Horse-Racing in Nineteenth-Century Russia
In: The Slavonic and East European review: SEER, Band 98, Heft 3, S. 464
ISSN: 2222-4327
3326 Ergebnisse
Sortierung:
In: The Slavonic and East European review: SEER, Band 98, Heft 3, S. 464
ISSN: 2222-4327
In: African conflict & peacebuilding review: ACPR, Band 1, Heft 1, S. 152
ISSN: 2156-7263
In: Royal United Services Institution. Journal, Band 1, Heft 2, S. 95-120
Cover -- Volume One -- Half Title -- Title -- Copyright -- Contents -- Reader's Guide to Related Topics and Primary Documents -- Preface -- Introduction -- Chronology -- A-Z Entries -- A -- Administrative Searches -- Alexander, Keith B. (1951-) -- Alien Registration Act -- American Civil Liberties Union (ACLU) -- American Civil Liberties Union v. Clapper (2015) -- American Civil Liberties Union v. National Security Agency (2007) -- Anonymization and De-identification -- Antiwiretapping Statutes -- Arizona v. Evans (1995) -- Ashcroft, John (1942-) -- Automobile Stops and Searches -- B -- Background Checks (Employment and Volunteerism) -- Bamford, James (1946-) -- Banking and Financial Records -- Bartnicki v. Vopper (2001) -- Biometrics -- Boyd v. United States (1886) -- Brandeis, Louis (1856-1941) -- C -- Cable Communications Policy Act of 1984 -- California v. Ciraolo (1986) -- California v. Greenwood (1988) -- Carnivore -- Cellular Phones -- Central Intelligence Agency (CIA) -- Church Committee -- Civil Rights and Liberties during Wartime -- Clapper, James R. (1941-) -- Clapper v. Amnesty International USA (2013) -- Clipper and Capstone Chips -- Cloud Computing -- Communications Assistance for Law Enforcement Act (CALEA) -- Consent Searches -- Constitutional Protections -- Crypto Wars -- D -- Data Brokers -- Data Collection, Online -- Data Mining -- Davis v. Mississippi (1969) -- Deep Packet Inspection (DPI) -- Delaware v. Prouse (1979) -- Douglas, William O. (1898-1980) -- Drones -- Due Process Clause -- E -- Echelon -- Electronic Communications Privacy Act (ECPA) -- Electronic Mail -- Electronic Surveillance -- Encryption -- Espionage Act of 1917 -- E-Verify -- Exclusionary Rule -- Executive Order 9066 -- Executive Order 12333 -- F -- Fair Information Practices -- Federal Bureau of Investigation (FBI) -- Firearms Registration -- Firewalls.
In: Journal of Property Investment & Finance, Band 23, Heft 6, S. 480-493
PurposeThis paper seeks to critically review the conceptual frameworks that have been developed for assessing the impact of information and communications technology (ICT) on real estate.Design/methodology/approachThe research is based on a critical review of existing literature and draws from examples of previous empirical research in the field.FindingsThe paper suggests that a "socio‐technical framework" is more appropriate to examine ICT impact in real estate than other "deterministic" frameworks. Therefore, ICT is an important part of the new economy, but must be seen in the context of a number of other social and economic factors.Research limitations/implicationsThe research is based on a qualitative assessment of existing frameworks, and by using examples from commercial real estate, assesses the extent to which a "socio‐technical" framework can aid understanding of ICT impact.Practical implicationsThe paper is important in highlighting a number of the main issues in conceptualising ICT impact in real estate and also critically examines the emergence of a new economy in the information society within the general context of real estate. The paper also highlights research gaps in the field.Originality/valueThe paper deconstructs the myths of the "death of real estate" and "productivity increase means jobs loss", in relation to office real estate. Finally, it examines some of the ways in which ICT is impacting on real estate and suggests the most important components for a future research agenda in the field of ICT and real estate impact, and will be of value to property investors, facilities managers, developers, financiers, and others.
"The Internet of today is a far cry from its early promise of a decentralized, democratic network of creativity and innovation. In the past decade, the Internet has fallen under the control of a tiny group of massive companies like Apple, Google, and Facebook. In Read Write Own, tech visionary Chris Dixon argues that the dream of an open network for fostering creativity and entrepreneurship doesn't have to die, and that in fact it can, and must, be saved with blockchain networks, which he vitally separates from the currency-based speculation that it is unfortunately lumped together with - a distinction he calls "The Computer vs The Casino". With lucid and compelling prose - and drawing from his first-hand observations, mental models, and experiences over a 25-year career in the Internet industry - Dixon shows how the Internet has undergone three distinct eras, bringing us to the critical moment we're in today. The first act was the "read era," lasting from 1990 to 2005, in which early Internet networks democratized information. In the "read-write era," 2006-2020, corporate networks democratized publishing. And we are now entering the "read-write-own era," sometimes called web3, in which blockchain networks have begun to democratize ownership, granting power and economic benefits to the participants in the network--not just to massive corporations."
Applying sociological and ethnographic research to adult safeguarding for the first time, this book considers how frontline practice is developing, exploring safeguarding adults assessments and multi-agency work. The book is essential reading for those wishing to understand risk management and how current practice can be improved.
In: Oxford Comparative Constitutionalism Ser.
Democratic dysfunction can arise in both 'at risk' and well-functioning constitutional systems. It can threaten a system's responsiveness to both minority rights claims and majoritarian constitutional understandings. Responsive Judicial Review aims to counter this dysfunction.
Applying sociological and ethnographic research to adult safeguarding for the first time, this book considers how frontline practice is developing, exploring safeguarding adults assessments and multi-agency work. The book is essential reading for those wishing to understand risk management and how current practice can be improved.