Sökresultat

Filtyp

Din sökning på "*" gav 533241 sökträffar

Creating Free Spaces: Self-Segregation in the Radical Left

The ability for groups to engage in collective action depends on a variety of factors, ranging from social organization to resources to political opportunities amongst others. Yet, on a much more basic level, collective action is dependent on the ability of individuals to come together to interact and coordinate action, or in other words, to create a collective. Individuals must have spaces in whi

Rekonstruktion av paleomiljön för området kring den Mesolitiska stenåldersboplatsen vid Sammakko, Norrbotten

En större mängd kvartsavslag och brända ben, upptäckta vid rekognosering (Norrbottens Museum) av hyggesberedda ytor norr om byn Sammakko, c. 40 km SO Gällivare, har tolkats att indikera ett kortvarigt använt boplatsområde. Platsen, liggande c. 100 meter norr Linaälven och i kanten av en nästan igenväxt göl, genomgick arkeologisk förundersökning sommaren 2019. Insamlat material av brända ben och trA large number of quartz fragments from knapping andburnt bone, discovered during reconnaissance (NorrbottensMuseum) of forest-cleared areas north of the villageSammakko, c. 40 km SE of Gällivare, have been interpretedto indicate a short-term used dwelling site. Th esite, located c. 100 meters north of the Linaälven Riverand at the edge of an almost overgrown pond, underwentarchaeological prelimin

Multi-Objective Optimization Using Evolutionary Cuckoo Search Algorithm for Evacuation Planning

Proper emergency evacuation planning is a key to ensuring the safety and efficiency of resources allocation in disaster events. An efficient evacuation plan can save human lives and avoid other effects of disasters. To develop effective evacuation plans, this study proposed a multi-objective optimization model that assigns individuals to emergency shelters through safe evacuation routes during the

From denial of facts to rationalization and avoidance : Ideology, needs, and gender predict the spectrum of climate denial

Climate denial takes many forms, ranging from outright denial of facts (literal denial), over distortion of facts (interpretive denial, e.g., denial of personal and global outcome severity), to the acknowledgement of facts but denial of their implications (implicatory denial, e.g., avoidance, denial of guilt, rationalization of own involvement). This study aimed at furthering the understanding of

Gender, Climate Breakdown and Resistance: The Future of Human Rights in the Shadow of Authoritarianism

In this article we examine the future of human rights by looking at how ‘authoritarianism’, in its multifaceted forms and manifestations, intersects with existing discourses on climate change, environmental protection, populism and ‘gender deviance’. By adopting an intersectional lens, we interrogate the emergence of the right to a healthy environment and reflect on whether it will help against th

Prostate cancer incidence and survival in relation to prostate cancer as second cancer in relatives

OBJECTIVES: To investigate if the risk of prostate cancer (PC) differs based on the order of primary PC diagnosed in first-degree relatives (FDRs) given possibly different risk factors for PC as first primary cancer (PCa-1) and second primary cancer (PCa-2).SUBJECTS AND METHODS: In this Swedish nationwide cohort, PC diagnosis was followed for among 149,985 men with one FDR affected by PCa-1, 10,97

A Security Framework in Digital Twins for Cloud-based Industrial Control Systems: Intrusion Detection and Mitigation

With the help of modern technologies and advances in communication systems, the functionality of Industrial control systems (ICS) has been enhanced leading toward to have more efficient and smarter ICS. However, this makes these systems more and more connected and part of a networked system. This can provide an entry point for attackers to infiltrate the system and cause damage with potentially ca

Deterritorializing Cyber Security and Warfare in Palestine: Hackers, Sovereignty, and the National Cyberspace as Normative

Cyber security strategies operate on the normative assumption that national cyberspace mirrors a country's territorial sovereignty. Its protection commonly entails practices of bordering through infrastructural control and service delivery, as well as the policing of data circulation and user mobility. In a context characterized by profound territorial fragmentation, such as the Occupied Palestini

Toward an Aesthetics by Algorithms—Palestinian Cyber and Digital Spaces at the Threshold of (In)visibility

This chapter explores how algorithms produce aesthetic forms and dystopian configurations across Palestinian cyber and digital spaces. Through surveillance and erasure, algorithms operate as infrastructures of (in)visibility across social media and digital maps. While serving the Israeli system of control by making Palestinian users and contents hyper-visible to surveillance, algorithms ultimately

Annie Marion Maclean : Kvinnan i industrisamhället

För att sociologi skulle kunna vara ett eget ämne och utvecklas behövde det en empirisk ansats. Annie Marion MacLean påbörjade sina doktorandstudier på Chicago universitet 1896. Med över 200 publicerade manuskript var MacLean en pionjär i utvecklingen av Chicagoskolans etnografiska arbete och utvecklingen av både sociologisk arbetslivsforskning och urban sociologi. Hennes arbete är högst relevant