Academic literature on the topic 'Techniques of neutralization'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Techniques of neutralization.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Techniques of neutralization"

1

AGNEW, ROBERT, and ARDITH A. R. PETERS. "The Techniques of Neutralization." Criminal Justice and Behavior 13, no. 1 (March 1986): 81–97. http://dx.doi.org/10.1177/0093854886013001005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

SAMPSON, ROBERT J. "Techniques of Research Neutralization." Theoretical Criminology 3, no. 4 (November 1999): 438–51. http://dx.doi.org/10.1177/1362480699003004004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kaptein, Muel, and Martien van Helvoort. "A Model of Neutralization Techniques." Deviant Behavior 40, no. 10 (December 1, 2018): 1260–85. http://dx.doi.org/10.1080/01639625.2018.1491696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

AGNEW, ROBERT. "THE TECHNIQUES OF NEUTRALIZATION AND VIOLENCE." Criminology 32, no. 4 (November 1994): 555–80. http://dx.doi.org/10.1111/j.1745-9125.1994.tb01165.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jantz, Paul B., and Richard H. Morley. "Techniques of Neutralization: A Brain Network Perspective." International Journal of Offender Therapy and Comparative Criminology 62, no. 9 (October 6, 2017): 2759–80. http://dx.doi.org/10.1177/0306624x17735045.

Full text
Abstract:
Sykes and Matza introduced neutralization theory in 1957 to explain how juvenile delinquents retain a positive self-image when engaging in delinquent acts. Since then, aspects of neutralization theory have been incorporated into sociological and criminological theories to explain socially deviant behavior. Functional brain mapping research utilizing advanced magnetic resonance imaging techniques has identified complex, intrinsically organized, large-scale brain networks. Higher order operations commonly attributed to three brain networks (default mode network [DMN], central executive network [CEN], salience network [SN]) align closely with neutralization theory. This article briefly discusses brain networks in general and the DMN, CEN, and SN specifically. It also discusses how these networks are involved when engaging in the use of techniques of neutralization and offers implications for future research.
APA, Harvard, Vancouver, ISO, and other styles
6

K., Chandrashekar, and A. M. Manjunatha. "Tactical Neutralization Techniques of Track and Field Essentials For Educators and Mentors." International Journal of Physical Education & Sports Sciences 13, no. 1 (January 1, 2018): 29–32. http://dx.doi.org/10.29070/13/56094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Munoz, Laura, and Michael Mallin. "Unethical sales behavior neutralization: the impact of salesperson role variables and moderating effects of role relationship orientation." Journal of Business & Industrial Marketing 34, no. 1 (February 13, 2019): 62–79. http://dx.doi.org/10.1108/jbim-10-2017-0243.

Full text
Abstract:
Purpose The purpose of this paper is to explore the relationship between salesperson role perceptions and use of neutralization techniques, given the relationship orientation of the salesperson. Direct relationships between salesperson role conflict, role ambiguity, role task self-efficacy and a salesperson’s propensity to use neutralizations to attribute their unethical selling behavior are tested. The moderating effects of role-relationship orientation on the aforementioned relationships are also explored Design/methodology/approach Survey data were collected from 163 (cross-industry, B2B/B2C non-retail) salespeople. Results were analyzed and seven hypotheses were tested using SmartPLS to estimate and evaluate a (partial least squares) structural model. Findings The study findings conclude that role ambiguity, role task self-efficacy and role relationship orientation directly impact a salesperson’s tendency to use neutralization techniques to justify unethical sales behavior. Role relationship orientation serves to moderate the relationship between role conflict and neutralization use. Research limitations/implications This research integrates attribution and role theories to isolate the conditions where salespeople are prone to use neutralization techniques to justify their unethical behavior. Salesperson role relationship orientation is explored to understand the moderating effects on the salesperson role–neutralization relationships. Practical implications Sales managers are provided guidance (e.g. training and coaching) to help salespeople navigate feelings of negative role perceptions (role conflict, role ambiguity, role self-efficacy) to minimize the impact on justification of unethical sales behaviors. Originality/value This research builds on the sales and ethics literatures by incorporating role and attribution theory to better understand how salespeople approach dealing with their own unethical behavior and the implications on maintaining relationships with their customers.
APA, Harvard, Vancouver, ISO, and other styles
8

Swanepoel, R., J. K. Struthers, M. J. Erasmus, S. P. Shepherd, G. M. McGillivray, B. J. Erasmus, and B. J. H. Barnard. "Comparison of techniques for demonstrating antibodies to Rift Valley fever virus." Journal of Hygiene 97, no. 2 (October 1986): 317–29. http://dx.doi.org/10.1017/s0022172400065414.

Full text
Abstract:
SummaryNine serological techniques were compared by monitoring the response to infection with Rift Valley fever (RVF) virus in three sheep. Antibodies were monitored daily for the first 14 days after infection, then weekly and later fortnightly up to week 24. The earliest antibody response was detected in one sheep on day 3 by a plaque reduction neutralization test, and by day 6 antibodies were demonstrable in all three sheep by haemagglutination-inhibition, reversed passive haemagglutination-inhibition, immunodiffusion, indirect immunofluorescence (IF), enzyme-linked immunosorbent assay and neutralization of cytopathic effect in cell cultures. Antibodies were demonstrable by complement fixation on day 8 at the earliest. IF and the two neutralization techniques produced the highest titres, but all tests could be used satisfactorily for the serological diagnosis of RVF. Inactivated antigen could be used for all except the neutralization tests. A radioimmunoassay technique using125I-labelIed staphylococcal protein A detected antibodies on day 8 at the earliest and produced lower mean titres than some of the other techniques. This was probably because sheep immunoglobulins bind protein A poorly.
APA, Harvard, Vancouver, ISO, and other styles
9

Shoenberger, Nicole, Alex Heckert, and Druann Heckert. "Techniques of Neutralization Theory and Positive Deviance." Deviant Behavior 33, no. 10 (November 2012): 774–91. http://dx.doi.org/10.1080/01639625.2012.707497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liddick, Don. "Techniques of Neutralization and Animal Rights Activists." Deviant Behavior 34, no. 8 (August 2013): 618–34. http://dx.doi.org/10.1080/01639625.2012.759048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Techniques of neutralization"

1

Gruber, Verena, and Bodo B. Schlegelmilch. "How Techniques of Neutralization Legitimize Norm- and Attitude-Inconsistent Consumer Behavior." Springer, 2013. http://epub.wu.ac.at/4025/1/gruber.pdf.

Full text
Abstract:
In accordance with societal norms and values, consumers readily indicate their positive attitudes towards sustainability. However, they hardly take sustainability into account when engaging in exchange relationships with companies. To shed light on this paradox, this paper investigates whether defense mechanisms and the more specific concept of neutralization techniques can explain the discrepancy between societal norms and actual behavior. A multi-method qualitative research design provides rich insights into consumers' underlying cognitive processes and how they make sense of their attitude-behavior divergences. Drawing on the Ways Model of account-taking, which is advanced to a Cycle Model, the findings illustrate how neutralization strategies are used to legitimize inconsistencies between norm-conforming attitudes and actual behavior. Furthermore, the paper discusses how the repetitive reinforcement of neutralizing patterns and feedback loops between individuals and society are linked to the rise of anomic consumer behavior. (authors' abstract)
APA, Harvard, Vancouver, ISO, and other styles
2

Rozenbeek, David Jan. "Evaluation of Drone Neutralization Methods using Radio Jamming and Spoofing Techniques." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279557.

Full text
Abstract:
The usage of drones is steadily increasing as drones are becoming more available and useful to the general public, but drone usage also leads to problems as for example airports have had to shutdown due to drone sightings. It has become clear that a counter-drone system must be in place to neutralize intruding drones. However, neutralizing a drone is not an easy task, the risk of causing collateral damage and interfering with other radio systems must be highly considered when designing a counter-drone system. In this thesis a set of consumer drones was selected based on market popularity. By studying the wireless communication links of the selected drones a set of drone neutralization methods was identified. For each neutralization method a set of jamming and spoofing techniques was selected from current research. The techniques was used in practise by subjecting the drones to the techniques in a series of drone behaviour experiments. The results was used to evaluate the techniques in four criteria based on avoiding collateral damage, mitigating radio interference, identification requirement and handling multiple intruding drones. The evaluation was then summarized to discuss suitable drone neutralization methods and jamming & spoofing techniques. The results showed that there are neutralization methods that could potentially avoid causing col- lateral damage for certain drones. A full-band barrage jamming technique was shown to best the best performing based on the evaluation criteria, but was also the technique that theoretically induced the most radio interference. Furthermore, drones operating in way-point mode can only be neutralized using a GNSS jamming or spoofing neutralization method. Also using a GPS spoofing neutralization method was shown to be difficult to implement in practise.
Populariteten av att flyga drönare ökar stadigt i och med att drönartekniken blir mer tillgänglig och an- vändbart för allmänheten. Men användningen av drönare leder också till problem när till exempel flyg- platser har varit tvungna att stänga av på grund av drönar observationer. Det har blivit tydligt att ett anti-drönarsystem måste vara på plats för att neutralisera inkräktande drönare. Men att neutralisera en drönare är inte en enkel uppgift, risken för att orsaka sido-skador på personer, byggander eller objekt; eller störa andra radiosystem måste beaktas starkt när man utformar ett anti-drönarsystem. I detta examensarbete valdes en uppsättning konsumentdrönare ut baserat på marknadens popularitet. Genom att studera de trådlösa kommunikationslänkarna för de valda drönarna identifierades en uppsättning av drönar-neutraliseringsmetoder. För varje neutraliseringsmetod valdes en uppsättning av störnings- och spoofing-tekniker ut från aktuell forskning. Teknikerna användes i praktiken genom att utsätta drönarna för teknikerna i en serie drönar-beteendeexperiment. Resultaten användes sedan för att utvärdera teknikerna i fyra utvärderingskriterier baserade på att undvika sido-skador, mildra radiostörningar, identifieringsbehov och hantering av flera inkräktande drönare. Utvärderingen sammanfattades sedan för att diskutera lämpliga drönar-neutraliseringsmetoder och störnings- spoofing-tekniker. Resultaten visade att det finns neutraliseringsmetoder som potentiellt kan undvika att orsaka sido- skador eller radio-störningar för vissa typer av drönare. En full-bands störningsteknik visade sig vara bäst presterande baserat på utvärderingskriterierna, men var också den teknik som teoretiskt inducerade mest radiostörningar. Dessutom visades det att drönare som flyger i navigeringsläge endast kan neutraliseras med hjälp av en GNSS-störnings- eller spoofing metoder. Att använda en GPS-spoofing metod visade sig också vara svår att implementera i praktiken.
APA, Harvard, Vancouver, ISO, and other styles
3

Hankerson, Mario Bernard. "Athletic Participation: A Test of Learning and Neutralization Theories." [Johnson City, Tenn. : East Tennessee State University], 2002. http://etd-submit.etsu.edu/etd/theses/available/etd-1028102-000629/unrestricted/HankersonM111802b.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barnes, Collin Z. "AN INVESTIGATION INTO THE TECHNIQUES OF NEUTRALIZATION THEORY AND THEIR EFFECTS ON COMPULSIVE CONSUMPTION BEHAVIOR." MSSTATE, 2008. http://sun.library.msstate.edu/ETD-db/theses/available/etd-10312007-134110/.

Full text
Abstract:
Due to societal and economic costs caused by compulsive consumption behavior, specifically problem drinking and overeating, a search has been launched for a cognitive explanation for the deviant behaviors and the motivations that cause these behaviors to continue. This dissertation attempted to develop a better understanding of continued compulsive consumption behavior by investigating consumers use of the techniques of neutralization theory. Based on methodological concerns in neutralization research, the development of reliable and valid measures of the five techniques of neutralization theory were described and used to examine their moderation of compulsive consumption behavior and its relationship with social norm commitment and guilt. The dissertation resulted in developing four reliable and valid neutralization technique scales. The results of the structural model suggested a negative relationship between social norms and compulsive consumption behavior and a multiple regression indicated a partial moderation of certain neutralization techniques of this relationship. This dissertation has provided a better understanding of the cognitive process surrounding a consumers compulsive consumption behavior, the techniques used to allow the behavior to continue, and marketing applications to entice consumers to stop the behavior.
APA, Harvard, Vancouver, ISO, and other styles
5

Arvidson, Cody Jean. "The Anatomy of Academic Dishonesty: Cognitive Development, Self-Concept, Neutralization Techniques, and Attitudes Toward Cheating." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4641/.

Full text
Abstract:
This study explored the relationship between cheating among university students and their cognitive developmental levels, use of neutralization techniques, self-concept as a multifaceted cognitive construct, and attitude toward cheating. The purposes of this study were to investigate: (1) The relationships between academic dishonesty and each of the following overall independent variables: cognitive development, use of neutralization techniques, self-concept as a multifaceted cognitive construct, and attitude toward cheating, and (2) the reasons behind college student academic cheating behaviors. The study used data from anonymous, self-report surveys administered to undergraduate students in-class and at supplemental sessions. Student participation was voluntary. The study was correlational. The five hypotheses were: (1) Self-concept is significantly and negatively related to academic dishonesty; (2) Cognitive development is significantly and negatively related to academic dishonesty; (3) Attitude toward cheating is significantly and negatively related to academic dishonesty; (4) The use of neutralization techniques is significantly and positively related to academic dishonesty; (5) Cognitive development, self-concept, and attitude toward cheating will make significant contributions to the regression model for the dependent variables of academic dishonesty. The data supported the first, third, and fourth hypotheses. However, the second and fifth hypotheses were supported under certain conditions. The roles of cognitive development and self-concept in academic dishonesty represent major findings.
APA, Harvard, Vancouver, ISO, and other styles
6

Super, Mathew Anthony. "Why you might steal from Jay-Z an examination of filesharing using techniques of neutralization theory /." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Farrow, Melissa Ann. "Cytoplasmic Localization of HIV-1 Vif Is Necessary for Apobec3G Neutralization and Viral Replication: A Dissertation." eScholarship@UMMS, 2005. https://escholarship.umassmed.edu/gsbs_diss/75.

Full text
Abstract:
The binding of HIV-1 Vif to the cellular cytidine deaminase Apobec3G and subsequent prevention of Apobec3G virion incorporation have recently been identified as critical steps for the successful completion of the HIV-1 viral life cycle. This interaction occurs in the cytoplasm where Vif complexes with Apobec3G and directs its degradation via the proteasome pathway or sequesters it away from the assembling virion, thereby preventing viral packaging of Apobec3G. While many recent studies have focused on several aspects of Vif interaction with Apobec3G, the subcellular localization of Vif and Apobec3G during the viral life cycle have not been fully considered. Inhibition of Apobec3G requires direct interaction of Vif with Apobec3G, which can only be achieved when both proteins are present in the same subcellular compartment. In this thesis, a unique approach was utilized to study the impact of Vif subcellular localization on Vif function. The question of whether localization could influence function was brought about during the course of studying a severely attenuated viral isolate from a long-term non-progressor who displayed a remarkable disease course. Initial observations indicated that this highly attenuated virus contained a mutant Vif protein that inhibited growth and replication. Upon further investigation, it was found that the Vif defect was atypical in that the mutant was fully functional in in vitro assays, but that it was aberrantly localized to the nucleus in the cell. This provided the basis for the study of Vif localization and its contribution to Vif function. In addition to the unique Vif mutant that was employed, while determining the localization and replication phenotypes of the differentially localized Vif proteins, a novel pathway for Vif function was defined. Copious publications have recently defined the mechanism for Vif inhibition of Apobec3G. Vif is able to recruit Apobec3G into a complex that is targeted for degradation by the proteasome. However, this directed degradation model did not fully explain the complete neutralization of Apobec3G observed in cell culture. Other recent works have proposed the existence of a second, complementary pathway for Vif function. This pathway is defined here as formation of an aggresome that prevents Apobec3G packaging by binding and sequestering Apobec3G in a perinuclear aggregate. This second mechanism is believed to work in parallel with the already defined directed degradation pathway to promote complete exclusion of Apobec3G from the virion. The data presented here provide insight into two areas of HIV research. First, the work on the naturally occurring Vif mutant isolated from a long-term non-progress or confirms the importance of Vif in in vivo pathogenesis and points to Vif as a potentially useful gene for manipulation in vaccine or therapy design due to its critical contributions to in vivo virus replication. Additionally, the work done to address the subcellular localization of Vif led to the proposal of a second pathway for Vif function. This could have implications in the field of basic Vif research in terms of completely understanding and defining the functions of Vif. Again, a more complete knowledge about Vif can help in the development of novel therapies aimed at disrupting Vif function and abrogating HIV-1 replication.
APA, Harvard, Vancouver, ISO, and other styles
8

Maadarani, Mariah. "Inside the Black Box of Jail: Barriers to Change at the Ottawa-Carleton Detention Centre." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/41541.

Full text
Abstract:
The Ottawa-Carleton Detention Centre (OCDC) is notorious for its austere conditions of confinement and human rights violations. In response to widespread criticism, the Ontario provincial government created a dedicated task force in 2016 to address longstanding issues at the jail. To date, little research has examined how OCDC has maintained these deplorable conditions of confinement despite concerted effort to improve them. Drawing on Mathiesen’s (1990) neutralization techniques, this thesis reveals the tactics used by government officials and jail functionaries to maintain the status quo at OCDC and stifle transformative change by comparing task force recommendations with their ensuing implementation. Through a qualitative content analysis of the OCDC task force progress reports, trend analyses, Ombudsman, Community Advisory Board, Independent Review of Corrections, and Jail Accountability & Information Line reports documenting issues at OCDC, I demonstrate how the Ontario provincial government and OCDC administration (a) refer to competing demands, higher authority, policy and procedure, or safety and security as excuses for not instituting changes, (b) define policy alternatives as irrelevant or impossible to implement, (c) postpone implementation of measures for not being developed enough or possible now, as well as (d) puncture and (e) absorb policy alternatives to uphold the status quo and impede transformative change. In doing so, I expose the provincial penal system’s proclivity to ‘finish’ (Mathiesen, 1974) alternatives that threaten the current system, thereby gutting new ideas of their ability to generate meaningful social change. The insights provided by this thesis help lay the groundwork for future critical criminological research to examine the barriers to social change in the penal field on a sub-national, national, and international scale.
APA, Harvard, Vancouver, ISO, and other styles
9

Lundgren, Sørli Vanja. "In a Man´s World : Tolkninger av lovbrudd gjort i langtransportens yrkeskontekst." Doctoral thesis, Stockholm University, Department of Criminology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-520.

Full text
Abstract:

Criminological studies have shown that economical and/or occupational crimes are committed within all examined trades and occupations. This is also a fact in the gendered occupational context the Norwegian and Swedish long-distance trucking trade constitutes. This dissertation sets out to determine, by qualitative in-depth interviews with 24 interviewees and field observations, what certain gaining occupational and economical crimes mean to trade actors and how to interpret the meaning criminologically. A hermeneutical orientation constitutes the methodological and epistemological basis of the interpretation.

Analysis of the material shows two central consistent patterns in the interpretations made by interviewees and other trade actors:

1) The actors´ explanations of why law violations are committed. These are influenced by the actors´ view of how wide the specific violations are spread and influence the violation’s acceptability.

2) The actors´ normative evaluation of the law violations. The actors construct normative distinctions between normal, acceptable and unacceptable actions. The distinction is influenced by how the law violations are explained and how widespread they are considered to be.

The first pattern; actors interpretation of why law violations are committed, corresponds with explanations in established criminological theories. The actors’ explanations are discussed as techniques of neutralisation. However, explanations of cause of actions are established also in the discourse of trade-actors who do not violate laws, and a deeper interpretation is called for. A discussion about law violations, based on interviewees discourse, as caused by criminogenic structures are developed. The actors identify the structures as criminogenic and this discourse of coersive structures implies conservation of law violations as part of normality. An interpretation of why several but not all individuals violate laws even if the law violations considers to be normal and acceptable, is developed in terms of differential association.

However, solely use of established theoretical perspectives is not a sufficient interpretation of the law violations; the perspective of interpretation indicated by the second pattern will then be lost. Why is law violations considered both normal and deviant? This dissertation applies a gender-theoretical perspective and argues that actors constitute masculinity through acceptable law violations and that masculinity and normality are correlated. A cultural discourse of borders between normality and deviance is conserved and processed, and the actors discourses of law violations as without victims and as a necessity to continue as truckers, are central in the normalization of normative borders.

APA, Harvard, Vancouver, ISO, and other styles
10

Overall, Jeffrey Scott. "Rationalizing Ethically Questionable Intentions: An Investigation of Marketing Practices in the USA." Thesis, University of Bradford, 2012. http://hdl.handle.net/10454/6337.

Full text
Abstract:
In this research, a model for ethically questionable decision-making is developed by amalgamating several decision-making theories. The variables of interest are the techniques of neutralization, perceived moral intensity, Machiavellianism, unethical intentions, and ethical judgment. Using a sample of 276 U.S. marketing professionals, partial least squares structural equation modelling was used to validate the model. Findings reveal that U.S. marketing professionals rationalize their ethically questionable intentions through their: (1) perception of moral intensity (i.e., minimizing the harms on others, perceiving their self-interest as most salient, and indifference to social consensus), (2) reliance on various neutralization techniques, and; (3) judgment of their ethically questionable intentions as ethical. After controlling for the Machiavellian personality trait, Machiavellianism did not have a profound effect on the decision-making process, which implies that marketers, in general, are capable of the cognitive distortions found in this study. The main contribution to knowledge is the synthesis of the techniques of neutralization and the perceived moral intensity construct. Through this amalgamation, knowledge of the intermediary steps in the decision-making process has emerged. A contribution to knowledge involves testing the relationship between Machiavellianism and unethical intentions through the mediating variable of the techniques of neutralization. Through this investigation, it was found that the Machiavellian personality is inconsequential to the decision-making process. As a contribution to managerial knowledge, it was found that through cognitive distortions, marketers are capable of various illicit behaviours, which have been shown to be costly to not only stakeholders, but also to the profitability and reputations of organisations.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Techniques of neutralization"

1

Connor, Gregory J., and Matthew Summers. Tactical Neutralization Techniques. Stipes Publishing, LLC, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sykes, Gresham M. Techniques of Neutralization: A Theory of Delinquency (Irvington Reprint Series in Sociology). Irvington Pub, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Techniques of neutralization"

1

Sahni, Sanjeev P., and Indranath Gupta. "Neutralization Techniques: Means to Diffuse Responsibility." In Piracy in the Digital Era, 69–79. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7173-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Scott, Michael. "Knowledge of Governance as Knowledge for Governance: Spatialized Techniques of Neutralization." In Knowledge for Governance, 51–67. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47150-7_3.

Full text
Abstract:
AbstractThe term governance often evokes processes of negotiation and collaboration between civil society, private sector, and state actors. Yet, governance processes also involve a contest of ideas in efforts to legitimate state-backed decision making. Drawing on empirical cases of coastal property developments in South Australia, this chapter investigates how key actors in land-use governance—such as developers, planners, politicians, and scientists—reflexively deploy “techniques of neutralization” to deflect critiques and manage opposition to contentious new developments. The author explores how these techniques draw on particular spatial metaphors and images to suggest that, somewhat ironically, a tacit meta technique is to neutralize the projected environmental risks to coastal space through narratives of time. By outlining these everyday techniques of neutralization, the author argues that such routines are a form of knowledge of governance—knowing what can be said and ways of speaking within governance processes—that is in turn a form of knowledge for governance.
APA, Harvard, Vancouver, ISO, and other styles
3

Smith, Greg. "Techniques of Neutralization, Techniques of Body Management and the Public Harassment of Runners." In Exploring the Body, 163–82. London: Palgrave Macmillan UK, 2001. http://dx.doi.org/10.1057/9780230501966_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brewer, Russell, Sarah Fox, and Caitlan Miller. "Applying the Techniques of Neutralization to the Study of Cybercrime." In The Palgrave Handbook of International Cybercrime and Cyberdeviance, 1–19. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-90307-1_22-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brewer, Russell, Sarah Fox, and Caitlan Miller. "Applying the Techniques of Neutralization to the Study of Cybercrime." In The Palgrave Handbook of International Cybercrime and Cyberdeviance, 547–65. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78440-3_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brooks, Graham. "Explaining Corruption: Drifting In and Out of Corruption and Techniques of Neutralization." In Criminology of Corruption, 107–25. London: Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/978-1-137-51724-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rieb, Andreas, Tamara Gurschler, and Ulrike Lechner. "A Gamified Approach to Explore Techniques of Neutralization of Threat Actors in Cybercrime." In Privacy Technologies and Policy, 87–103. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67280-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Strutton, David, Scott J. Vitell, Lou E. Pelton, and Stephen J. Grove. "The Efficacy of the ‘Techniques of Neutralization’ as a Means to Explain Unethical Sales Behavior: A Preliminary Investigation." In Proceedings of the 1993 Academy of Marketing Science (AMS) Annual Conference, 301–7. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13159-7_68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Huber, Frank, Cecile Kornmann, Eva Appelmann, and Frederik Meyer. "Every Silver Lining Has a Cloud: An Empirical Analysis of the Role of Neutralization Techniques Within the Context of Moral Intensity." In Marketing at the Confluence between Entertainment and Analytics, 589–602. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-47331-4_112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Daghari, Marwa, Chafai Abdelhamid, Hedi Sakli, and Kamel Nafkha. "High Isolation with Neutralization Technique for 5G-MIMO Elliptical Multi-antennas." In Smart Innovation, Systems and Technologies, 124–33. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21009-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Techniques of neutralization"

1

Liaw, David, Brian Gilchrist, and Thomas Liu. "Simulation of Self-Neutralization Techniques for Charged Particle Thrusters." In 47th AIAA/ASME/SAE/ASEE Joint Propulsion Conference & Exhibit. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2011. http://dx.doi.org/10.2514/6.2011-5814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liaw, D., T. Liu, and B. Gilchrist. "Simulation of self-neutralization techniques for charged particle thrusters." In 2011 IEEE 38th International Conference on Plasma Sciences (ICOPS). IEEE, 2011. http://dx.doi.org/10.1109/plasma.2011.5992907.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gomez, Juan C. "Comparison of nonlinear identification techniques on a benchmark pH neutralization process." In 2015 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON). IEEE, 2015. http://dx.doi.org/10.1109/chilecon.2015.7400368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bhatia, Shraey, Jey Han Lau, and Timothy Baldwin. "Automatic Classification of Neutralization Techniques in the Narrative of Climate Change Scepticism." In Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Stroudsburg, PA, USA: Association for Computational Linguistics, 2021. http://dx.doi.org/10.18653/v1/2021.naacl-main.175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ram, S. Sakthiya, D. Dinesh Kumar, B. Meenakshipriya, and K. Sundaravadivu. "Designing and comparison of controllers based on optimization techniques for pH neutralization process." In 2016 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2016. http://dx.doi.org/10.1109/icices.2016.7518847.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ding, Yaoshun, Soenke Vehring, and Georg Boeck. "Design of 24 GHz High-Linear High-Gain Low-Noise Amplifiers Using Neutralization Techniques." In 2019 IEEE/MTT-S International Microwave Symposium - IMS 2019. IEEE, 2019. http://dx.doi.org/10.1109/mwsym.2019.8700859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Sharon, Li Li Hong, Khoo Ley Hong, Ang Poh Chuan, and Mo Zhi Qiang. "Study of Charge Neutralization Techniques to Prevent Copper Corrosion On Post-FIB Wet Stained Sample." In 2019 IEEE 26th International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA). IEEE, 2019. http://dx.doi.org/10.1109/ipfa47161.2019.8984758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Banerjee, Jeet, Rowdra Ghatak, and Anirban Karmakar. "A compact planar UWB MIMO diversity antenna with Hilbert fractal neutralization line for isolation improvement and dual band notch characteristics." In 2018 Emerging Trends in Electronic Devices and Computational Techniques (EDCT). IEEE, 2018. http://dx.doi.org/10.1109/edct.2018.8405070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Addaci, R., R. Staraj, N. Hamdiken, and T. Fortaki. "Neutralization technique model using artificial neural networks." In 2012 24th International Conference on Microelectronics (ICM). IEEE, 2012. http://dx.doi.org/10.1109/icm.2012.6471450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lodyanova, Elizaveta Pavlovna, and Natalia Vasilievna Malysheva. "IGNORING AS TECHNIQUE OF NEUTRALIZATION OF VERBAL AGGRESSION." In ТРАНСФОРМАЦИЯ ИНФОРМАЦИОННО-КОММУНИКАТИВНОЙ СРЕДЫ ОБЩЕСТВА В УСЛОВИЯХ ВЫЗОВОВ СОВРЕМЕННОСТИ. Комсомольск-на-Амуре: Комсомольский-на-Амуре государственный университет, 2021. http://dx.doi.org/10.17084/978-5-7765-1461-6-2021-287.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography