostly independent (95.0%) and own (68.1%) home. Only 34.5% of the insured practice some sport or physical exercise; 14.0% of the population suffers from a chronic disease; 3.5% have diabetes; and 7.1%, arterial hypertension. In the last three months, 35.4% of the members needed medical attention; of these, only 73.1% received health care and the remaining 10.9% were treated in pharmacies or non-formal health care services. RESULTS: The 25,000 homes were interviewed, surveying 79,874 people, of which 62,659 were affiliated to EsSalud. The insured people are mainly males (50.6%) with a higher technical education level (39.7%). The insured population has mostly independent (95.0%) and own (68.1%) home. Only 34.5% of the insured practice some sport or physical exercise; 14.0% of the population suffers from a chronic disease; 3.5% have diabetes; and 7.1%, arterial hypertension. In the last three months, 35.4% of the members needed medical attention; of these, only 73.1% received health care and the remaining 10.9% were treated in pharmacies or non-formal health care services. CONCLUSIONS: This survey is the first performed in the population of EsSalud affiliates, applied at the national level, and has socio-economic and demographic data of the insured, their distribution, risk factors of health, prevalence of health problems and the degree of access to health services.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Tang, Shixing, Mahtab Moayeri, Zhaochun Chen, Harri Harma, Jiangqin Zhao, Haijing Hu, Robert H. Purcell, Stephen H. Leppla und Indira K. Hewlett. „Detection of Anthrax Toxin by an Ultrasensitive Immunoassay Using Europium Nanoparticles“. Clinical and Vaccine Immunology 16, Nr. 3 (07.01.2009): 408–13. http://dx.doi.org/10.1128/cvi.00412-08.

Der volle Inhalt der Quelle
Annotation:
ABSTRACT We developed a europium nanoparticle-based immunoassay (ENIA) for the sensitive detection of anthrax protective antigen (PA). The ENIA exhibited a linear dose-dependent pattern within the detection range of 0.01 to 100 ng/ml and was approximately 100-fold more sensitive than enzyme-linked immunosorbent assay (ELISA). False-positive results were not observed with serum samples from healthy adults, mouse plasma without PA, or plasma samples collected from mice injected with anthrax lethal factor or edema factor alone. For the detection of plasma samples spiked with PA, the detection sensitivities for ENIA and ELISA were 100% (11/11 samples) and 36.4% (4/11 samples), respectively. The assay exhibited a linear but qualitative correlation between the PA injected and the PA detected in murine blood (r = 0.97731; P < 0.0001). Anthrax PA was also detected in the circulation of mice infected with spores from a toxigenic Sterne-like strain of Bacillus anthracis, but only in the later stages of infection. These results indicate that the universal labeling technology based on europium nanoparticles and its application may provide a rapid and sensitive testing platform for clinical diagnosis and laboratory research.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Dyachenko, Tatyana A. „The development of the oriental plot in the ballad by Lokhvitskaya “Enis-el-Jellis”“. Philological Sciences. Scientific Essays of Higher Education, Nr. 2 (März 2021): 64–68. http://dx.doi.org/10.20339/phs.2-21.064.

Der volle Inhalt der Quelle
Annotation:
The article discusses the development of the oriental plot in the ballad by Lokhvitskaya “Enis-el-Jellis”. The ballad is a poetic version of the literary novel of Lokhvitskaya and Balmont. The depiction of elements of traditional architecture, the realities of life, the description of the appearance of the lyrical heroine in the spirit of sophisticated oriental lyrics, the use of the motif of bliss make it possible to put the sensual world of the poetess’s experiences in a space of oriental exoticism. According to many biographers, the central image of the work — the slave Enis el-Jellis — this is Lokhvitskaya “dressed up” in the eastern beauty. Playing this role the poetess openly expresses her romantic feelings. Much attention is given to the color system of the ballad. The following colors belong to the image of the slave: scarlet, gold, blue / gray, which create positive connotations and consolidate the link “Enis el Jellis — colorfulness — life”. With the lover of the lyrical heroine — the knight — only two colors are associated: the black color of the night and the white color of his horse, which makes a double impression. In addition, the work notes the static and dynamic discription of the main images of the ballad.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

ONGUN, Durmuş. „Metinlerarasılık Bağlamında Enis Akın’ın Dağdaki Emirler’ine Bakış“. Akademik Dil ve Edebiyat Dergisi 5, Nr. 2 (30.08.2021): 56–65. http://dx.doi.org/10.34083/akaded.938316.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

García-Blanco, Natalia, Alicia Vázquez-Bolado und Sergio Moreno. „Greatwall-Endosulfine: A Molecular Switch that Regulates PP2A/B55 Protein Phosphatase Activity in Dividing and Quiescent Cells“. International Journal of Molecular Sciences 20, Nr. 24 (10.12.2019): 6228. http://dx.doi.org/10.3390/ijms20246228.

Der volle Inhalt der Quelle
Annotation:
During the cell cycle, hundreds of proteins become phosphorylated and dephosphorylated, indicating that protein kinases and protein phosphatases play a central role in its regulation. It has been widely recognized that oscillation in cyclin-dependent kinase (CDK) activity promotes DNA replication, during S-phase, and chromosome segregation, during mitosis. Each CDK substrate phosphorylation status is defined by the balance between CDKs and CDK-counteracting phosphatases. In fission yeast and animal cells, PP2A/B55 is the main protein phosphatase that counteracts CDK activity. PP2A/B55 plays a key role in mitotic entry and mitotic exit, and it is regulated by the Greatwall-Endosulfine (ENSA) molecular switch that inactivates PP2A/B55 at the onset of mitosis, allowing maximal CDK activity at metaphase. The Greatwall-ENSA-PP2A/B55 pathway is highly conserved from yeast to animal cells. In yeasts, Greatwall is negatively regulated by nutrients through TORC1 and S6 kinase, and couples cell growth, regulated by TORC1, to cell cycle progression, driven by CDK activity. In animal cells, Greatwall is phosphorylated and activated by Cdk1 at G2/M, generating a bistable molecular switch that results in full activation of Cdk1/CyclinB. Here we review the current knowledge of the Greatwall-ENSA-PP2A/B55 pathway and discuss its role in cell cycle progression and as an integrator of nutritional cues.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie