Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Threats")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 1343

  • Page / 54
Export

Selection :

  • and

Vaccines in a hurrySØBORG, Christian; MØLBAK, Kare; DOHERTY, T. Mark et al.Vaccine. 2009, Vol 27, Num 25-26, pp 3295-3298, issn 0264-410X, 4 p.Conference Paper

Classification and trend analysis of threats origins to the security of power systemsBOMPARD, Ettore; TAO HUANG; YINGJUN WU et al.Electrical power & energy systems. 2013, Vol 50, pp 50-64, issn 0142-0615, 15 p.Article

Technology-based security threats : taxonomy of sources, targets and a process model of alleviationCONCA, Christopher; MEDLIN, B. Dawn; DAVE, Dinesh S et al.International journal of information technology and management. 2005, Vol 4, Num 2, pp 166-177, issn 1461-4111, 12 p.Article

A strategic vaccine facility for the UKDUGGAN, Jacqueline M; BROOKS, Timothy J. G.Vaccine. 2005, Vol 23, Num 17-18, pp 2090-2094, issn 0264-410X, 5 p.Conference Paper

The Effects of Social Identification on Individual Effort under Conditions of Identity Threat and Regulatory DepletionGIGUERE, Benjamin; LALONDE, Richard N.Group processes & intergroup relations. 2009, Vol 12, Num 2, pp 195-208, issn 1368-4302, 14 p.Article

Which future for weed science?FERNANDEZ-OUINTANILLA, C; OUADRANTI, M; KUDSK, P et al.Weed research (Print). 2008, Vol 48, Num 4, pp 297-301, issn 0043-1737, 5 p.Article

The challenges of leadership in the modem world : Introduction to the special issueBENNIS, Warren.The American psychologist. 2007, Vol 62, Num 1, pp 2-5, issn 0003-066X, 4 p.Article

The multi-functionality of accounts in advice givingHANSUN ZHANG WARING.Journal of sociolinguistics (Print). 2007, Vol 11, Num 3, pp 367-391, issn 1360-6441, 25 p.Article

Reflexive Positioning in a Politically Sensitive Situation: Dealing With the Threats of Researching the West Bank Settler ExperiencePOSSICK, Chaya.Qualitative inquiry. 2009, Vol 15, Num 5, pp 859-875, issn 1077-8004, 17 p.Article

A confirmatory factor analysis of the threat indexMOORE, M. K; NEIMEYER, R. A.Journal of personality and social psychology. 1991, Vol 60, Num 1, pp 122-129, issn 0022-3514Article

La planification de sécurité en France = Security Planning Policy in FranceCOURSAGET, Alain; LE BORGNE, Guy.REE. Revue de l'électricité et de l'électronique. 2007, Num 10, issn 1265-6534, 44-49, 72-73 [8 p.]Article

Impoliteness and threat responsesLIMBERG, Holger.Journal of pragmatics. 2009, Vol 41, Num 7, pp 1376-1394, issn 0378-2166, 19 p.Article

HIV/AIDS as Business Risk: A South African Case StudyWYK, Jay Van.Business & society. 2012, Vol 51, Num 2, pp 263-309, issn 0007-6503, 47 p.Article

Interactions between global and local stressors of ecosystems determine management effectiveness in cumulative impact mappingBROWN, Christopher J; SAUNDERS, Megan I; POSSINGHAM, Hugh P et al.Diversity and distributions. 2014, Vol 20, Num 5-6, pp 538-546, issn 1366-9516, 9 p.Article

I will send badass viruses. Peer threats and the interplay of pretend frames in a classroom disputeNIEMI, Kreeta.Journal of pragmatics. 2014, Vol 66, pp 106-121, issn 0378-2166, 16 p.Article

Technological indeterminacy: Medium, threat, temporality = Indétermination technologique : media, menace, temporalitéDE ABREU, Maria José A.Anthropological theory. 2013, Vol 13, Num 3, pp 267-284, issn 1463-4996, 18 p.Article

Does a common ingroup identity reduce intergroup threat?RIEK, Blake M; MANIA, Eric W; GAERTNER, Samuel L et al.Group processes & intergroup relations. 2010, Vol 13, Num 4, pp 403-423, issn 1368-4302, 21 p.Article

The effects of stereotype threat on cognitive function in ecstasy usersCOLE, J. C; MICHAILIDOU, K; JEROME, L et al.Journal of psychopharmacology (Oxford). 2006, Vol 20, Num 4, pp 518-525, issn 0269-8811, 8 p.Article

Gender threats and men's antigay behaviors: The harmful effects of asserting heterosexualityBOSSON, Jennifer K; WEAVER, Jonathan R; CASWELL, T. Andrew et al.Group processes & intergroup relations. 2012, Vol 15, Num 4, pp 471-486, issn 1368-4302, 16 p.Article

VALIDITY AND RELIABILITY OF PROVIDED CONSTRUCTS IN ASSESSING DEATH THREATKREIGER SR; EPTING FR; HAYS CH et al.1979; OMEGA; USA; DA. 1979; VOL. 10; NO 1; PP. 87-95; BIBL. 12 REF.Article

Modelling species distributional shifts across broad spatial extents by linking dynamic occupancy models with public-based surveysSANTIKA, Truly; MCALPINE, Clive A; LUNNEY, Daniel et al.Diversity and distributions. 2014, Vol 20, Num 7-8, pp 786-796, issn 1366-9516, 11 p.Article

A Standard Lexicon for Biodiversity Conservation : Unified Classifications of Threats and ActionsSALAFSKY, Nick; SALZER, Daniel; WILKIE, David et al.Conservation biology. 2008, Vol 22, Num 4, pp 897-911, issn 0888-8892, 15 p.Article

Viewing red prior to a strength test inhibits motor outputPAYEN, Vincent; ELLIOT, Andrew J; COOMBES, Stephen A et al.Neuroscience letters. 2011, Vol 495, Num 1, pp 44-48, issn 0304-3940, 5 p.Article

Threatened fishes of the world : Tanichthys albonubes Lin 1932 (Cyprinidae)LIANG, Xu-Fang; CHEN, Guo-Zhu; CHEN, Xiang-Lin et al.Environmental biology of fishes. 2008, Vol 82, Num 2, pp 177-178, issn 0378-1909, 2 p.Article

Le blongios nain en corse : Un visiteur et nicheur furtif = Little bittern in Corsica : a discreet visitor and breederBONACCORSI, Gilles.Alauda (Dijon). 2006, Vol 74, Num 1, pp 101-112, issn 0002-4619, 12 p.Conference Paper

  • Page / 54