Academic literature on the topic 'Techniques of neutralization'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Techniques of neutralization.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Techniques of neutralization"
AGNEW, ROBERT, and ARDITH A. R. PETERS. "The Techniques of Neutralization." Criminal Justice and Behavior 13, no. 1 (March 1986): 81–97. http://dx.doi.org/10.1177/0093854886013001005.
Full textSAMPSON, ROBERT J. "Techniques of Research Neutralization." Theoretical Criminology 3, no. 4 (November 1999): 438–51. http://dx.doi.org/10.1177/1362480699003004004.
Full textKaptein, Muel, and Martien van Helvoort. "A Model of Neutralization Techniques." Deviant Behavior 40, no. 10 (December 1, 2018): 1260–85. http://dx.doi.org/10.1080/01639625.2018.1491696.
Full textAGNEW, ROBERT. "THE TECHNIQUES OF NEUTRALIZATION AND VIOLENCE." Criminology 32, no. 4 (November 1994): 555–80. http://dx.doi.org/10.1111/j.1745-9125.1994.tb01165.x.
Full textJantz, Paul B., and Richard H. Morley. "Techniques of Neutralization: A Brain Network Perspective." International Journal of Offender Therapy and Comparative Criminology 62, no. 9 (October 6, 2017): 2759–80. http://dx.doi.org/10.1177/0306624x17735045.
Full textK., Chandrashekar, and A. M. Manjunatha. "Tactical Neutralization Techniques of Track and Field Essentials For Educators and Mentors." International Journal of Physical Education & Sports Sciences 13, no. 1 (January 1, 2018): 29–32. http://dx.doi.org/10.29070/13/56094.
Full textMunoz, Laura, and Michael Mallin. "Unethical sales behavior neutralization: the impact of salesperson role variables and moderating effects of role relationship orientation." Journal of Business & Industrial Marketing 34, no. 1 (February 13, 2019): 62–79. http://dx.doi.org/10.1108/jbim-10-2017-0243.
Full textSwanepoel, R., J. K. Struthers, M. J. Erasmus, S. P. Shepherd, G. M. McGillivray, B. J. Erasmus, and B. J. H. Barnard. "Comparison of techniques for demonstrating antibodies to Rift Valley fever virus." Journal of Hygiene 97, no. 2 (October 1986): 317–29. http://dx.doi.org/10.1017/s0022172400065414.
Full textShoenberger, Nicole, Alex Heckert, and Druann Heckert. "Techniques of Neutralization Theory and Positive Deviance." Deviant Behavior 33, no. 10 (November 2012): 774–91. http://dx.doi.org/10.1080/01639625.2012.707497.
Full textLiddick, Don. "Techniques of Neutralization and Animal Rights Activists." Deviant Behavior 34, no. 8 (August 2013): 618–34. http://dx.doi.org/10.1080/01639625.2012.759048.
Full textDissertations / Theses on the topic "Techniques of neutralization"
Gruber, Verena, and Bodo B. Schlegelmilch. "How Techniques of Neutralization Legitimize Norm- and Attitude-Inconsistent Consumer Behavior." Springer, 2013. http://epub.wu.ac.at/4025/1/gruber.pdf.
Full textRozenbeek, David Jan. "Evaluation of Drone Neutralization Methods using Radio Jamming and Spoofing Techniques." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279557.
Full textPopulariteten av att flyga drönare ökar stadigt i och med att drönartekniken blir mer tillgänglig och an- vändbart för allmänheten. Men användningen av drönare leder också till problem när till exempel flyg- platser har varit tvungna att stänga av på grund av drönar observationer. Det har blivit tydligt att ett anti-drönarsystem måste vara på plats för att neutralisera inkräktande drönare. Men att neutralisera en drönare är inte en enkel uppgift, risken för att orsaka sido-skador på personer, byggander eller objekt; eller störa andra radiosystem måste beaktas starkt när man utformar ett anti-drönarsystem. I detta examensarbete valdes en uppsättning konsumentdrönare ut baserat på marknadens popularitet. Genom att studera de trådlösa kommunikationslänkarna för de valda drönarna identifierades en uppsättning av drönar-neutraliseringsmetoder. För varje neutraliseringsmetod valdes en uppsättning av störnings- och spoofing-tekniker ut från aktuell forskning. Teknikerna användes i praktiken genom att utsätta drönarna för teknikerna i en serie drönar-beteendeexperiment. Resultaten användes sedan för att utvärdera teknikerna i fyra utvärderingskriterier baserade på att undvika sido-skador, mildra radiostörningar, identifieringsbehov och hantering av flera inkräktande drönare. Utvärderingen sammanfattades sedan för att diskutera lämpliga drönar-neutraliseringsmetoder och störnings- spoofing-tekniker. Resultaten visade att det finns neutraliseringsmetoder som potentiellt kan undvika att orsaka sido- skador eller radio-störningar för vissa typer av drönare. En full-bands störningsteknik visade sig vara bäst presterande baserat på utvärderingskriterierna, men var också den teknik som teoretiskt inducerade mest radiostörningar. Dessutom visades det att drönare som flyger i navigeringsläge endast kan neutraliseras med hjälp av en GNSS-störnings- eller spoofing metoder. Att använda en GPS-spoofing metod visade sig också vara svår att implementera i praktiken.
Hankerson, Mario Bernard. "Athletic Participation: A Test of Learning and Neutralization Theories." [Johnson City, Tenn. : East Tennessee State University], 2002. http://etd-submit.etsu.edu/etd/theses/available/etd-1028102-000629/unrestricted/HankersonM111802b.pdf.
Full textBarnes, Collin Z. "AN INVESTIGATION INTO THE TECHNIQUES OF NEUTRALIZATION THEORY AND THEIR EFFECTS ON COMPULSIVE CONSUMPTION BEHAVIOR." MSSTATE, 2008. http://sun.library.msstate.edu/ETD-db/theses/available/etd-10312007-134110/.
Full textArvidson, Cody Jean. "The Anatomy of Academic Dishonesty: Cognitive Development, Self-Concept, Neutralization Techniques, and Attitudes Toward Cheating." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4641/.
Full textSuper, Mathew Anthony. "Why you might steal from Jay-Z an examination of filesharing using techniques of neutralization theory /." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textFarrow, Melissa Ann. "Cytoplasmic Localization of HIV-1 Vif Is Necessary for Apobec3G Neutralization and Viral Replication: A Dissertation." eScholarship@UMMS, 2005. https://escholarship.umassmed.edu/gsbs_diss/75.
Full textMaadarani, Mariah. "Inside the Black Box of Jail: Barriers to Change at the Ottawa-Carleton Detention Centre." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/41541.
Full textLundgren, Sørli Vanja. "In a Man´s World : Tolkninger av lovbrudd gjort i langtransportens yrkeskontekst." Doctoral thesis, Stockholm University, Department of Criminology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-520.
Full textCriminological studies have shown that economical and/or occupational crimes are committed within all examined trades and occupations. This is also a fact in the gendered occupational context the Norwegian and Swedish long-distance trucking trade constitutes. This dissertation sets out to determine, by qualitative in-depth interviews with 24 interviewees and field observations, what certain gaining occupational and economical crimes mean to trade actors and how to interpret the meaning criminologically. A hermeneutical orientation constitutes the methodological and epistemological basis of the interpretation.
Analysis of the material shows two central consistent patterns in the interpretations made by interviewees and other trade actors:
1) The actors´ explanations of why law violations are committed. These are influenced by the actors´ view of how wide the specific violations are spread and influence the violation’s acceptability.
2) The actors´ normative evaluation of the law violations. The actors construct normative distinctions between normal, acceptable and unacceptable actions. The distinction is influenced by how the law violations are explained and how widespread they are considered to be.
The first pattern; actors interpretation of why law violations are committed, corresponds with explanations in established criminological theories. The actors’ explanations are discussed as techniques of neutralisation. However, explanations of cause of actions are established also in the discourse of trade-actors who do not violate laws, and a deeper interpretation is called for. A discussion about law violations, based on interviewees discourse, as caused by criminogenic structures are developed. The actors identify the structures as criminogenic and this discourse of coersive structures implies conservation of law violations as part of normality. An interpretation of why several but not all individuals violate laws even if the law violations considers to be normal and acceptable, is developed in terms of differential association.
However, solely use of established theoretical perspectives is not a sufficient interpretation of the law violations; the perspective of interpretation indicated by the second pattern will then be lost. Why is law violations considered both normal and deviant? This dissertation applies a gender-theoretical perspective and argues that actors constitute masculinity through acceptable law violations and that masculinity and normality are correlated. A cultural discourse of borders between normality and deviance is conserved and processed, and the actors discourses of law violations as without victims and as a necessity to continue as truckers, are central in the normalization of normative borders.
Overall, Jeffrey Scott. "Rationalizing Ethically Questionable Intentions: An Investigation of Marketing Practices in the USA." Thesis, University of Bradford, 2012. http://hdl.handle.net/10454/6337.
Full textBooks on the topic "Techniques of neutralization"
Connor, Gregory J., and Matthew Summers. Tactical Neutralization Techniques. Stipes Publishing, LLC, 1988.
Find full textSykes, Gresham M. Techniques of Neutralization: A Theory of Delinquency (Irvington Reprint Series in Sociology). Irvington Pub, 1993.
Find full textBook chapters on the topic "Techniques of neutralization"
Sahni, Sanjeev P., and Indranath Gupta. "Neutralization Techniques: Means to Diffuse Responsibility." In Piracy in the Digital Era, 69–79. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7173-8_5.
Full textScott, Michael. "Knowledge of Governance as Knowledge for Governance: Spatialized Techniques of Neutralization." In Knowledge for Governance, 51–67. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47150-7_3.
Full textSmith, Greg. "Techniques of Neutralization, Techniques of Body Management and the Public Harassment of Runners." In Exploring the Body, 163–82. London: Palgrave Macmillan UK, 2001. http://dx.doi.org/10.1057/9780230501966_9.
Full textBrewer, Russell, Sarah Fox, and Caitlan Miller. "Applying the Techniques of Neutralization to the Study of Cybercrime." In The Palgrave Handbook of International Cybercrime and Cyberdeviance, 1–19. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-90307-1_22-1.
Full textBrewer, Russell, Sarah Fox, and Caitlan Miller. "Applying the Techniques of Neutralization to the Study of Cybercrime." In The Palgrave Handbook of International Cybercrime and Cyberdeviance, 547–65. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78440-3_22.
Full textBrooks, Graham. "Explaining Corruption: Drifting In and Out of Corruption and Techniques of Neutralization." In Criminology of Corruption, 107–25. London: Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/978-1-137-51724-1_6.
Full textRieb, Andreas, Tamara Gurschler, and Ulrike Lechner. "A Gamified Approach to Explore Techniques of Neutralization of Threat Actors in Cybercrime." In Privacy Technologies and Policy, 87–103. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67280-9_5.
Full textStrutton, David, Scott J. Vitell, Lou E. Pelton, and Stephen J. Grove. "The Efficacy of the ‘Techniques of Neutralization’ as a Means to Explain Unethical Sales Behavior: A Preliminary Investigation." In Proceedings of the 1993 Academy of Marketing Science (AMS) Annual Conference, 301–7. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13159-7_68.
Full textHuber, Frank, Cecile Kornmann, Eva Appelmann, and Frederik Meyer. "Every Silver Lining Has a Cloud: An Empirical Analysis of the Role of Neutralization Techniques Within the Context of Moral Intensity." In Marketing at the Confluence between Entertainment and Analytics, 589–602. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-47331-4_112.
Full textDaghari, Marwa, Chafai Abdelhamid, Hedi Sakli, and Kamel Nafkha. "High Isolation with Neutralization Technique for 5G-MIMO Elliptical Multi-antennas." In Smart Innovation, Systems and Technologies, 124–33. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21009-0_11.
Full textConference papers on the topic "Techniques of neutralization"
Liaw, David, Brian Gilchrist, and Thomas Liu. "Simulation of Self-Neutralization Techniques for Charged Particle Thrusters." In 47th AIAA/ASME/SAE/ASEE Joint Propulsion Conference & Exhibit. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2011. http://dx.doi.org/10.2514/6.2011-5814.
Full textLiaw, D., T. Liu, and B. Gilchrist. "Simulation of self-neutralization techniques for charged particle thrusters." In 2011 IEEE 38th International Conference on Plasma Sciences (ICOPS). IEEE, 2011. http://dx.doi.org/10.1109/plasma.2011.5992907.
Full textGomez, Juan C. "Comparison of nonlinear identification techniques on a benchmark pH neutralization process." In 2015 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON). IEEE, 2015. http://dx.doi.org/10.1109/chilecon.2015.7400368.
Full textBhatia, Shraey, Jey Han Lau, and Timothy Baldwin. "Automatic Classification of Neutralization Techniques in the Narrative of Climate Change Scepticism." In Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Stroudsburg, PA, USA: Association for Computational Linguistics, 2021. http://dx.doi.org/10.18653/v1/2021.naacl-main.175.
Full textRam, S. Sakthiya, D. Dinesh Kumar, B. Meenakshipriya, and K. Sundaravadivu. "Designing and comparison of controllers based on optimization techniques for pH neutralization process." In 2016 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2016. http://dx.doi.org/10.1109/icices.2016.7518847.
Full textDing, Yaoshun, Soenke Vehring, and Georg Boeck. "Design of 24 GHz High-Linear High-Gain Low-Noise Amplifiers Using Neutralization Techniques." In 2019 IEEE/MTT-S International Microwave Symposium - IMS 2019. IEEE, 2019. http://dx.doi.org/10.1109/mwsym.2019.8700859.
Full textLee, Sharon, Li Li Hong, Khoo Ley Hong, Ang Poh Chuan, and Mo Zhi Qiang. "Study of Charge Neutralization Techniques to Prevent Copper Corrosion On Post-FIB Wet Stained Sample." In 2019 IEEE 26th International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA). IEEE, 2019. http://dx.doi.org/10.1109/ipfa47161.2019.8984758.
Full textBanerjee, Jeet, Rowdra Ghatak, and Anirban Karmakar. "A compact planar UWB MIMO diversity antenna with Hilbert fractal neutralization line for isolation improvement and dual band notch characteristics." In 2018 Emerging Trends in Electronic Devices and Computational Techniques (EDCT). IEEE, 2018. http://dx.doi.org/10.1109/edct.2018.8405070.
Full textAddaci, R., R. Staraj, N. Hamdiken, and T. Fortaki. "Neutralization technique model using artificial neural networks." In 2012 24th International Conference on Microelectronics (ICM). IEEE, 2012. http://dx.doi.org/10.1109/icm.2012.6471450.
Full textLodyanova, Elizaveta Pavlovna, and Natalia Vasilievna Malysheva. "IGNORING AS TECHNIQUE OF NEUTRALIZATION OF VERBAL AGGRESSION." In ТРАНСФОРМАЦИЯ ИНФОРМАЦИОННО-КОММУНИКАТИВНОЙ СРЕДЫ ОБЩЕСТВА В УСЛОВИЯХ ВЫЗОВОВ СОВРЕМЕННОСТИ. Комсомольск-на-Амуре: Комсомольский-на-Амуре государственный университет, 2021. http://dx.doi.org/10.17084/978-5-7765-1461-6-2021-287.
Full text