Literatura científica selecionada sobre o tema "Confidential communications – United States – History"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Confidential communications – United States – History".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Confidential communications – United States – History"

1

Glover, Lisa. "Creditworthy: A History of Consumer Surveillance and Financial Identity in America by Josh Lauer". Journal of Intellectual Freedom and Privacy 2, n.º 3-4 (9 de abril de 2018): 33. http://dx.doi.org/10.5860/jifp.v2i3-4.6482.

Texto completo da fonte
Resumo:
In September of 2017 Equifax, one of the three major consumer credit reporting agencies in the United States, announced its system security had been breached and confidential consumer information may have fallen into the hands of hackers. Although reports of system intrusions are released almost daily, this breach was of particular significance: sensitive data, including personal, identifying and financial data, was compromised for an estimated 143 million consumers in the United States. Just this week, Equifax further disclosed another 15 million client records were breached in the United Kingdom. Any consumer who has received credit of any kind is familiar with the big three credit reporting agencies—Equifax, TransUnion, and Experian—as these agencies house the financial identities American consumers. With such vast data stores, credit reporting agencies are prime and potentially profitable targets for hackers. All the information a hacker needs to steal a financial identify of a victim resides in the agencies’ files. Clearly, credit reporting agencies play a critical role in the financial marketplace. How these agencies became the powerful guardians and suppliers of consumer financial information is the topic of Josh Lauer’s book, Creditworthy: A History of Consumer Surveillance and Financial Identity in America. This is the first book authored by Lauer, who is an associate professor of media studies at the University of New Hampshire with specialties in media history and theory, communication technology, consumer and financial culture, and surveillance. Lauer relates in great detail how we moved from a society of relationships and human interaction to one of faceless data designed to symbolize character and reputation. Lauer’s history takes us from a time when Americans desired access to goods and services more than they valued confidentiality, to the financial privacy concerns of these surveillance systems today.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Ferreira, M. Rosario, Nancy C. Dolan, Marian L. Fitzgibbon, Terry C. Davis, Nicolle Gorby, Lisa Ladewski, Dachao Liu et al. "Health Care Provider-Directed Intervention to Increase Colorectal Cancer Screening Among Veterans: Results of a Randomized Controlled Trial". Journal of Clinical Oncology 23, n.º 7 (1 de março de 2005): 1548–54. http://dx.doi.org/10.1200/jco.2005.07.049.

Texto completo da fonte
Resumo:
Purpose Colorectal cancer screening is the most underused cancer screening tool in the United States. The purpose of this study was to test whether a health care provider–directed intervention increased colorectal cancer screening rates. Patients and Methods The study was a randomized controlled trial conducted at two clinic firms at a Veterans Affairs Medical Center. The records of 5,711 patients were reviewed; 1,978 patients were eligible. Eligible patients were men aged 50 years and older who had no personal or family history of colorectal cancer or polyps, had not received colorectal cancer screening, and had at least one visit to the clinic during the study period. Health care providers in the intervention firm attended a workshop on colorectal cancer screening. Every 4 to 6 months, they attended quality improvement workshops where they received group screening rates, individualized confidential feedback, and training on improving communication with patients with limited literacy skills. Medical records were reviewed for colorectal cancer screening recommendations and completion. Literacy level was assessed in a subset of patients. Results Colorectal cancer screening was recommended for 76.0% of patients in the intervention firm and for 69.4% of controls (P = .02). Screening tests were completed by 41.3% of patients in the intervention group versus 32.4% of controls (P = .003). Among patients with health literacy skills less than ninth grade, screening was completed by 55.7% of patients in the intervention group versus 30% of controls (P < .01). Conclusion A provider-directed intervention with feedback on individual and firm-specific screening rates significantly increased both recommendations and colorectal cancer screening completion rates among veterans.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Saarbach, Pascale. "Ecofeminist art in the United States (1970-1980)". Revista de História da Arte e da Cultura 4, n.º 2 (31 de dezembro de 2023): 4–26. http://dx.doi.org/10.20396/rhac.v4i2.18463.

Texto completo da fonte
Resumo:
This article analyzes the emergence of the first ecofeminist artistic practices, as they developed in the 1970s-1980s in the United States. Until recently, the history of ecofeminism was still very confidential, skilfully passed over in silence within the feminist field and virtually unknown in the field of art history. However, the place occupied by artists in the ecofeminist struggle at a very early stage requires us to look back at the history of these pioneering practices in order to clarify their contours and motivations.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Khalidi, Rashid. "The United States and the Palestinians, 1977–2012". Journal of Palestine Studies 42, n.º 4 (2013): 61–72. http://dx.doi.org/10.1525/jps.2013.42.4.61.

Texto completo da fonte
Resumo:
This essay, based on the author’s talk presenting a recent book, Brokers of Deceit: How the U.S. Has Undermined Peace in the Middle East, examines the dynamics of U.S. policy formation on Palestine, mainly through the lens of three “clarifying moments” in the history of U.S. involvement in the Arab-Israeli conflict. The first of these moments concerns efforts to revive and modify the Palestinian autonomy provisions of the 1978 Camp David Accords as an element of the 1982 Reagan Plan. The second examines Israeli-U.S. connivance during 1991–93 Madrid/Washington Palestinian-Israeli negotiations as revealed in confidential documents, and the third focuses on President Barack Obama’s retreat during the second half of his first term from positions staked out earlier. More generally, the essay looks at the underpinnings and continuity of U.S. policy and how it has evolved.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Jayawardena, Hemamal. "AIDS and Professional Secrecy in the United States". Medicine, Science and the Law 36, n.º 1 (janeiro de 1996): 37–42. http://dx.doi.org/10.1177/002580249603600108.

Texto completo da fonte
Resumo:
Objective: To create a legal awareness of AIDS patients' right to privacy among the medical profession. Discussion and recommendations: Doctors should recognize confidentiality as a patient's right, since in most countries the AIDS patient is practically considered a person who is going through a punishment, having no legal rights, rather than a patient suffering from a grave illness. Originally the common law did not recognize the concept of professional secrecy as a right of the patient. It was only regarded as an ethical duty not actionable in court. But with the eruption of diseases such as AIDS, statutes requiring written authorization for the release of confidential information were enacted. A problem with our hospital records is that they are freely available to almost all the staff in the hospitals and sometimes even to outsiders. In the case of AIDS at least, strict measures should be taken to enforce secrecy in relation to all disease-related information such as sexual history, HIV status and CD4 cell counts. The duty to keep medical information confidential is not absolute. An overriding duty towards society, occurs when the benefits of disclosure outweigh its harm. This Utopian argument is even more convincing when an HIV-positive person is acting irresponsibly, engaging in risky behaviour without warning the partner. All persons who have a compelling interest, such as sexual partners, needle sharers, medical and nursing personnel, should be provided with this information. It should also extend to mortuary attendants when the patient dies. A person having a STD has a legal duty to take precautions against transmission. In Berner v. Caldwell (543 So. 2d. 686), the US court held that one who knows or should reasonably know that he has genital herpes is under a duty to abstain from sex or warn others before risky contact. As doctors we should familiarize ourselves now with the concepts and laws regarding patients' rights, without waiting until a malpractice crisis develops to correct ourselves.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Mazza, Michael J. "Is the Internal Forum under Attack? The Status of the Sacramental Seal and the Internal Forum in Church and State in the USA". Jurist: Studies in Church Law and Ministry 80, n.º 1 (2024): 151–96. http://dx.doi.org/10.1353/jur.2024.a929955.

Texto completo da fonte
Resumo:
abstract: In recent years, the sacramental seal and the internal forum have been subjected to numerous attacks in both the mainstream media and in state legislatures. Arguments are made with increasing frequency that "secrecy" has no place in modern society, at least when respecting "confidential communications" means certain heinous crimes may go unreported. Nevertheless, respect for the contents of the internal forum is a long-established principle of morality and canon law, and its importance in the life of the Church cannot be ignored. This article begins with an examination of the current civil laws of the United States respecting confidential communications made to clergy. It then considers the relevant moral and legal principles, including recent and important relevant guidance from the Holy See. Finally, the article concludes with a review of three specific areas in which the balance between sharing necessary information and protecting the internal forum are especially imperative: abuse reporting systems, seminary formation programs, and document retention policies and practices.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Kamali, Sara. "Informants, Provocateurs, and Entrapment: Examining the Histories of the FBI’s PATCON and the NYPD’s Muslim Surveillance Program". Surveillance & Society 15, n.º 1 (28 de fevereiro de 2017): 68–78. http://dx.doi.org/10.24908/ss.v15i1.5254.

Texto completo da fonte
Resumo:
Since September 11, 2001, the U.S. government and police departments across the United States, most notably the New York City Police Department, have been collecting intelligence targeting Muslim American communities. The controversial surveillance practices include the use of confidential informants, undercover operations, and entrapment, and infringing upon civil rights and civil liberties in the name of national security. A decade before 9/11, however, the Federal Bureau of Investigation (FBI) conducted the same practices against a completely different demographic – Christian Right militants, through a program called PATCON, short for Patriot Conspiracy. Building upon the concept of surveillance as social sorting (Lyon 2013) and surveillance and terrorism (Monahan 2013), This article will compare the history of surveillance tactics used by the FBI against Christian Right militants and those used by the NYPD against non-militant Muslim Americans, and assess their implications in the context of civil rights, leaving a legacy of mistrust between these respective groups and the federal government that further undermines the national security interests of the United States.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Coleman, Timothy A., Kevin R. Knupp, James Spann, J. B. Elliott e Brian E. Peters. "The History (and Future) of Tornado Warning Dissemination in the United States". Bulletin of the American Meteorological Society 92, n.º 5 (1 de maio de 2011): 567–82. http://dx.doi.org/10.1175/2010bams3062.1.

Texto completo da fonte
Resumo:
Since the successful tornado forecast at Tinker AFB in 1948 paved the way for the issuance of tornado warnings, the science of tornado detection and forecasting has advanced greatly. However, tornado warnings must be disseminated to the public to be of any use. The Texas tornado warning conferences in 1953 began to develop the framework for a modern tornado warning system and included radar detection of tornadoes, a spotter network, and improved communications between the U.S. Weather Bureau, spotters, and public officials, allowing more timely warnings and dissemination of those warnings to the public. Commercial radio and television are a main source of warnings for many, and the delivery methods on TV have changed much since 1960. NOAA Weather Radio (NWR) was launched after the 1974 Super Outbreak of tornadoes, with the most important feature being the tone alert that allowed receivers to alert people even when the radio broadcast was turned off. Today, NWR reaches most of the U.S. population, and Specific Area Message Encoding technology has improved its warning precision. Outdoor warning sirens, originally designed for use in enemy attack, were made available for use during tornado warnings around 1970. “Storm based” warnings, adopted by the National Weather Service in 2007, replaced countybased warnings and greatly reduce the warning area. As communications advances continue, tornado warnings will eventually be delivered to precise locations, using GPS and other location technology, through cellular telephones, outdoor sirens, e-mails, and digital television, in addition to NWR.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Anggriawan, Rizaldy, Andi Agus Salim, Yordan Gunawan e Mohammad Hazyar Arumbinang. "Passenger Name Record Data Protection under European Union and United States Agreement: Security over Privacy?" Hasanuddin Law Review 8, n.º 2 (30 de julho de 2022): 95. http://dx.doi.org/10.20956/halrev.v8i2.2844.

Texto completo da fonte
Resumo:
Privacy should become a key component in the IT system. It is not something to be considered at last but from the very early stages. Almost no nation has a greater sense of personal data security which could be equivalent to the European level. Since 9/11, the United States has declared to utilize PNR as a method for combating terrorism by associating PNR data with criminal records. Nevertheless, in fact, the majority of data found in the PNR is immense and most of this data is of a confidential nature. The paper used doctrinal legal research methodology utilizing the case and comparative law approach. It elaborates particular cases in relation to data protection issues. It also explores the differences between EU and US law which hinder the idea of data protection in particular on PNR. The study revealed that security is one of the most critical issues which hinder the agreement between the EU and the US on PNR data protection. As the EU promotes the highest standard to the data protection referring to the European community history and GDPR provisions, while the US places national security as a main priority beyond the privacy issues.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Pilkevych, Viktoriia. "USA – UNESCO: THE EVOLUTION OF RELATIONSHIPS". American History & Politics: Scientific edition, n.º 13 (2022): 35–41. http://dx.doi.org/10.17721/2521-1706.2022.13.4.

Texto completo da fonte
Resumo:
The author studies the evolution of relationship between the United States and the United Nations Educational, Scientific and Cultural Organization. It is actual problem in international relation. The history of their communication has gone from active cooperation to disputes. The main achievements in the cooperation between the USA and UNESCO are determined. Author studies the criticism of UNESCO’s activities by the United States. The aim of the article is to analyze the relationship between the United States and UNESCO since the founding of UNESCO to the present. The scientific novelty is first attempt to analyze the history of cooperation between the United States and UNESCO in the context of the evolution of their relations, which include achievements and fails, active participation in the Organization and criticism of UNESCO policy by the United States. The methodological basis of the article is based on the different methodological principles, such as the principle of historicism, systematic. The author used a historical-comparative method to understand changes in relations between the U.S. and the Organization. Special attention was given to the statistical method, which gave information about the number of cultural and natural sites on the UNESCO World Heritage List. Conclusions. Сommunication between the United States and UNESCO has its own page in history, which includes relations since the country participation in the founding of the Organization, ratification of its main conventions, participation in different projects, events, withdrawal by the United States from UNESCO in the 1980s and the return in 2003 to UNESCO, disagreement of the financial policy of the Organization, to criticism of the admission of Palestine to UNESCO, the non-payment of contributions to the budget and the final withdrawal from UNESCO on 31 December 2018.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Teses / dissertações sobre o assunto "Confidential communications – United States – History"

1

So, Dominic K. "Stop Talking about Sorrow: Nixon’s Communications Strategy after Lam Son 719". Chapman University Digital Commons, 2019. https://digitalcommons.chapman.edu/war_and_society_theses/10.

Texto completo da fonte
Resumo:
March 1971 was tough for President Richard Nixon. The American people were tired of the Vietnam War, with many still recovering from the violent anti-war protests of 1970. Congress had just passed an amendment prohibiting U.S. ground troops from operating outside of the borders of South Vietnam. Both the public and secret negotiations with Hanoi were stalled. Confidential channels with Beijing and Moscow about diplomatic initiatives had gone cold. Moreover, Lam Son 719, the joint U.S. and South Vietnamese incursion into Laos that began in February, was turning out to be a failure. The operation, Nixon’s military gamble to prove the success of Vietnamization, would show the opposite—that the South Vietnamese were not ready to take over the fighting from the Americans. Yet, on 7 April 1971, Nixon announced in a television address that “Vietnamization has succeeded,” and that he would accelerate the withdrawal of American troops “because of the achievements of the South Vietnamese operation in Laos.” Many expected Nixon to increase the rate of troop withdrawals no matter the outcome of Lam Son 719. However, instead of being punished at the polls for his lack of credibility, as some in the press were predicting, in 1972, Nixon transfixed the nation with trips to Beijing and Moscow and won re-election by 49 out of 50 states. This thesis mines archival documents from the Nixon Presidential Library, the U.S. media, and television transcripts to explain how and why Nixon re-shaped the story of Lam Son 719 and his Vietnamization policy to persuade a dispirited American people to accept withdrawal from Vietnam. This political comeback, often overshadowed by Watergate, provides unique perspectives on presidential communications.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Sullivan, Nate. "The "Varga Girl" Trials| The struggle between Esquire magazine and the U. S. Post Office, and the appropriation of the pin-up as a cultural symbol". Thesis, University of Nebraska at Kearney, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=1542061.

Texto completo da fonte
Resumo:

Between 1943-46 Esquire magazine and the U.S. Post Office Department engaged in an extraordinary legal battle over the publication's content. Postmaster General Frank C. Walker took particular offense to the Varga Girl, Esquire's most popular pin-up illustration. The series of trials quickly turned into a circus-like spectacle as the press covered the testimonies of a host of high-profile witnesses called in to offer their opinion on the morality of the pin-up. Among the witnesses were H. L. Mencken, suffragist Anna Kelton Wiley, Rev. Peter Marshall, and others. After numerous appeals from both sides, in 1946 the Supreme Court ruled unanimously in favor of Esquire in Hannegan vs. Esquire, Inc. The "Varga Girl" Trials are an important event in American cultural history. They provide a glimpse into the social mores of the World War II era, highlighting deep divisions over issues of gender role construction and sexuality. The trials also had profound implications for postwar America. The Supreme Court's decision sanctioned the pin-up as a socially acceptable symbol. In the early postwar era, the pin-up increasingly came to be perceived as a model of domestic womanhood. In this context, she spoke powerfully to both women and men, informing them of their respective gender roles. The decision also spurred an unprecedented increase in pornographic magazines during the 1950s, and was widely regarded as an indicator of society's acceptance of women as sex objects. An examination of the "Varga Girl" Trials provides an opportunity for the pin-up to be understood in historical context. She is a symbol of traditional gender role construction that has had a far-reaching impact on American culture. Although obscure, the "Varga Girl" Trials have much to say about the American way of life.

Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Krueckeberg, John Christian 1966. "Fighting the fascist option in the Great Depression: Raymond Swing, Dale Carnegie and the cultural history of the specter of fascism in the 1930s' United States". Diss., The University of Arizona, 1997. http://hdl.handle.net/10150/282368.

Texto completo da fonte
Resumo:
American fascism is an underdeveloped topic in American history and it often rests in the pale of narratives focused upon, respectively, American extremism, protest movements, and assimilation processes. This informal dismissal is due, in part, to an historiographical misunderstanding of the work of Raymond Swing. Swing, an intellectual to whom all historians of "native" American fascism have turned, pioneered studies of the fascist tendencies extant in specific organizations and politicians of the 1930s; yet, no study of Swing's antifascist life exists. Unrecognized by the scholars who have appropriated small amounts of Swing's writings is that he changed his definition of fascism over the decade, placing the locus of fascism in three different discursive formations: economic, political, and then cultural. Perceiving American fascism in the early thirties to be more than simply the nationalistic politics of demagogues and their followers, Swing first defined the phenomenon as economic: a calculus of expenditure that tolerated the death of Americans deemed superfluous or dangerous by those who expunged them. In the middle thirties Swing perceived fascism to be the political phenomenon of a dictatorship that operated within the calculus. Swing moved towards a cultural definition of fascism as the United States experienced a "red scare" and Germany and Italy both expanded their territory and supported dictatorships emerging elsewhere. By the end of the decade, Swing committed himself to a definition of fascism as a "culture of barbarism" and he presented it to his radio audience of millions as the antithesis of American culture. He had moved far from his 1933 conception of American culture being inherently fascist. Swing's thought is understandable when considered in its contexts. To understand Swing's biographical context this dissertation places him in the history of his family of reformers and elicits the "progressive" theme to his life story. To understand the context of the Great Depression that informed Swing's changing definitions, this dissertation studies Swing's work in conjunction with the decade's popular culture. Special emphasis is placed upon Dale Carnegie, political films of 1933, and the Federal Theatre Project's, It Can't Happen Here.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Beaty, Bart H. "Good expectations : adaptation and middlebrow literacy". Thesis, McGill University, 1995. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=104369.

Texto completo da fonte
Resumo:
The goal of this thesis is to advance understanding of the ways in which discourses of reading, literacy and culture were used to reify class stratification in mid-twentieth-century America. This project uses the examples of The Reader’s Digest magazine and Classics Illustrated comic books to assess the adaptation and the ideologies surrounding textual form. It examines the efforts of self-proclaimed cultural elites to identify and denigrate middlebrow reading habits through dismissive critiques of texts and audiences as one moment in an on-going historical process of domination and exclusion. These avenues of exploration will reveal the complexity and variance of class definition in a pluralist democracy which, it turns out, are still very much a part of contemporary culture. [Pages 101 and 102 are missing.)
Le but de cette thèse est de faire progresser la connaissance des manières dont les contexts discursifs de la lecture, de l’alphabétisation et de la culture étaient utilisés en Amérique, au milieu du vingtième siècle, afin de réifier la stratification sociale. Des exemples tels que la revue The Reader ‘s Digest et la bande dessinée Classics Illustrated seront utilisés, dans ce projet, pour illustrer l’adaptation et les idéologies autour de la forme textuelle. Cet ouvrage examine comment ceux qui proclamés par eux-mêmes élites culturelles, ont tenté d’identifier et de dénigrer les habitudes de lecture du lecteur moyen par des critiques dédaigneuses des textes et du public, en un procédé historique persistant de domination et d’exclusion. Ces voies d’exploration révèleront la complexité et la diversité des définitions du concept de classes à l’intérieur d’une démocratie pluraliste, lesquelles, somme toute, cotinuent de faire partie intégrante de la culture contemporaine. [Il manque de pages 101 et 102.]
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Callie, Mary Elizabeth. "In NBC we trust: The public interest, hegemony, and the "Today"show, 1952-1958". Diss., The University of Arizona, 2002. http://hdl.handle.net/10150/280158.

Texto completo da fonte
Resumo:
This dissertation considers processes of hegemony, or the construction of consent, in network television marketing practices in the 1950s. Specifically, a case study of the Today show, which premiered in 1952, examines how RCA, and subsidiary network NBC, generated consent for continuing domination of the national television airwaves. In the context of post-World War II concern about the place of the multi-national corporations and the media in American democracy, RCA/NBC constructed its company, programming, and the image of its audience within a nexus of anti-trust, good trust (or legal monopolies/public utilities), and free speech/free press regulations. To understand this regulatory context, the study begins by identifying the deep structural contradictions of liberal democratic capitalism and the political economic conditions which demand that power, privilege, and control be legitimated. These conditions shape rhetorics of common interest through which groups and individuals---empowered by the state with delegated authority---seek to establish and maintain consent. This control is constructed as an exception to the rules of free trade and free speech/press. In the end, the study suggests that processes of hegemony construct market control---and consumer free choice---as natural, preordained, and in the best interests of the public as a whole, while downplaying, denying, or discrediting any other real alternatives or possibilities. The particular findings of this deep historical and case study can inform present day broadcast reform efforts and offer core approaches for re-framing hegemonic corporate rationales.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Cobb, Jeremy Eugene. "Letters from the Communications Zone: Lt. Edwin Best in the Second World War". Digital Commons @ East Tennessee State University, 2006. https://dc.etsu.edu/etd/2235.

Texto completo da fonte
Resumo:
The subject of this paper is the experiences and observations of Lt. Edwin Best of the 618th Ordnance Ammunition Company from 1943 until 1946. This includes time in the United States, England and France. The primary sources for this paper include letters home from Lt. Best and an oral history transcript. Secondary sources have been used to place Lt. Best into the overall context of the war. He made keen observations regarding the level of training before D-Day, comparisons of life in England and the US, from the "communications zone" in Normandy, as a temporary Judge Advocate General officer, and finishing the war in Southern France. Though he may not have been on the front line, or in an HQ, his comments are valuable to the historical record.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Tracy, Jared M. "Perception management in the United States from the great war to the great crash". Diss., Kansas State University, 2011. http://hdl.handle.net/2097/13246.

Texto completo da fonte
Resumo:
Doctor of Philosophy
Department of History
Donald J. Mrozek
This study argues that after World War I, corporate executives continued a strategy of perception management (PM) to control Americans’ choices in the commercial sphere and to shape the economic and cultural landscape of the 1920s. The state used PM on an unprecedented scale in 1917 and 1918 to promote a model of loyal American behavior (as part its effort to manage the mobilized U.S. society), but the use of PM did not end after the Armistice. While many historians have seen wartime propaganda measures as the result of special fears and circumstances tied to a sense of pervasive national emergency, they fail to explain the continuation of comparable methods into the period of peace supposedly characterized by a return to "normalcy." Whereas most historical studies sharply delineate between political propaganda and commercial advertising, this study stresses leaders' continuous use of PM to promote their notions of what constituted typical, normal, even loyal American behavior in times of both war and peace. While not a contemporary term in the early twentieth century, PM offers an appropriate conceptual framework to analyze a deliberate strategy at that time. This study defines it as actions used to convey or deny selected information to audiences to influence their emotions, motives, and objective reasoning, resulting in behaviors and actions favorable to the originators’ objectives. During WWI, policymakers and bureaucrats concealed the state's effort to control people's behavior with claims of defending liberty and democracy. After the war, corporate executives used PM to manufacture consumer demand and encourage Americans to think of themselves foremost as consumers. A cross section of political, economic, and cultural history, Perception Management in the United States from the Great War to the Great Crash offers an original perspective that emphasizes the consistency between the wartime and postwar eras by highlighting leaders' ongoing use of perception management to control Americans' behavior.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

McCool, Lauren Zawistowski. "Religion as a Role: Decoding Performances of Mormonism in the Contemporary United States". Bowling Green State University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1343429819.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Knight, Peter G. "“MacArthur’s Eyes”: reassessing military intelligence operations in the forgotten war, June 1950 - April 1951". The Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=osu1148503207.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Shackelford, Philip Clayton. "On the Wings of the Wind: The United States Air Force Security Service and Its Impact on Signals Intelligence in the Cold War". Kent State University Honors College / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ksuhonors1399284818.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Livros sobre o assunto "Confidential communications – United States – History"

1

Frank, Alvin C. A history of FBI telecommunications, 1930s to 1980s: A vision to the future. [United States?]: A.C. Frank, 2007.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Rice, Paul R. Attorney-client privilege in the United States. 2a ed. [St. Paul, Minn.]: West Group, 1999.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Rice, Paul R. Attorney-client privilege in the United States. Rochester, N.Y. (Aqueduct Bldg., Rochester, N.Y. 14694): Lawyers Cooperative Pub., 1993.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Rice, Paul R. Attorney-client privilege in the United States. 2a ed. St. Paul, MN: West Group, 1999.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

1946-, Walkowiak Vincent S., ed. The attorney-client privilege in civil litigation. 4a ed. Chicago: American Bar Association, 2008.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

1946-, Walkowiak Vincent S., American Bar Association. Tort and Insurance Practice Section. e TIPS Spring Meeting (1989 : Lake Buena Vista, Fla.)., eds. Attorney-client privilege in civil litigation: Protecting and defending confidentiality. 2a ed. Chicago: Tort and Insurance Practice Section, American Bar Association, 1997.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

1960-, Murphy Gregory, Hydrick Blair, University Publications of America, Inc. e United States. Dept. of State., eds. Confidential U.S. State Department central files. Frederick, MD: University Publications of America, 1987.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

1960-, Murphy Gregory, Hydrick Blair, United States. Dept. of State. e University Publications of America (Firm), eds. Confidential U.S. State Department central files. Bethesda, MD: University Publications of America, 1991.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

United States. Dept. of State. e University Publications of America (Firm), eds. Confidential U.S. State Department special files. Frederick, MD: University Publications of America, 1989.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

G, Theoharis Athan, e United States. Federal Bureau of Investigation., eds. Federal Bureau of Investigation confidential files. Bethesda, Md: University Publications of America, 1990.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Capítulos de livros sobre o assunto "Confidential communications – United States – History"

1

Nursey-Bray, Melissa, Robert Palmer, Ann Marie Chischilly, Phil Rist e Lun Yin. "Do Not Forget the Dreaming: Communicating Climate Change and Adaptation, Insights from Australia". In Old Ways for New Days, 91–109. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97826-6_6.

Texto completo da fonte
Resumo:
AbstractIn this chapter, the experience of Indigenous peoples in Australia is explored, and the ways in which they have responded to the challenge of climate change. A wide range of adaptation mechanisms have been implemented which are nonetheless, as in the United States, inextricably connected to an ongoing legacy of colonial invasion. Indigenous adaptation in Australia is more than responding to climate change, but an ever-continuing adaptation to colonial history. The essential role of communications is explored.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

"Psychotherapist-Patient Privilege: The History and Significance of the United States Supreme Court’s Decision in the Case of Jaffee v. Redmond". In Confidential Relationships, 177–206. BRILL, 2003. http://dx.doi.org/10.1163/9789004458727_014.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Pratkanis, Anthony R. "The Social Psychology of Mass Communications: An American Perspective". In States of Mind, 126–60. Oxford University PressNew York, NY, 1997. http://dx.doi.org/10.1093/oso/9780195103502.003.0007.

Texto completo da fonte
Resumo:
Abstract Whether it is the genes of royalty, the ritual of tradition, or the force of a dictator, every society must have a way to make decisions. Early in its history, the United States opted for persuasion-debate, discussion, exhortation, and argument-as a means of deciding which course of collective action to take. Early American institutions promoted persuasion and discourse (Holifield, 1989). For example, in contrast to the elaborate cathedrals of Europe, where elite clergy performed rituals before a distant congregation, colonial churches were small, simple structures with a pulpit placed close to the people; such architecture is ideal for sermons exhorting townsfolk to morality or for a political rally to debate the course of a revolution. Many towns developed around a village green featuring a hall for holding town meetings and a market where consumers could decide the best products to buy. When the new Americans ratified the U.S. Constitution and later the Bill Rights, they ensured that persuasion would remain at the heart of U.S. decision making by guaranteeing freedom of speech, freedom of the press, and the rights of assembly and of petitioning the government. The U.S. government, with its three branches and its two legislative houses, is a system of checks and balances that demands debate, argument, and compromise. The U.S. legal system is adversarial and requires the government to prove, beyond a reasonable doubt, that a crime was committed by a citizen.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Kornbluh, Peter, e William M. LeoGrande. "Opening Cuba—Negotiating History". In The Cuba-U.S. Bilateral Relationship, 17–32. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190687366.003.0002.

Texto completo da fonte
Resumo:
This chapter introduces the reader to the opening with Cuba under the Barack Obama administration. The chapter describes how this opening came about, and the political and diplomatic negotiations that led up to it. Further, the narrative places the historic opening between Presidents Obama and Fidel Castro in a broader historical bilateral context that was not devoid of communications between the two states. The chapter reinforces the notion that the rapprochement between the United States and Cuba was a deliberative process that included a variety of actors. The result of these efforts was a complex diplomatic process that launched hopes of long term diplomatic normalization between the two states.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Howlett, Charles F., e David L. Hostetter. "Defining Struggles". In The Oxford Handbook of Peace History, C44.S1—C44.N55. Oxford University Press, 2022. http://dx.doi.org/10.1093/oxfordhb/9780197549087.013.44.

Texto completo da fonte
Resumo:
Abstract This chapter explores the activist legacy of opposition to war and for positive peace in the United States since World War I. The modernization of ideas and methods for building peace that developed in the twentieth and early twenty-first centuries are assessed. The changing conceptions of pacifism, nonviolence, and conscientious objection, as well as the evolving role of communications technologies as reflected in culture, are examined. The dynamic tension between advocacy for transformative change and efforts for incremental reform in relation to ending war and building peace are analyzed, with attention to the role of gender, race, class, age, and heritage. The influence of peace activism, in its many forms, on policy, its role in restraining militarism and its relationship to broader social change movements are evaluated.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Hardy, Lawrence Harold. "A History of Computer Networking Technology". In Encyclopedia of Multimedia Technology and Networking, Second Edition, 613–18. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch082.

Texto completo da fonte
Resumo:
The computer has influenced the very fabric of modern society. As a stand-alone machine, it has proven itself a practical and highly efficient tool for education, commerce, science, and medicine. When attached to a network—the Internet for example—it becomes the nexus of opportunity, transforming our lives in ways that are both problematic and astonishing. Computer networks are the source for vast amounts of knowledge, which can predict the weather, identify organ donors and recipients, or analyze the complexity of the human genome (Shindler, 2002). The linking of ideas across an information highway satisfies a primordial hunger humans have to belong and to communicate. Early civilizations, to satisfy this desire, created information highways of carrier pigeons (Palmer, 2006). The history of computer networking begins in the 19th century with the invention of the telegraph, the telephone, and the radiotelegraph. The first communications information highway based on electricity was created with the deployment of the telegraph. The telegraph itself is no more than an electromagnet connected to a battery, connected to a switch, connected to wire (Derfler & Freed, 2002). The telegraph operates very straightforwardly. To send a message (electric current), the telegrapher rapidly opens and closes the telegraph switch. The receiving telegraph uses the electric current to create a magnetic field, which causes an observable mechanical event (Calvert, 2004). The first commercial telegraph was patented in Great Britain by Charles Wheatstone and William Cooke in 1837 (The Institution of Engineering and Technology, 2007). The Cooke-Wheatstone Telegraph required six wires and five magnetic needles. Messages were created when combinations of the needles were deflected left or right to indicate letters (Derfler & Freed, 2002). Almost simultaneous to the Cooke-Wheatstone Telegraph was the Samuel F. B. Morse Telegraph in the United States in 1837 (Calvert, 2004). In comparison, the Morse Telegraph was decidedly different from its European counterpart. First, it was much simpler than the Cooke-Wheatstone Telegraph: to transmit messages, it used one wire instead of six. Second, it used a code and a sounder to send and receive messages instead of deflected needles (Derfler & Freed, 2002). The simplicity of the Morse Telegraph made it the worldwide standard. The next major change in telegraphy occurred because of the efforts of French inventor Emile Baudot. Baudot’s first innovation replaced the telegrapher’s key with a typewriter like keyboard. His second innovation replaced the dots and dashes of Morse code with a five-unit or five-bit code—similar to American standard code for information interchange (ASCII) or extended binary coded decimal interchange code (EBCDIC)—he developed. Unlike Morse code, which relied upon a series of dots and dashes, each letter in the Baudot code contained a combination of five electrical pulses. Eventually all major telegraph companies converted to Baudot code, which eliminated the need for a skilled Morse code telegrapher (Derfler & Freed, 2002). Finally, Baudot, in 1894, invented a distributor which allowed his printing telegraph to multiplex its signals; as many as eight machines could send simultaneous messages over one telegraph circuit (Britannica Concise Encyclopedia , 2006). The Baudot printing telegraph paved the way for the Teletype and Telex (Derfler & Freed, 2002). The second forerunner of modern computer networking was the telephone. It was a significant advancement over the telegraph for it personalized telecommunications, bringing the voices and emotions of the sender to the receiver. Unlike its predecessor the telegraph, telephone networks created virtual circuit to connect telephones to one another (Shindler, 2002). Legend credits Alexander Graham Bell as the inventor of the telephone in 1876. He was not. Bell was the first to patent the telephone. Historians credit Italian- American scientist Antonio Meucci as the inventor of the telephone. Meucci began working on his design for a talking telegraph in 1849 and filed a caveat for his design in 1871 but was unable to finance commercial development. In 2002, the United States House of Representatives passed a resolution recognizing his accomplishment to telecommunications (Library of Congress, 2007).
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Hardy, Lawrence Harold. "A History of Computer Networking Technology". In Networking and Telecommunications, 26–32. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-986-1.ch003.

Texto completo da fonte
Resumo:
The computer has influenced the very fabric of modern society. As a stand-alone machine, it has proven itself a practical and highly efficient tool for education, commerce, science, and medicine. When attached to a network—the Internet for example—it becomes the nexus of opportunity, transforming our lives in ways that are both problematic and astonishing. Computer networks are the source for vast amounts of knowledge, which can predict the weather, identify organ donors and recipients, or analyze the complexity of the human genome (Shindler, 2002). The linking of ideas across an information highway satisfies a primordial hunger humans have to belong and to communicate. Early civilizations, to satisfy this desire, created information highways of carrier pigeons (Palmer, 2006). The history of computer networking begins in the 19th century with the invention of the telegraph, the telephone, and the radiotelegraph. The first communications information highway based on electricity was created with the deployment of the telegraph. The telegraph itself is no more than an electromagnet connected to a battery, connected to a switch, connected to wire (Derfler & Freed, 2002). The telegraph operates very straightforwardly. To send a message (electric current), the telegrapher rapidly opens and closes the telegraph switch. The receiving telegraph uses the electric current to create a magnetic field, which causes an observable mechanical event (Calvert, 2004). The first commercial telegraph was patented in Great Britain by Charles Wheatstone and William Cooke in 1837 (The Institution of Engineering and Technology, 2007). The Cooke-Wheatstone Telegraph required six wires and five magnetic needles. Messages were created when combinations of the needles were deflected left or right to indicate letters (Derfler & Freed, 2002). Almost simultaneous to the Cooke-Wheatstone Telegraph was the Samuel F. B. Morse Telegraph in the United States in 1837 (Calvert, 2004). In comparison, the Morse Telegraph was decidedly different from its European counterpart. First, it was much simpler than the Cooke-Wheatstone Telegraph: to transmit messages, it used one wire instead of six. Second, it used a code and a sounder to send and receive messages instead of deflected needles (Derfler & Freed, 2002). The simplicity of the Morse Telegraph made it the worldwide standard. The next major change in telegraphy occurred because of the efforts of French inventor Emile Baudot. Baudot’s first innovation replaced the telegrapher’s key with a typewriter like keyboard. His second innovation replaced the dots and dashes of Morse code with a five-unit or five-bit code—similar to American standard code for information interchange (ASCII) or extended binary coded decimal interchange code (EBCDIC)—he developed. Unlike Morse code, which relied upon a series of dots and dashes, each letter in the Baudot code contained a combination of five electrical pulses. Eventually all major telegraph companies converted to Baudot code, which eliminated the need for a skilled Morse code telegrapher (Derfler & Freed, 2002). Finally, Baudot, in 1894, invented a distributor which allowed his printing telegraph to multiplex its signals; as many as eight machines could send simultaneous messages over one telegraph circuit (Britannica Concise Encyclopedia , 2006). The Baudot printing telegraph paved the way for the Teletype and Telex (Derfler & Freed, 2002). The second forerunner of modern computer networking was the telephone. It was a significant advancement over the telegraph for it personalized telecommunications, bringing the voices and emotions of the sender to the receiver. Unlike its predecessor the telegraph, telephone networks created virtual circuit to connect telephones to one another (Shindler, 2002). Legend credits Alexander Graham Bell as the inventor of the telephone in 1876. He was not. Bell was the first to patent the telephone. Historians credit Italian- American scientist Antonio Meucci as the inventor of the telephone. Meucci began working on his design for a talking telegraph in 1849 and filed a caveat for his design in 1871 but was unable to finance commercial development. In 2002, the United States House of Representatives passed a resolution recognizing his accomplishment to telecommunications (Library of Congress, 2007).
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Mitchell, Peter. "New Worlds for the Donkey". In The Donkey in Human History. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198749233.003.0013.

Texto completo da fonte
Resumo:
One of the signature historical phenomena of the past 500 years has been the global expansion of European societies and their trans-Atlantic offshoots. The mercantile networks, commercial systems, and empires of conquest and colonization that formed the political and economic framework of that expansion involved the discovery and extraction of new mineral and agricultural resources, the establishment of new infrastructures of transport and communication, and the forcible relocation of millions of people. Another key component was the Columbian Exchange, the multiple transfers of people, animals, plants, and microbes that began even before Columbus, gathered pace after 1492, and were further fuelled as European settlement advanced into Africa, Australasia, and the Indian and Pacific Oceans. Donkeys evolved in the Old World and were confined there until the Columbian Exchange was underway. This chapter explores the introduction of the donkey and the mule to the Americas and, more briefly, to southern Africa and Australia. In keeping with my emphasis on seeking archaeological evidence with which to illuminate the donkey’s story, I omit other aspects of its expansion, such as the trade in animals to French plantations on the Indian Ocean islands of Réunion and Mauritius or, on a much greater scale, India to meet the demands of the British Raj. These examples nevertheless reinforce the argument that mules and donkeys were instrumental in creating and maintaining the structures of economic and political power that Europeans and Euro- Americans wielded in many parts of the globe. From Brazil to the United States, Mexico to Bolivia, Australia to South Africa, they helped directly in processing precious metals and were pivotal in moving gold and silver from mines to centres of consumption. At the same time, they aided the colonization of vast new interiors devoid of navigable rivers, maintained communications over terrain too rugged for wheeled vehicles to pose serious competition, and powered new forms of farming. Their contributions to agriculture and transport were well received by many of the societies that Europeans conquered and their mestizo descendants. However, they also provided opportunities for other Native communities to maintain a degree of independence and identity at and beyond the margins of the European-dominated world.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Lovell, Stephen. "Introduction". In How Russia Learned to Talk, 1–20. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780199546428.003.0001.

Texto completo da fonte
Resumo:
The introduction considers the place of the spoken word in Russian history, presenting a pre-history of rhetoric and oratory in Russia before the 1860s. Examples are drawn from sermons, literature, theatre, and the universities, as well as from the political practice of Russia’s rulers. The introduction goes on to explain the significance of public speaking in Russia’s ‘stenographic age’, highlighting the challenges of modern mass politics and communications. It further offers comparisons between Russian political culture and the political culture of Britain, Germany, and the United States, paying particular attention to the place of oratory in the political imagination. It concludes by outlining the structure and rationale of the book.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Monshipouri, Mahmood. "Conclusion". In In the Shadow of Mistrust, 273–96. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197659632.003.0010.

Texto completo da fonte
Resumo:
Abstract This chapter concludes by noting that ending a longstanding and turbulent history of US–Iranian relations since the 1979 revolution requires that Washington and Tehran recognize that it is in their long-term interests to marginalize skeptics by marching forward on the restoration of the nuclear deal. Lack of direct diplomatic communications for the most part of the past four decades has trapped Iran and the United States between past and present, presenting a major barrier to dismantling the wall of distrust between the two countries. Engagement and weakening the impression of Iran as a securitized threat is the way forward.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Confidential communications – United States – History"

1

Van Dyke, Bill, e Tom Dabrowski. "Integrated Approach to Remediatiion of Multiple Uranium Mill Tailing Sites for the US DOE in the Western United States". In ASME 2003 9th International Conference on Radioactive Waste Management and Environmental Remediation. ASMEDC, 2003. http://dx.doi.org/10.1115/icem2003-4834.

Texto completo da fonte
Resumo:
This paper provides a case history of a highly successful approach that was developed and implemented for the U.S. Department of Energy (DOE) for the cleanup and remediation of a large and diverse population of uranium mill tailings sites located in the Western United States. The paper addresses the key management challenges and lessons learned from the largest DOE Environmental Management Clean-up Project (in terms of number of individual clean-up sites) undertaken in the United States. From 1986 to 1996, the Department of Energy’s Grand Junction Projects Office (GJPO) completed approximately 4600 individual remedial action site cleanup projects for large- and small-scale properties, and sites contaminated with residual hazardous and radioactive materials from former uranium mining and milling activities. These projects, with a total value of $597 million, involved site characterization, remedial design, waste removal, cleanup verification, transportation, and disposal of nearly 2.7 million cubic yards of low-level and mixed low-level waste. The project scope included remedial action at 4,200 sites in Grand Junction, Colorado, and Edgemont, South Dakota; 412 sites in Monticello, Utah; and, 44 sites in Denver, Colorado. The projects ranged in size and complexity from the multi-year Monticello Millsite Remedial Action Project, which involved investigations, characterization, remedial design, and remedial action at this uranium millsite along with design of a 2.5 million cubic yard disposal cell, to the remediation and reconstruction of thousands of smaller commercial and residential properties throughout the Southwestern United States. Because these projects involved remedial action at a variety of commercial facilities, businesses, churches, schools and personal residences, and the transportation of the waste through towns and communities, an extensive public involvement program was the cornerstone of an effort to promote stakeholder understanding and acceptance. The Project established a DOE model for rapid, economical, and effective remedial action. During the ten years of the contract, the management operations contractor (Duratek) met all project milestones on schedule and under budget, with no cost growth from the original scope. By streamlining remediation schedules and techniques, ensuring effective stakeholder communications, and transferring lessons learned from one project to the next, the contractor achieved maximum efficiency and the lowest remediation costs of any similar DOE environmental programs at the time.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Prince, Robert E., Victor Magnus e James W. Latham. "Lessons Learned Siting and Successfully Operating Two Large L/ILW Disposal Facilities in the U.S." In ASME 2003 9th International Conference on Radioactive Waste Management and Environmental Remediation. ASMEDC, 2003. http://dx.doi.org/10.1115/icem2003-4835.

Texto completo da fonte
Resumo:
This paper addresses the experience, knowledge, and expertise that Duratek has acquired while performing environmental remediation at two large low-level radioactive waste (LLRW) disposal facilities in the United States. Environmental remediation and related waste disposal has been the company’s primary line of business line since it was founded in 1969. It has disposed of more than half of the low-level radioactive waste generated in the U.S. over the past thirty years, working with almost every radioactive waste generator in the country. That experience has allowed the company to develop a unique understanding of safe, efficient, and cost-effective LLRW disposal methods. The paper also tracks the history of waste disposal technology at the Barnwell Disposal Site in South Carolina and the U.S. Department of Energy Environmental Restoration Disposal Facility (ERDF) at Oak Ridge, Tennessee. In particular, it describes the evolution of trench design, operations, and disposal procedures for these facilities. It also discusses the licensing of one the most active waste disposal sites in the U.S., the success of which has been assured to customers and stake-holders because of: • Well trained personnel who are dedicated to the design, construction and operation of safe and efficient disposal facilities; • Commitment to strong community relations; • Comprehensive knowledge of proven disposal strategies, technologies, and management practices; • Capability and readiness to respond rapidly to routine and emergency situations; • Established record of comprehensive and responsive communications with regulatory authorities; • Commitment to quality, compliance and personnel health, and safety; and • Financial systems that ensure long-term facilities management.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Winter, Daniel T. "An Examination of the Alternative Methods Used by the Investment Casting Industry to Produce Sacrificial Patterns: Have All of the Available Options Been Considered?" In ASME 2009 International Mechanical Engineering Congress and Exposition. ASMEDC, 2009. http://dx.doi.org/10.1115/imece2009-12880.

Texto completo da fonte
Resumo:
The investment casting (IC) process has remained relatively unchanged throughout recorded history [1]. Indeed, there have been refinements to the individual processes required to produce castings; pattern making, the ceramic materials used to create the molds, foundry equipment, and post-cast processing of the castings. All have undergone numerous improvements. Yet, with the innovations that IC foundries have enjoyed, the casting process still requires a one-to-one ratio to produce an IC component from a sacrificial master pattern [2]. It is the alternative technologies used to produce the sacrificial master pattern that are the focus of this paper. New product development and introduction (NPDI) of an IC component requires the expertise of several engineering disciplines. Communications between the various engineering disciplines are critical to assure that cost effective decisions during product design and process development are made. With that in mind, several of the options available to the engineering teams responsible for NPDI are explored in the subsequent text. Rapid prototype (RP) technologies have played a crucial role during NPDI. The patterns produced using the various forms of RP technologies have allowed the IC industry to be considered by design engineers as a viable manufacturing option for their products. A more recent development in the United States is rapid tooling (RT). RT is an additive process, using metal to build the individual layers of the cavity block or the cavity insert. The finished component can then be used as a wax pattern cavity. Engineering teams should also consider a combination of RT and traditional wax pattern tooling. The complex pattern cavities are produced using RT while the more simple components are produced using traditional tooling. For IC foundries to be competitive all available pattern making options must be considered. Multi-disciplined engineering teams will play an important role choosing the technologies discussed. With careful consideration, the engineering teams responsible for NPDI can ensure the future of the IC industry.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia