Resisting Resistance

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

: Resisting History

University Press. All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher, except for reading and browsing via the World Wide Web. Users are not permitted to mount this file on any network servers.

متن کامل

Resisting Explanation

Although explanation is widely regarded as an important concept in the study of rational inquiry, it remains largely unexplored outside the philosophy of science. This, I believe, is not due to oversight as much as to institutional resistance. In analytic philosophy it is basic that epistemic rationality is a function of justification and that justification is a function of argument. Explanatio...

متن کامل

Nurses resisting information technology.

Resistance in the workplace, by nurses, has not been extensively studied from a sociological perspective. In this paper, nurses' resistance to the implementation and use of computer systems is described and analysed, on the basis of semistructured interviews with 31 nurses in three UK NHS hospitals. While the resistance was not "successful", in that it did not prevent the implementation of the ...

متن کامل

Resisting Urges to Self-Injure.

The present study explored whether and how self-injurers attempt to resist urges to harm themselves. Participants were 39 young adults with a history of skin cutting and other non-suicidal self-injurious behaviors. A structured interview assessed the prevalence and perceived helpfulness of 48 methods for resisting self-injurious urges. Ninety percent of participants indicated that they had made...

متن کامل

Resisting Flooding Attacks on AODV

AODV is a reactive MANET routing protocol that is vulnerable to a dramatic collapse of throughput when malicious intruders flood the network with bogus route requests. We introduce a simple mechanism to resist such attacks that can be incorporated into any reactive routing protocol. It does not require expensive cryptography or authentication mechanisms, but relies on locally applied timers and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Annual Review of Cancer Biology

سال: 2017

ISSN: 2472-3428

DOI: 10.1146/annurev-cancerbio-042716-094839