Showing 61 - 80 results of 209 for search 'conclusion secure code', query time: 0.08s Refine Results
  1. 61

    The Effectiveness of Trauma-Aware Parenting Intervention on Relationship between Attachment and Emotional Disturbance in Adoptive Families by Mehrana Mehrana, Mansoureh Bahramipour Isfahani

    Published 2024-08-01
    “…These mentioned characteristics are also the characteristics of people with a secure attachment style who, in their internal activation patterns and others, reach the cognitive conclusion that they are valuable and worth being cared for, and that others (here, adoptive parents) are caring and responsive people. …”
    Get full text
    Article
  2. 62
  3. 63

    Peculiarities and procedure for interrogation of a witness by a notary public by Ju. V. Kaiser

    Published 2025-03-01
    “…The article provides a correlation between the provisions of the Fundamentals of Legislation on Notaries dated February 11, 1993, which establish the possibility for a notary to interrogate a witness in order to give such testimony evidentiary value in resolving civil disputes in court, and the norms of the Civil Procedure Code of the Russian Federation, the Arbitration Procedure Code of the Russian Federation on securing evidence by the court. …”
    Get full text
    Article
  4. 64

    Challenges and management of venomous bites and scorpion stings in Lebanon: a qualitative study by Kamil Kadi, Tharwat El-Zahran, Mario Badr, Mohammad Mdaihly, Nesrine Ahmad, Atika Berri, Michelle E. E. Bauer, Samar Al-Hajj

    Published 2025-06-01
    “…Healthcare providers often resorted to illicit channels to secure antivenom due to stock shortages, while victims sometimes relied on traditional treatment methods. …”
    Get full text
    Article
  5. 65

    Healthcare workers’ mental health during the COVID-19 pandemic: a qualitative analysis of a text message-based NHS workforce support line by Richard Powell, Lisa Jane Gould, Eleanor Angwin, Emma Lawrance

    Published 2024-10-01
    “…Pseudorandom sampling of scripts of anonymised text message conversations between HCWs and Shout Volunteers from April 2020 to March 2021 was undertaken, with data fully anonymised by Shout before researchers accessed them on a secure purpose-built platform. Following application of exclusion and inclusion criteria, 60 conversations were coded to develop a thematic framework and analysed using grounded theory, with subthemes triangulated to create final themes. …”
    Get full text
    Article
  6. 66

    Risk of myocardial infarction and stroke following bloodstream infection: a population-based self-controlled case series by Ashley Akbari, Haroon Ahmed, Jonathan Underwood, Victoria Best, Nicola Reeve

    Published 2025-03-01
    “…MI and stroke were determined from International Classification of Disease Version 10 coded admissions. Predefined risk periods after BSI were compared with the baseline period using pseudo-Poisson regression adjusted for age. …”
    Get full text
    Article
  7. 67

    ABUSE OF CRIMINAL LEGAL NORMS DURING THE REALIZATION OF RESPONSIBILITY FOR VIOLATION THE SAFETY RULES IN THE PRODUCTION OF WORKS AND RENDERING OF SERVICES by M. V. Bavsun, I. A. Beletskiy

    Published 2018-10-01
    “…The possibility of applying criminal law to the detriment of the pro-tected interests of citizens and in violation of constitutional principles is due to a number of factors: first, the blurring of the limits of criminal law impact in the field of security in the production of works or services, and secondly, the lack of isomorphism of criminal law norms providing for liability in the named sphere of public relations and, as a consequence, the lack of coordination of sectoral norms.Conclusions. …”
    Get full text
    Article
  8. 68
  9. 69

    Poszanowanie wolności religijnej w prawodawstwie kościelnym by Dariusz Mazurkiewicz

    Published 2024-01-01
    “…Otto of Bamberg lead to the conclusion that the adoption of Christianity by the pagans was primarily the result of seduction by the truth of the Gospel, but the influence of secular power, which secured the mission of the missionary bishop, was also significant. …”
    Get full text
    Article
  10. 70
  11. 71
  12. 72

    APPLICATION OF THE CRIMINAL LAW IN CONTRACTING SYSTEM AND STATE DEFENSE ORDER VIOLATIONS by V. N. Borkov

    Published 2018-10-01
    “…In the qualification of crimes committed in the sphere of contractual relations, and the application of art. 201.1 and 285.4 of the Criminal Code of the Russian Federation are proposed to be guided by the recommendations of the Supreme Court of the Russian Federation on the delimitation of abuse of official powers from embezzlement.Conclusions. …”
    Get full text
    Article
  13. 73

    The Construction of Identities in Space Inversion (the Case of Blagoveshensk and Chei-Che) by I. Y. Okunev, D. V. Basova, M. I. Tislenko

    Published 2015-12-01
    “…Threats to security or, rather, a discourse on them, form “Others” image, on the opposition to which is based nation and its geopolitical code. …”
    Get full text
    Article
  14. 74

    Revisiting Afghanistan's Drug Policy: A Policy Analysis of Eradication, Harm Reduction, and Economic Dependencies by Mohammad Qais Azizi, Mohammad Faisal Wardak, Edris Afzali, Ali Rahimi, Jerico Bautista Ogaya, Enayatollah Ejaz, Basir Ahmad Hasin, Mohammad Masudi, Don Eliseo Lucero‐Prisno III

    Published 2025-07-01
    “…Twenty‐seven national laws, strategies, and analytical reports were retrieved from government and multilateral repositories. Data were coded thematically using Braun‐and‐Clarke's six‐phase approach to map policy content, actors, context, and implementation barriers. …”
    Get full text
    Article
  15. 75
  16. 76

    INFORMATION REGARDING FIDUCIARY CONTRACTS AND THEIR LEGAL SPECIFICITIES by Ciprian Raul ROMIȚAN

    Published 2018-05-01
    “…Therefore, according to the provisions of the Civil Code in force, the parties to the fiduciary contract are the settlor (settlors) and the trustee (trustees). …”
    Get full text
    Article
  17. 77

    Foreclosure on cryptocurrency in the enforcement proceedings: A possible model by A. V. Neznamov

    Published 2025-07-01
    “…From the standpoint of a genetic and systematic approach the article analyzes domestic doctrinal sources, current Russian legislation and bylaws, and the Global Code of Digital Enforcement as an act of “soft law” summarizing the experience of foreclosing on digital assets in various legal systems. …”
    Get full text
    Article
  18. 78
  19. 79

    Patient-reported outcomes for menopause management interventions study: PROMMIS by Mukherjee Annice, Anne Armstrong, Lucy Whitaker, Jackie Maybin, Rebecca Reynolds, Paula Briggs

    Published 2025-06-01
    “…A steering group of leaders from endocrinology, gynaecology, oncology, other allied specialities, affiliated charities and patient groups, underpin the PROMMIS registry's operational details.The data collection process is Information Commissioner’s Office (ICO) and Organisation for the Review of Care and Health Apps (ORCHA) approved and utilises a novel, secure, general data protection regulation (GDPR) compliant online platform accessed via site-specific QR codes. …”
    Get full text
    Article
  20. 80