The new GMS contract--a Trojan horse?

نویسندگان

  • Shamini Gnani
  • Allyson M Pollock
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Trojan Horse of Time–Risk Preference Representations

Throughout the management sciences, individuals and organizations compare alternatives with consequences that are risky and unfold over time. This tutorial examines representations of preferences that are sensitive to timing and risk. It reviews the logical foundations of the two major contending representations and finds that each of them is self-contradictory. In particular, properties of pre...

متن کامل

ELT: A Trojan Horse in Disguise?

Many people believe that language teaching is a neutral practice. However, this belief is not without its own opponents. To many scholars, teaching languages cannot be devoid of teaching cultural values of the target language, which tacitly aims at denigrating cultural values of the community of the learners who are learning it. The ultimate purpose of such cultural oppression, according to the...

متن کامل

Quantitative Plausibility of the Trojan Horse Defence against Possession of Child Pornography

A new complexity-based metric has been developed to enable the relative plausibility of competing explanations for the existence of uncontested evidence to be determined quantitatively. This metric has been applied to the case of the Trojan horse defence against the possession of child pornography. Our results demonstrate that the Trojan horse defence in this case cannot be plausibly sustained,...

متن کامل

Transfer Reactions and Trojan Horse Method

It is pointed out that the Trojan-Horse method is a suitable tool to investigate subthreshold resonances. TRANSFER REACTIONS AND TROJAN HORSE METHOD A similarity between cross sections for two-body and closely related three-body reactions under certain kinematical conditions [1] led to the introduction of the Trojan-Horse method [2, 3, 4]. In this indirect approach a two-body reaction

متن کامل

UDC 621.395:004.491.23, DOI:10.2298/CSIS090330027F Trojan horses in mobile devices

This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • The British journal of general practice : the journal of the Royal College of General Practitioners

دوره 53 490  شماره 

صفحات  -

تاریخ انتشار 2003