The Role of Women in Mining

被引:0
|
作者
Dietrich, Victoria [1 ]
机构
[1] Grube Samson, St. Andreasberg, Germany
关键词
Mining engineering;
D O I
暂无
中图分类号
学科分类号
摘要
Little is known about the important role of women in the mining industry. However, without the female workforce, life in the mining state would have been quite different. This text attempts to describe and pay tribute to the lifetime achievements of women in the mining industry. © 2024, Bergbau-Verwaltungsgesellschaft mbH. All rights reserved.
引用
收藏
页码:480 / 485
相关论文
共 50 条
  • [31] Comstock women: The making of a mining community
    Gearhart, DG
    JOURNAL OF THE WEST, 1999, 38 (04) : 106 - 106
  • [32] SOCIAL NETWORKS OF MINING TOWN WOMEN
    COTTERELL, JL
    AUSTRALIAN JOURNAL OF SOCIAL ISSUES, 1984, 19 (02) : 101 - 112
  • [33] How to get more women into mining
    Huang, Linqi
    Li, Xibing
    Dong, Longjun
    Yu, Haoxuan
    NATURE, 2025, 639 (8056) : 867 - 867
  • [34] Regenderneering the mining industry - A survey of women's career experiences in mining
    Gibson, G
    Scoble, M
    CIM BULLETIN, 2004, 97 (1082): : 54 - 60
  • [35] Comstock women: The making of a mining community
    Evans-Janke, LK
    HISTORICAL ARCHAEOLOGY, 2000, 34 (02) : 129 - 129
  • [36] Women and Mining in Colonial America: An Introduction
    Povea Moreno, Isabel M.
    CHRONICA NOVA, 2020, (46): : 11 - 20
  • [37] PostProcessing in Constrained Role Mining
    Blundo, Carlo
    Cimato, Stelvio
    Siniscalchi, Luisa
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING - IDEAL 2018, PT I, 2018, 11314 : 204 - 214
  • [38] Role Mining with Probabilistic Models
    Frank, Mario
    Buhman, Joachim M.
    Basin, David
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2013, 15 (04)
  • [39] Role Mining in the Presence of Noise
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    Guo, Qi
    Lu, Haibing
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXIV, PROCEEDINGS, 2010, 6166 : 97 - +
  • [40] Role Mining Based on Weights
    Ma, Xiaopu
    Li, Ruixuan
    Lu, Zhengding
    SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 65 - 74