نتایج جستجو برای: intimidation

تعداد نتایج: 519  

Journal: :P & T : a peer-reviewed journal for formulary management 2011
Matthew Grissinger

544 P&T® • September 2011 • Vol. 36 No. 9 order not be processed until all parties are satisfied that the problem has been resolved. A health care professional’s persistence in communicating a perceived problem, even when he or she faces opposition from experts, can usually prevent an error from reaching patients. Thus, an effective process for handling conflicts involving drug therapy requires...

Journal: :Hellenic journal of cardiology : HJC = Hellenike kardiologike epitheorese 2009
Spyridon D Moulopoulos

T he effect of mental activity on the cardiovascular system has been well known since ancient times. Hippocrates had already observed that “... fear, intimidation, sorrow, anger ...” may lead to palpitations. In his initial report on a “disorder of the breast” William Heberden mentions a “disturbance of the mind” among other incidents triggering angina pectoris attacks. Recent data provide evid...

2007
LINDA SHEPHERD

This study evaluates the effects of adolescent exposure to cross-community violence, intense paramilitary operations, aggression, and intimidation in Northern Ireland. Using publicly available survey data gathered by agencies in Northern Ireland, the research examines the effects of exposure to political violence with focus upon the manner by which adolescents have become politically socialized...

Journal: :Eureka: Social and Humanities 2022

Social parity, in the form of classism creates an environment where students from less privileged backgrounds feel subjugated and disadvantaged by social intimidation. In order to eliminate university classrooms, study proposes potential Ubuntu as a transformative strategy promote system that is free intimidation discriminatory classes aid inequalities. Hence, answers following questions: What ...

2012
Kuljeet Kaur

Inbuilt physical security in wireless networks is not obtainable and unfortunately these are more prone to attacks from intruders. Resources are easily accessible, once an unauthorized access is gained. Paper elucidates numerous attacks which an intruder could use to detect and connect to the wireless network. Focus of the paper is on two technologies Wired Equivalent Privacy (WEP) and IEEE 802...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید