Academic literature on the topic 'Anti-Taxonomy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Anti-Taxonomy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Anti-Taxonomy"

1

Leberknight, Christopher S., Mung Chiang, and Felix Ming Fai Wong. "A Taxonomy of Censors and Anti-Censors." International Journal of E-Politics 3, no. 2 (April 2012): 52–64. http://dx.doi.org/10.4018/jep.2012040104.

Full text
Abstract:
The tug-of-war on the Internet between censor and anti-censor technologies is intensifying. With an aim to raise awareness on Internet censorship and its circumvention, this paper and its companion Part II present a conceptual study of Internet censorship and anti-censorship. This first paper focuses on Internet censorship. It outlines an historical account of censorship through the lens of news coverage in the past decade, and presents a taxonomy of the principles, techniques, and technologies of Internet censorship. The interplay between social, political, and technological factors is presented to highlight the challenges in anti-censorship. Part II of the paper focuses on anti-censorship.
APA, Harvard, Vancouver, ISO, and other styles
2

Highland, Harold Joseph. "AIN'T misbehaving—A taxonomy of anti-intrusion techniques." Computers & Security 14, no. 7 (January 1995): 606. http://dx.doi.org/10.1016/0167-4048(96)81669-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shih, Dong-Her, Po-Ling Sun, David C. Yen, and Shi-Ming Huang. "Taxonomy and survey of RFID anti-collision protocols." Computer Communications 29, no. 11 (July 2006): 2150–66. http://dx.doi.org/10.1016/j.comcom.2005.12.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Leberknight, Christopher S., Mung Chiang, and Felix Ming Fai Wong. "A Taxonomy of Censors and Anti-Censors Part II." International Journal of E-Politics 3, no. 4 (October 2012): 20–35. http://dx.doi.org/10.4018/jep.2012100102.

Full text
Abstract:
This paper presents a conceptual study of Internet anti-censorship technologies. It begins with an overview of previous research on Internet anti-censorship systems and discusses their social, political and technological dimensions. Then for deployed Internet anti-censorship technologies, a taxonomy of their principles and techniques is presented, followed by a discussion of observed trends and implications. Based on the observations, the paper concludes with a discussion on the most critical design features to enable a successful and effective system.
APA, Harvard, Vancouver, ISO, and other styles
5

Jacobson, Robert M., Paul V. Targonski, and Gregory A. Poland. "A taxonomy of reasoning flaws in the anti-vaccine movement." Vaccine 25, no. 16 (April 2007): 3146–52. http://dx.doi.org/10.1016/j.vaccine.2007.01.046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bowles, Paul. "Globalization and Neoliberalism: A Taxonomy and Some Implications for Anti-Globalization." Canadian Journal of Development Studies/Revue canadienne d'études du développement 26, no. 1 (January 2005): 67–87. http://dx.doi.org/10.1080/02255189.2005.9669026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

ALEMANNO, Alberto. "How to Counter Fake News? A Taxonomy of Anti-fake News Approaches." European Journal of Risk Regulation 9, no. 1 (March 2018): 1–5. http://dx.doi.org/10.1017/err.2018.12.

Full text
Abstract:
AbstractFake news is a symptom of deeper structural problems in our societies and media environments. To counter it, policymakers need to take into account the underlying, self-reinforcing mechanisms that make this old phenomenon so pervasive today. Only by taking a step back can we examine the vulnerabilities these fake news narratives exploit. This article provides a first taxonomy of anti-fake news approaches. It argues that proposed anti-fake news laws focus on the trees rather than the forest. As such, they will not only remain irrelevant but also aggravate the root causes fuelling the fake news phenomenon.
APA, Harvard, Vancouver, ISO, and other styles
8

Conlan, Kevin, Ibrahim Baggili, and Frank Breitinger. "Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy." Digital Investigation 18 (August 2016): S66—S75. http://dx.doi.org/10.1016/j.diin.2016.04.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Roffee, James A., and Andrea Waling. "Rethinking microaggressions and anti-social behaviour against LGBTIQ+ youth." Safer Communities 15, no. 4 (October 10, 2016): 190–201. http://dx.doi.org/10.1108/sc-02-2016-0004.

Full text
Abstract:
Purpose The purpose of this paper is to further the understanding of experiences of anti-social behaviour in LGBTIQ+ youth in university settings. Design/methodology/approach The discussion reflects on qualitative interviews with LGBTIQ+ young people studying at university (n=16) exploring their experiences of anti-social behaviour including harassment, bullying and victimisation in tertiary settings. Findings The findings demonstrate that attention should be paid to the complex nature of anti-social behaviour. In particular, LGBTIQ+ youth documented experiences of microaggressions perpetrated by other members of the LGBTIQ+ community. Using the taxonomy of anti-social behaviour against LGBTIQ+ people developed by Nadal et al. (2010, 2011), the authors build on literature that understands microaggressions against LGBTIQ+ people as a result of heterosexism, to address previously unexplored microaggressions perpetrated by other LGBTIQ+ people. Research limitations/implications Future research could seek a larger sample of participants from a range of universities, as campus climate may influence the experiences and microaggressions perpetrated. Practical implications Individuals within the LGBTIQ+ community also perpetrate microaggressions against LGBTIQ+ people, including individuals with the same sexual orientation and gender identity as the victim. Those seeking to respond to microaggressions need to attune their attention to this source of anti-social behaviour. Originality/value Previous research has focused on microaggressions and hate crimes perpetrated by non-LGBTIQ+ individuals. This research indicates the existence of microaggressions perpetrated by LGBTIQ+ community members against other LGBTIQ+ persons. The theoretical taxonomy of sexual orientation and transgender microaggressions is expanded to address LGBTIQ+ perpetrated anti-social behaviour.
APA, Harvard, Vancouver, ISO, and other styles
10

Smith, Daniel A. "Peeling Away the Populist Rhetoric: Toward a Taxonomy of Anti-Tax Ballot Initiatives." Public Budgeting Finance 24, no. 4 (December 2004): 88–110. http://dx.doi.org/10.1111/j.0275-1100.2004.00349.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Anti-Taxonomy"

1

Wu, Shu-Rong, and 吳淑蓉. "A Review and Taxonomy of Anti-collision Protocols for RFID Tag Identification." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/96302614467192480201.

Full text
Abstract:
碩士
華梵大學
工業工程與經營資訊學系碩士班
97
Radio Frequency Identification (RFID) is an automatic identification system for objects, which consists of readers、tags and host application system. A tag has a unique identification number (ID), and a reader communicates with tags which attached to objects over a shared wireless channel for tag identification. When reader interrogates tags within the reader’s range, and multiple tags transmit their IDs simultaneously, the tag-to-reader signals occur collision. Therefore, tag collision disturbs the reader’s identification efficiency. The tag anti-collision protocol is an important issue for fast recognizes objects. This research is major reviewed tag anti-collision protocols that be proposed recently. Tag anti-collision protocols can be grouped into two broad categories:Tree-based protocols and Aloha-based protocols. The research contains thirteen tag anti-collision protocols, seven of them are on the basis of Tree-based protocol, and the others are on the basis of Aloha-based protocol. This research classified these protocols by thier characteristic, and also provides a comparison between reviewed protocols, advantages and shortcomings, and suitable condition for use. This review could provide the basis for developing more efficient and perfect tag anti-collision protocols.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Anti-Taxonomy"

1

Klug, Christian. Quantitative stratigraphy and taxonomy of late Emsian and Eifelian ammonoids of the eastern Anti-Atlas (Morocco). Stuttgart: E. Schweizerbart'sche Verlagsbuchhandlung (Nagele u. Obermiller), 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jex, Aaron R., Rachel M. Chalmers, Huw V. Smith, Giovanni Widmer, Vincent McDonald, and Robin B. Gasser. Cryptosporidiosis. Oxford University Press, 2011. http://dx.doi.org/10.1093/med/9780198570028.003.0053.

Full text
Abstract:
Cryptosporidium species represent a genus of parasitic protozoa (Apicomplexa) that are transmitted via the faecal-oral route and commonly infect the epithelial tissues of the gastric or intestinal (or sometimes the respiratory) tract of many vertebrates, including humans. Infection occurs following the ingestion of viable and resistant oocysts, through direct host-to-host contact or in contaminated food, drinking or recreational water. Infection can be transmitted via anthroponotic (human-to-human, human-to-animal) or zoonotic (animal-to-human or animal-to-animal) pathways, depending upon the species of Cryptosporidium. Although infection can be asymptomatic, common symptoms of disease (cryptosporidiosis) include diarrhoea, colic (abdominal pain), nausea or vomiting, dehydration and/or fever. In humans, cryptosporidial infection in immunocompetent patients is usually short-lived (days to weeks) and eliminated following the stimulation of an effective immune response. However, infection in immunodeficient individuals (e.g., those with HIV/AIDS) can be chronic and fatal (in the absence of immunotherapy), as there are few effective anti-cryptosporidial drugs and no vaccines available. The present chapter provides an account of the history, taxonomy and biology, genomics and genetics of Cryptosporidium, the epidemiology, pathogenesis, treatment and control of cryptosporidiosis and the advances in tools for the identification and characterisation of Cryptosporidium species and the diagnosis of cryptosporidiosis.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Anti-Taxonomy"

1

Taibi, Davide, Valentina Lenarduzzi, and Claus Pahl. "Microservices Anti-patterns: A Taxonomy." In Microservices, 111–28. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31646-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mosespeaslee, Robert. "Superheroes, “Moral Economy,” and the “Iron Cage”." In The Supervillain Reader, 12–25. University Press of Mississippi, 2019. http://dx.doi.org/10.14325/mississippi/9781496826466.003.0002.

Full text
Abstract:
This chapter focuses on the surge of interest in characters that span the gap between the two ethical poles of good and evil, filling the role of the anti-hero or anti-villain, and outlines a brief taxonomy for hermeneutical moral identity. By filtering an Aristotelian conception of morality through the lens of Paul Ricoeur’s philosophical anthropology (with some assistance from J.R.R. Tolkien and Aleksandr Solzhenitsyn along the way), I argue that the external actions of a character must be considered in tandem with their internal self-conception in order to properly categorize their moral identity.
APA, Harvard, Vancouver, ISO, and other styles
3

Cummins, Ian. "Poverty, inequality and contemporary social work." In Poverty, Inequality and Social Work. Policy Press, 2018. http://dx.doi.org/10.1332/policypress/9781447334804.003.0006.

Full text
Abstract:
This chapter examines contemporary social work practice in an era when poverty and inequality have become more deeply entrenched. It first considers the broader current position of social work as it relates to poverty and inequality, which are fundamental issues of social justice and human rights, before discussing R. Lister's taxonomy of the potential ways in which individuals and families respond to living in poverty: ‘getting by’, ‘getting (back) at’, ‘getting out’ and ‘getting organised’. This taxonomy of agency can also be used as the basis for the positioning of anti-poverty social work. The chapter also explores social work approaches to issues of poverty and inequality, as well as the areas of children and families' social work, mental health practice and work with asylum-seekers and refugees as a means of analysing the complex relationship between poverty, social work and social justice.
APA, Harvard, Vancouver, ISO, and other styles
4

Lang, Gerald. "Introduction." In Strokes of Luck, 1–26. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198868507.003.0001.

Full text
Abstract:
The Introduction identifies the 1976 symposium between Bernard Williams and Thomas Nagel as the key moment in the development of the contemporary wide-ranging debate on moral luck. Despite Nagel’s proposal to proceed with an account of luck that can straddle the gap between ethics and epistemology, it is argued that the sort of luck relevant to moral and political philosophy need not be identical with the sort of luck pressed into service by epistemologists. The ‘Lack of Control Account’ of luck will serve adequately for normative issues, even if it leaves theoretical philosophers dissatisfied. Nagel’s familiar taxonomy of types of moral luck is outlined: resultant luck, circumstantial luck, constitutive luck, and causal luck. The treatment of moral luck in this book prescinds from any detailed engagement with issues of free will and responsibility, and also issues of blameworthiness and responsibility. Different views can be taken about these various issues, but the specific challenge of moral luck will still await resolution. That challenge is fundamentally distributive in character, and is typically focused on the apparatus of the pairwise comparison. The anti-luckist programme in normative ethics objects to different assignments of blameworthiness to agents whose acts turn out differently due to luck. The problem here lies with that prior investment in the pairwise comparison. That contention will be pursued across the early chapters of the book.
APA, Harvard, Vancouver, ISO, and other styles
5

Luo, Xin, and Merrill Warkentin. "Developments and Defenses of Malicious Code." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 356–63. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch049.

Full text
Abstract:
The continuous evolution of information security threats, coupled with increasing sophistication of malicious codes and the greater flexibility in working practices demanded by organizations and individual users, have imposed further burdens on the development of effective anti-malware defenses. Despite the fact that the IT community is endeavoring to prevent and thwart security threats, the Internet is perceived as the medium that transmits not only legitimate information but also malicious codes. In this cat-and-mouse predicament, it is widely acknowledged that, as new security countermeasures arise, malware authors are always able to learn how to manipulate the loopholes or vulnerabilities of these technologies, and can thereby weaponize new streams of malicious attacks. From e-mail attachments embedded with Trojan horses to recent advanced malware attacks such as Gozi programs, which compromise and transmit users’ highly sensitive information in a clandestine way, malware continues to evolve to be increasingly surreptitious and deadly. This trend of malware development seems foreseeable, yet making it increasingly arduous for organizations and/or individuals to detect and remove malicious codes and to defend against profit-driven perpetrators in the cyber world. This article introduces new malware threats such as ransomware, spyware, and rootkits, discusses the trends of malware development, and provides analysis for malware defenses. Keywords: Ransomware, Spyware, Anti-Virus, Malware, Malicious Code, Background Various forms of malware have been a part of the computing environment since before the implementation of the public Internet. However, the Internet’s ubiquity has ushered in an explosion in the severity and complexity of various forms of malicious applications delivered via increasingly ingenious methods. The original malware attacks were perpetrated via e-mail attachments, but new vulnerabilities have been identified and exploited by a variety of perpetrators who range from merely curious hackers to sophisticated organized criminals and identify thieves. In an earlier manuscript (Luo & Warkentin, 2005), the authors established the basic taxonomy of malware that included various types of computer viruses (boot sector viruses, macro viruses, etc.), worms, and Trojan horses. Since that time, numerous new forms of malicious code have been found “in the wild.”
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Anti-Taxonomy"

1

Zaimi, Rania, Mohamed Hafidi, and Mahnane Lamia. "Survey paper: Taxonomy of website anti-phishing solutions." In 2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS). IEEE, 2020. http://dx.doi.org/10.1109/snams52053.2020.9336559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wiese, Lena. "Taxonomy-Based Fragmentation for Anti-instantiation in Distributed Databases." In 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing (UCC). IEEE, 2013. http://dx.doi.org/10.1109/ucc.2013.75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Krupalin, Vijjeswarapu Abishek Heyer, G. V. Sriramakrishnan, and T. Daniya. "A Survey and Taxonomy of Anti-Phishing Techniques for Detecting Fake Websites." In 2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA). IEEE, 2022. http://dx.doi.org/10.1109/icirca54612.2022.9985744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Palma, Francis, and Naouel Mohay. "A study on the taxonomy of service antipatterns." In 2015 IEEE 2nd Workshop on Patterns Promotion and Anti-patterns Prevention (PPAP). IEEE, 2015. http://dx.doi.org/10.1109/ppap.2015.7076848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography