To see the other types of publications on this topic, follow the link: Techniques of neutralization.

Dissertations / Theses on the topic 'Techniques of neutralization'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 32 dissertations / theses for your research on the topic 'Techniques of neutralization.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Gruber, Verena, and Bodo B. Schlegelmilch. "How Techniques of Neutralization Legitimize Norm- and Attitude-Inconsistent Consumer Behavior." Springer, 2013. http://epub.wu.ac.at/4025/1/gruber.pdf.

Full text
Abstract:
In accordance with societal norms and values, consumers readily indicate their positive attitudes towards sustainability. However, they hardly take sustainability into account when engaging in exchange relationships with companies. To shed light on this paradox, this paper investigates whether defense mechanisms and the more specific concept of neutralization techniques can explain the discrepancy between societal norms and actual behavior. A multi-method qualitative research design provides rich insights into consumers' underlying cognitive processes and how they make sense of their attitude-behavior divergences. Drawing on the Ways Model of account-taking, which is advanced to a Cycle Model, the findings illustrate how neutralization strategies are used to legitimize inconsistencies between norm-conforming attitudes and actual behavior. Furthermore, the paper discusses how the repetitive reinforcement of neutralizing patterns and feedback loops between individuals and society are linked to the rise of anomic consumer behavior. (authors' abstract)
APA, Harvard, Vancouver, ISO, and other styles
2

Rozenbeek, David Jan. "Evaluation of Drone Neutralization Methods using Radio Jamming and Spoofing Techniques." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279557.

Full text
Abstract:
The usage of drones is steadily increasing as drones are becoming more available and useful to the general public, but drone usage also leads to problems as for example airports have had to shutdown due to drone sightings. It has become clear that a counter-drone system must be in place to neutralize intruding drones. However, neutralizing a drone is not an easy task, the risk of causing collateral damage and interfering with other radio systems must be highly considered when designing a counter-drone system. In this thesis a set of consumer drones was selected based on market popularity. By studying the wireless communication links of the selected drones a set of drone neutralization methods was identified. For each neutralization method a set of jamming and spoofing techniques was selected from current research. The techniques was used in practise by subjecting the drones to the techniques in a series of drone behaviour experiments. The results was used to evaluate the techniques in four criteria based on avoiding collateral damage, mitigating radio interference, identification requirement and handling multiple intruding drones. The evaluation was then summarized to discuss suitable drone neutralization methods and jamming & spoofing techniques. The results showed that there are neutralization methods that could potentially avoid causing col- lateral damage for certain drones. A full-band barrage jamming technique was shown to best the best performing based on the evaluation criteria, but was also the technique that theoretically induced the most radio interference. Furthermore, drones operating in way-point mode can only be neutralized using a GNSS jamming or spoofing neutralization method. Also using a GPS spoofing neutralization method was shown to be difficult to implement in practise.
Populariteten av att flyga drönare ökar stadigt i och med att drönartekniken blir mer tillgänglig och an- vändbart för allmänheten. Men användningen av drönare leder också till problem när till exempel flyg- platser har varit tvungna att stänga av på grund av drönar observationer. Det har blivit tydligt att ett anti-drönarsystem måste vara på plats för att neutralisera inkräktande drönare. Men att neutralisera en drönare är inte en enkel uppgift, risken för att orsaka sido-skador på personer, byggander eller objekt; eller störa andra radiosystem måste beaktas starkt när man utformar ett anti-drönarsystem. I detta examensarbete valdes en uppsättning konsumentdrönare ut baserat på marknadens popularitet. Genom att studera de trådlösa kommunikationslänkarna för de valda drönarna identifierades en uppsättning av drönar-neutraliseringsmetoder. För varje neutraliseringsmetod valdes en uppsättning av störnings- och spoofing-tekniker ut från aktuell forskning. Teknikerna användes i praktiken genom att utsätta drönarna för teknikerna i en serie drönar-beteendeexperiment. Resultaten användes sedan för att utvärdera teknikerna i fyra utvärderingskriterier baserade på att undvika sido-skador, mildra radiostörningar, identifieringsbehov och hantering av flera inkräktande drönare. Utvärderingen sammanfattades sedan för att diskutera lämpliga drönar-neutraliseringsmetoder och störnings- spoofing-tekniker. Resultaten visade att det finns neutraliseringsmetoder som potentiellt kan undvika att orsaka sido- skador eller radio-störningar för vissa typer av drönare. En full-bands störningsteknik visade sig vara bäst presterande baserat på utvärderingskriterierna, men var också den teknik som teoretiskt inducerade mest radiostörningar. Dessutom visades det att drönare som flyger i navigeringsläge endast kan neutraliseras med hjälp av en GNSS-störnings- eller spoofing metoder. Att använda en GPS-spoofing metod visade sig också vara svår att implementera i praktiken.
APA, Harvard, Vancouver, ISO, and other styles
3

Hankerson, Mario Bernard. "Athletic Participation: A Test of Learning and Neutralization Theories." [Johnson City, Tenn. : East Tennessee State University], 2002. http://etd-submit.etsu.edu/etd/theses/available/etd-1028102-000629/unrestricted/HankersonM111802b.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barnes, Collin Z. "AN INVESTIGATION INTO THE TECHNIQUES OF NEUTRALIZATION THEORY AND THEIR EFFECTS ON COMPULSIVE CONSUMPTION BEHAVIOR." MSSTATE, 2008. http://sun.library.msstate.edu/ETD-db/theses/available/etd-10312007-134110/.

Full text
Abstract:
Due to societal and economic costs caused by compulsive consumption behavior, specifically problem drinking and overeating, a search has been launched for a cognitive explanation for the deviant behaviors and the motivations that cause these behaviors to continue. This dissertation attempted to develop a better understanding of continued compulsive consumption behavior by investigating consumers use of the techniques of neutralization theory. Based on methodological concerns in neutralization research, the development of reliable and valid measures of the five techniques of neutralization theory were described and used to examine their moderation of compulsive consumption behavior and its relationship with social norm commitment and guilt. The dissertation resulted in developing four reliable and valid neutralization technique scales. The results of the structural model suggested a negative relationship between social norms and compulsive consumption behavior and a multiple regression indicated a partial moderation of certain neutralization techniques of this relationship. This dissertation has provided a better understanding of the cognitive process surrounding a consumers compulsive consumption behavior, the techniques used to allow the behavior to continue, and marketing applications to entice consumers to stop the behavior.
APA, Harvard, Vancouver, ISO, and other styles
5

Arvidson, Cody Jean. "The Anatomy of Academic Dishonesty: Cognitive Development, Self-Concept, Neutralization Techniques, and Attitudes Toward Cheating." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4641/.

Full text
Abstract:
This study explored the relationship between cheating among university students and their cognitive developmental levels, use of neutralization techniques, self-concept as a multifaceted cognitive construct, and attitude toward cheating. The purposes of this study were to investigate: (1) The relationships between academic dishonesty and each of the following overall independent variables: cognitive development, use of neutralization techniques, self-concept as a multifaceted cognitive construct, and attitude toward cheating, and (2) the reasons behind college student academic cheating behaviors. The study used data from anonymous, self-report surveys administered to undergraduate students in-class and at supplemental sessions. Student participation was voluntary. The study was correlational. The five hypotheses were: (1) Self-concept is significantly and negatively related to academic dishonesty; (2) Cognitive development is significantly and negatively related to academic dishonesty; (3) Attitude toward cheating is significantly and negatively related to academic dishonesty; (4) The use of neutralization techniques is significantly and positively related to academic dishonesty; (5) Cognitive development, self-concept, and attitude toward cheating will make significant contributions to the regression model for the dependent variables of academic dishonesty. The data supported the first, third, and fourth hypotheses. However, the second and fifth hypotheses were supported under certain conditions. The roles of cognitive development and self-concept in academic dishonesty represent major findings.
APA, Harvard, Vancouver, ISO, and other styles
6

Super, Mathew Anthony. "Why you might steal from Jay-Z an examination of filesharing using techniques of neutralization theory /." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Farrow, Melissa Ann. "Cytoplasmic Localization of HIV-1 Vif Is Necessary for Apobec3G Neutralization and Viral Replication: A Dissertation." eScholarship@UMMS, 2005. https://escholarship.umassmed.edu/gsbs_diss/75.

Full text
Abstract:
The binding of HIV-1 Vif to the cellular cytidine deaminase Apobec3G and subsequent prevention of Apobec3G virion incorporation have recently been identified as critical steps for the successful completion of the HIV-1 viral life cycle. This interaction occurs in the cytoplasm where Vif complexes with Apobec3G and directs its degradation via the proteasome pathway or sequesters it away from the assembling virion, thereby preventing viral packaging of Apobec3G. While many recent studies have focused on several aspects of Vif interaction with Apobec3G, the subcellular localization of Vif and Apobec3G during the viral life cycle have not been fully considered. Inhibition of Apobec3G requires direct interaction of Vif with Apobec3G, which can only be achieved when both proteins are present in the same subcellular compartment. In this thesis, a unique approach was utilized to study the impact of Vif subcellular localization on Vif function. The question of whether localization could influence function was brought about during the course of studying a severely attenuated viral isolate from a long-term non-progressor who displayed a remarkable disease course. Initial observations indicated that this highly attenuated virus contained a mutant Vif protein that inhibited growth and replication. Upon further investigation, it was found that the Vif defect was atypical in that the mutant was fully functional in in vitro assays, but that it was aberrantly localized to the nucleus in the cell. This provided the basis for the study of Vif localization and its contribution to Vif function. In addition to the unique Vif mutant that was employed, while determining the localization and replication phenotypes of the differentially localized Vif proteins, a novel pathway for Vif function was defined. Copious publications have recently defined the mechanism for Vif inhibition of Apobec3G. Vif is able to recruit Apobec3G into a complex that is targeted for degradation by the proteasome. However, this directed degradation model did not fully explain the complete neutralization of Apobec3G observed in cell culture. Other recent works have proposed the existence of a second, complementary pathway for Vif function. This pathway is defined here as formation of an aggresome that prevents Apobec3G packaging by binding and sequestering Apobec3G in a perinuclear aggregate. This second mechanism is believed to work in parallel with the already defined directed degradation pathway to promote complete exclusion of Apobec3G from the virion. The data presented here provide insight into two areas of HIV research. First, the work on the naturally occurring Vif mutant isolated from a long-term non-progress or confirms the importance of Vif in in vivo pathogenesis and points to Vif as a potentially useful gene for manipulation in vaccine or therapy design due to its critical contributions to in vivo virus replication. Additionally, the work done to address the subcellular localization of Vif led to the proposal of a second pathway for Vif function. This could have implications in the field of basic Vif research in terms of completely understanding and defining the functions of Vif. Again, a more complete knowledge about Vif can help in the development of novel therapies aimed at disrupting Vif function and abrogating HIV-1 replication.
APA, Harvard, Vancouver, ISO, and other styles
8

Maadarani, Mariah. "Inside the Black Box of Jail: Barriers to Change at the Ottawa-Carleton Detention Centre." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/41541.

Full text
Abstract:
The Ottawa-Carleton Detention Centre (OCDC) is notorious for its austere conditions of confinement and human rights violations. In response to widespread criticism, the Ontario provincial government created a dedicated task force in 2016 to address longstanding issues at the jail. To date, little research has examined how OCDC has maintained these deplorable conditions of confinement despite concerted effort to improve them. Drawing on Mathiesen’s (1990) neutralization techniques, this thesis reveals the tactics used by government officials and jail functionaries to maintain the status quo at OCDC and stifle transformative change by comparing task force recommendations with their ensuing implementation. Through a qualitative content analysis of the OCDC task force progress reports, trend analyses, Ombudsman, Community Advisory Board, Independent Review of Corrections, and Jail Accountability & Information Line reports documenting issues at OCDC, I demonstrate how the Ontario provincial government and OCDC administration (a) refer to competing demands, higher authority, policy and procedure, or safety and security as excuses for not instituting changes, (b) define policy alternatives as irrelevant or impossible to implement, (c) postpone implementation of measures for not being developed enough or possible now, as well as (d) puncture and (e) absorb policy alternatives to uphold the status quo and impede transformative change. In doing so, I expose the provincial penal system’s proclivity to ‘finish’ (Mathiesen, 1974) alternatives that threaten the current system, thereby gutting new ideas of their ability to generate meaningful social change. The insights provided by this thesis help lay the groundwork for future critical criminological research to examine the barriers to social change in the penal field on a sub-national, national, and international scale.
APA, Harvard, Vancouver, ISO, and other styles
9

Lundgren, Sørli Vanja. "In a Man´s World : Tolkninger av lovbrudd gjort i langtransportens yrkeskontekst." Doctoral thesis, Stockholm University, Department of Criminology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-520.

Full text
Abstract:

Criminological studies have shown that economical and/or occupational crimes are committed within all examined trades and occupations. This is also a fact in the gendered occupational context the Norwegian and Swedish long-distance trucking trade constitutes. This dissertation sets out to determine, by qualitative in-depth interviews with 24 interviewees and field observations, what certain gaining occupational and economical crimes mean to trade actors and how to interpret the meaning criminologically. A hermeneutical orientation constitutes the methodological and epistemological basis of the interpretation.

Analysis of the material shows two central consistent patterns in the interpretations made by interviewees and other trade actors:

1) The actors´ explanations of why law violations are committed. These are influenced by the actors´ view of how wide the specific violations are spread and influence the violation’s acceptability.

2) The actors´ normative evaluation of the law violations. The actors construct normative distinctions between normal, acceptable and unacceptable actions. The distinction is influenced by how the law violations are explained and how widespread they are considered to be.

The first pattern; actors interpretation of why law violations are committed, corresponds with explanations in established criminological theories. The actors’ explanations are discussed as techniques of neutralisation. However, explanations of cause of actions are established also in the discourse of trade-actors who do not violate laws, and a deeper interpretation is called for. A discussion about law violations, based on interviewees discourse, as caused by criminogenic structures are developed. The actors identify the structures as criminogenic and this discourse of coersive structures implies conservation of law violations as part of normality. An interpretation of why several but not all individuals violate laws even if the law violations considers to be normal and acceptable, is developed in terms of differential association.

However, solely use of established theoretical perspectives is not a sufficient interpretation of the law violations; the perspective of interpretation indicated by the second pattern will then be lost. Why is law violations considered both normal and deviant? This dissertation applies a gender-theoretical perspective and argues that actors constitute masculinity through acceptable law violations and that masculinity and normality are correlated. A cultural discourse of borders between normality and deviance is conserved and processed, and the actors discourses of law violations as without victims and as a necessity to continue as truckers, are central in the normalization of normative borders.

APA, Harvard, Vancouver, ISO, and other styles
10

Overall, Jeffrey Scott. "Rationalizing Ethically Questionable Intentions: An Investigation of Marketing Practices in the USA." Thesis, University of Bradford, 2012. http://hdl.handle.net/10454/6337.

Full text
Abstract:
In this research, a model for ethically questionable decision-making is developed by amalgamating several decision-making theories. The variables of interest are the techniques of neutralization, perceived moral intensity, Machiavellianism, unethical intentions, and ethical judgment. Using a sample of 276 U.S. marketing professionals, partial least squares structural equation modelling was used to validate the model. Findings reveal that U.S. marketing professionals rationalize their ethically questionable intentions through their: (1) perception of moral intensity (i.e., minimizing the harms on others, perceiving their self-interest as most salient, and indifference to social consensus), (2) reliance on various neutralization techniques, and; (3) judgment of their ethically questionable intentions as ethical. After controlling for the Machiavellian personality trait, Machiavellianism did not have a profound effect on the decision-making process, which implies that marketers, in general, are capable of the cognitive distortions found in this study. The main contribution to knowledge is the synthesis of the techniques of neutralization and the perceived moral intensity construct. Through this amalgamation, knowledge of the intermediary steps in the decision-making process has emerged. A contribution to knowledge involves testing the relationship between Machiavellianism and unethical intentions through the mediating variable of the techniques of neutralization. Through this investigation, it was found that the Machiavellian personality is inconsequential to the decision-making process. As a contribution to managerial knowledge, it was found that through cognitive distortions, marketers are capable of various illicit behaviours, which have been shown to be costly to not only stakeholders, but also to the profitability and reputations of organisations.
APA, Harvard, Vancouver, ISO, and other styles
11

Ream, Victoria R. "Big Energy, Environmental Crimes, and Sustainability: An Analysis of How Corporations Frame Environmental Issues amid Criminal Prosecutions." Ohio University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1492768049963644.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Abraham, Jonatan. "Assessing the threats against rural Sweden : An exploration of crimes against Swedish farmers related to animal production." Thesis, KTH, Urbana och regionala studier, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-278518.

Full text
Abstract:
In the discourse of crime and place, the focus has rarely fallen on rural crime. While experiencing comparably lower crime levels than urban counterparts, the common association with rural areas as being symbols of peace and friendly social interaction is not necessarily accurate. One group that often are thought of as inherently rural is farmers, who’s workplaces may possess certain unique vulnerabilities to crime compared to other locations. This thesis aims to obtain a better understanding of the threats against farmers related to animal production in a Swedish context, adding to the knowledge base regarding rural crime and sustainable development of rural and urban areas. The objectives of the study are: • to investigate the nature of the victimization of farmers devoted to animal production in Sweden, especially related the situational conditions of farms and rural areas. • to explore new data that could be used to approximate the scale of the threats against farmers using data from media archives from 2009 to 2019. This study reports types, frequency, and location of crimes against animal production with a focus on mink, rabbit and pig farms. Geographical Information Systems (GIS) is used to report the geography of these offences at municipal level. The theories of the routine activity approach and situational crime prevention are used to try to explain certain conditions that may facilitate crime on farms, while the offenders are explored using the theory on techniques of neutralization. The findings of the study show that the experience of the chosen actor’s varied greatly, but with crimes such as trespassing, vandalism and theft being common types of offenses across the board. The locations of the crime events were focused in the southern to mid of Sweden. Situational conditions that may have facilitated crime includes: the large size of farms and low population density providing low detection of crime, high value targets, and relatively high accessibility to the farms. From the data, mainly three techniques of neutralization were observed to be utilized: denial of the victim, denial of injury and appeal to higher loyalties. Multiple techniques were observed to be utilized together, while simultaneously exploiting situational conditions to facilitate the neutralization.
APA, Harvard, Vancouver, ISO, and other styles
13

Björklund, Rosario. "La traducción de los culturemas : Dificultades y soluciones en la traducción del sueco al español del estudio: "La imagen de Suecia en los medios de comunicación después de Stieg Larsson y Millennium"." Thesis, Linnéuniversitetet, Institutionen för språk (SPR), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-46265.

Full text
Abstract:
Translation is all about finding the similar word and expression in the target language ́s culture and to try to obtain the same message as the source text. What a translator does with a translation project from the source language to the target language includes a process where several elements interact: finding the correct terminology in the target culture and be able to transfer the connotation and the message to the reader in the target language. The aim of this investigation is to identify and analyze the difficulties that may appear in the process of translating cultural aspects between Swedish and Spanish. The source text is a Swedish study Mediebilden av Sverige efter Stieg Larsson och Millennium (Sweden beyond the Millennium and Stieg Larsson) by Joakim Lind (2012) that has been translated into Spanish. The purpose of this study is to investigate if the translation techniques neutralization and the cultural equivalent are most suitable to use in the translation of cultural elements. The results of the study showed what was expected from the beginning, that it was mostly these two translation techniques that were used: neutralization and the cultural equivalent, but in several cases it was necessary to use other techniques like literal translation. The process of translation cannot only depend on one or two translation techniques and the translator must be able to recognize when the appropriate technique should be used. In several cases it has to be a combination of two or three translation techniques to be able to reach a good final result of the translated text.
APA, Harvard, Vancouver, ISO, and other styles
14

Swartz, Erik. "Mänskligt beteende - ett ofrånkomligt hot mot informationssäkerhet?" Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44967.

Full text
Abstract:
Information har idag kommit att bli så viktigt att det av många aktörer kallas för den nya digitala oljan, och med anledning av just detta är information idag en av de främsta tillgångar en organisation kan besitta. För att skydda informationen lägger organisationer massiva summor pengar på tekniska och fysiska åtgärder. Tillsammans med dessa åtgärder utfärdas även interna bestämmelser och riktlinjer för hur IT-system och information får eller inte får hanteras. Trots detta sker både intrång och andra säkerhetsrelaterade incidenter som kan härledas till mänskligt felaktigt beteende, eller den så kallade mänsklig faktorn. I den här uppsatsen har därför författaren gjort en djupdykning i ämnet för att studera vilka samband som kan finnas mellan beteendevetenskapliga teorier och efterlevnad av informationssäkerhet. Med kvalitativa metoder har bland annat litteraturstudier genomförts för att ta reda på vilka teorier som är mest relevanta i sammanhanget. Intervjuer har sedan nyttjats för att bredda författarens uppfattning om vilka faktorer som kan påverka mänskligt beteende. De personer som intervjuats har bland varit yrkesverksamma som säkerhetschefer, säkerhetskyddshandläggare och ledande forskare inom det specifika området.
APA, Harvard, Vancouver, ISO, and other styles
15

Aku, Anizizo. "Role of Middle Managers in Mitigating Employee Cyberloafing in the Workplace." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3967.

Full text
Abstract:
Companies in the United States are concerned about the indeterminate effectiveness of corporate cyberloafing mitigation efforts leading to the persistence of employee cyberloafing behavior. Although middle managers are the driving force behind the transformational influences that guide employee productivity and could proffer practical solutions, a lack of clarity surrounds the middle manager's role in the overall cyberloafing mitigation efforts within organizations. The central research question for this transcendental phenomenological research study explored the lived experiences of middle managers regarding their roles in mitigating employee cyberloafing at higher education institutions in Florida. This study used a social constructivist-interpretive framework that draws from the multiple realities constructed through social interactions and lived experiences. Participants included 7 middle managers with experience mitigating cyberloafing at higher education institutions in Florida. Four major themes emerged from an inductive analysis of the data, including managing employee performance, proximity matters, cyberloafing interventions, and understanding employee online technology use. The results and recommendations of this study provide implications for social change. Business organizations may modify cyberloafing mitigation strategies and policies from a better understanding of manager/employee interactions, transformational managerial influences used to mitigate employee cyberloafing, and managerial knowledge of employee appropriation of online technology.
APA, Harvard, Vancouver, ISO, and other styles
16

Salah, Adham M. S. "Investigation of Integrated Decoupling Methods for MIMO Antenna Systems. Design, Modelling and Implementation of MIMO Antenna Systems for Different Spectrum Applications with High Port-to-Port Isolation Using Different Decoupling Techniques." Thesis, University of Bradford, 2019. http://hdl.handle.net/10454/18427.

Full text
Abstract:
Multiple-Input-Multiple-Output (MIMO) antenna technology refers to an antenna with multiple radiators at both transmitter and receiver ends. It is designed to increase the data rate in wireless communication systems by achieving multiple channels occupying the same bandwidth in a multipath environment. The main drawback associated with this technology is the coupling between the radiating elements. A MIMO antenna system merely acts as an antenna array if the coupling between the radiating elements is high. For this reason, strong decoupling between the radiating elements should be achieved, in order to utilize the benefits of MIMO technology. The main objectives of this thesis are to investigate and implement several printed MIMO antenna geometries with integrated decoupling approaches for WLAN, WiMAX, and 5G applications. The characteristics of MIMO antenna performance have been reported in terms of scattering parameters, envelope correlation coefficient (ECC), total active reflection coefficient (TARC), channel capacity loss (CCL), diversity gain (DG), antenna efficiency, antenna peak gain and antenna radiation patterns. Three new 2×2 MIMO array antennas are proposed, covering dual and multiple spectrum bandwidths for WLAN (2.4/5.2/5.8 GHz) and WiMAX (3.5 GHz) applications. These designs employ a combination of DGS and neutralization line methods to reduce the coupling caused by the surface current in the ground plane and between the radiating antenna elements. The minimum achieved isolation between the MIMO antennas is found to be better than 15 dB and in some bands exceeds 30 dB. The matching impedance is improved and the correlation coefficient values achieved for all three antennas are very low. In addition, the diversity gains over all spectrum bands are very close to the ideal value (DG = 10 dB). The forth proposed MIMO antenna is a compact dual-band MIMO antenna operating at WLAN bands (2.4/5.2/5.8 GHz). The antenna structure consists of two concentric double square rings radiating elements printed symmetrically. A new method is applied which combines the defected ground structure (DGS) decoupling method with five parasitic elements to reduce the coupling between the radiating antennas in the two required bands. A metamaterial-based isolation enhancement structure is investigated in the fifth proposed MIMO antenna design. This MIMO antenna consists of two dual-band arc-shaped radiating elements working in WLAN and Sub-6 GHz 5th generation (5G) bands. The antenna placement and orientation decoupling method is applied to improve the isolation in the second band while four split-ring resonators (SRRs) are added between the radiating elements to enhance the isolation in the first band. All the designs presented in this thesis have been fabricated and measured, with the simulated and measured results agreeing well in most cases.
Higher Committee for Education Development in Iraq (HCED)
APA, Harvard, Vancouver, ISO, and other styles
17

Nykänen, K. (Kari). "Tietoturvakoulutuksen vaikuttavuuden arviointi yksilön ja organisaation tietoturvakäyttäytymiseen." Doctoral thesis, Oulun yliopisto, 2011. http://urn.fi/urn:isbn:9789514295713.

Full text
Abstract:
Abstract Information security is a key factor supporting companies' security and business requirements, and it is significantly affected by the information security behavior of the employees. Previous research has studied empirically as to which factors explains employees' compliance with information security policies and instructions. However, there are only a few empirical studied on the effectiveness of information security training on the information security behavior of employees. Especially, studies examining the effect on training on employees' cyberloafing (non-work related Internet use) behavior are far and few between. To address this gap in research, this thesis carries out an action research study aimed at improving employees' cyberloafing behavior at an organizational context. The results suggest that cyberloafing can be reduced by a proper training
Tiivistelmä Tietoturva on keskeinen tekijä yrityksen kokonaisturvallisuuden ja liiketoiminnan tarpeiden tukemisessa, johon henkilökunnan tietoturvakäyttäytyminen vaikuttaa hyvin merkittävästi. Yksilön tietoturvakäyttäytymistä ja tietoturvapolitiikan ja -ohjeistuksien noudattamista on tutkittu empiirisesti vahvojen teoreettisten taustojen pohjalta. Tutkimustulokset ovat osoittaneet, että yksilön normeista ja ohjeistuksista poikkeava käyttäytyminen on vahvasti sidoksissa henkilökohtaisiin tapoihin, joita puolustellaan ja selitetään erilaisilla syillä. Tietoturvakoulutuksen vaikuttavuutta yksilön ja organisaation tietoturvakäyttäytymiseen on tutkittu empiirisesti hyvin vähän. Työhön liittymättömän Internetin käytön kontekstissa tehtyjä tutkimuksia on vain muutamia, ja niissä on selvitetty käytön motivaatiota ja käyttäjien profilointia. Tietoturvakoulutuksen vaikutusta yksilön työhön liittymättömän Internet-käyttäytymisen muuttamiseen ei ole aikaisemmin tieteellisesti tutkittu. Tässä väitöskirjassa tutkitaan tätä ajankohtaista kansainvälisen tutkijayhteisön tiedostamaa ongelmaa. Tutkimus suoritetaan noudattaen toimintatutkimusmallia kahdessa vaiheessa, joista toisessa sovelletaan kokeellista tutkimusmenetelmää. Pitkittäistutkimuksen ensimmäisessä vaiheessa tutkitaan organisaation tietoturvakäyttäytymistä ja -toimintaa. Tämän perusteella suunnitellaan koulutusmenetelmä, jonka avulla pyritään ratkaisemaan organisaation tietoturvatoiminnan keskeiset ongelmat ja parantamaan yksilön tietoturvatietoisuutta. Toisessa vaiheessa koulutusmenetelmää kehitetään ja laajennetaan koko organisaation henkilökunnan tasolle, minkä tavoitteena on muuttaa yksilön työhön liittymätöntä Internet-käyttäytymistä. Tutkimuksessa sovelletaan kriminologiaan pohjautuvaa neutralisoimisteoriaa ja sosiaalipsykologian tapateoriaa, joiden avulla pyritään selittämään yksilön työhön liittymätöntä Internet-käyttäytymistä. Tietoturvakoulutuksen laadinnassa sovelletaan oppimisen psykologiaa, sosiokonstruktiivista oppimisnäkemystä ja muutos-johtamista. Tutkimustulokset tarjoavat uutta tietoa siitä, mitä tulee huomioida laadittaessa organisaation tietoturvakoulutusta ja miten huolellisesti laaditun koulutuksen avulla voidaan muuttaa yksilön työhön liittymätöntä Internet-käyttäytymistä. Koulutuksen avulla pyritään vaikuttamaan yksilön syvälle juurtuneisiin tapoihin, käyttäytymiseen ja vastuunottamiseen omasta toiminnasta
APA, Harvard, Vancouver, ISO, and other styles
18

Forde, Hugh Anthony. "Evaluation of a stress inoculation training program at an Ohio male correctional institution." Connect to resource, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1117557647.

Full text
Abstract:
Thesis (Ph.D.)--Ohio State University, 2005.
Title from first page of PDF file. Document formatted into pages; contains ix, 129 p.; also includes graphics. Includes bibliographical references (p. 120-129). Available online via OhioLINK's ETD Center
APA, Harvard, Vancouver, ISO, and other styles
19

Roebuck, Benjamin S. "Exclusion and Resilience: Exploring the Decision-Making Processes of Young People Who Are Homeless." Thèse, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/30710.

Full text
Abstract:
Young people who are homeless experience adversity, but many are able to overcome the challenges of street life and transition back into housing. This exploratory, qualitative research draws on the narratives from interviews and focus groups with 35 young people who have experienced homelessness, as well as interviews and focus groups with 30 service providers working in youth shelters and a youth drop-in centre. Exploring themes of victimization, criminal offending, police involvement, and interactions with community services, this research highlights the capacities of young people to navigate around obstacles and negotiate to meet their needs. Integrating symbolic interactionism and social constructivist perspectives, this research explores the importance of micro-level interactions and perceptions, as well as the contexts that frame the decision-making processes of young people passing through homelessness. The implications of these perspectives are discussed within the framework of resilience discourse.
APA, Harvard, Vancouver, ISO, and other styles
20

Schoultz, Isabel. "Controlling the Swedish state : Studies on formal and informal bodies of control." Doctoral thesis, Stockholms universitet, Kriminologiska institutionen, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-110050.

Full text
Abstract:
The dissertation aims to develop an understanding of the outcomes and limitations of formal and informal control of the Swedish state, and of the positions and strategies of the social agents involved in this field. The dissertation contributes with new perspectives on controls directed at the state, comparing various control organs (the Parliamentary Ombudsman, the Chancellor of Justice, the United Nations, the European Court of Human Rights and NGOs) and focusing on a wide range of wrongs and harms by the Swedish state. Paper I explores incidents for which the Swedish state and its agencies have been judged to be responsible by formal control organs. Paper II analyzes the accounts used by state representatives in judgments from formal control organs on issues related to migration. Paper III examines the characteristics of those who hold the state accountable via the European Court. Paper IV explores how formal and informal control organs frame problems in relation to the Swedish state’s treatment of residence permit applicants. The studies demonstrate that formal domestic control organs mainly direct criticisms at state agencies that focus on particular and procedural issues. International bodies of formal and particularly informal control publish criticisms of the state that focus on general and systemic issues. The dissertation highlights how control organs offer limited access to accountability, and how controls of the state may be perceived as both ineffective and counterproductive. Another conclusion is that the positions and strategies of the agents in this field are dependent on their specific capital (resources, knowledge and support). Control of the state is understood as a field of struggle for recognition and legitimacy, in which accusations are denied by representatives of the state and control organs balance their criticism in order to maintain credibility. Both informal control organs and those who hold the state accountable must adjust to the rules of the game or risk being defined out.

At the time of the doctoral defense, the following paper was unpublished and had a status as follows: Paper 4: Manuscript.

APA, Harvard, Vancouver, ISO, and other styles
21

Huang, Hui-Lin, and 黃惠玲. "Techniques of Neutralization for White-collar Criminals." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/47791962875866931512.

Full text
Abstract:
碩士
國立臺北大學
犯罪學研究所
95
By definition, white -collar criminals have higher socio-economic status than blue-collar criminals. Criminals with high SES tend to commit financial related crimes which are in nature different from violent crimes such as murder, burglary, robbery and so on. White collar criminals often “creatively”steal money from the public or government without any intention of using physical force. There is a public perception that such crimes are victimless, have low visibility, and are indeed harmless. The present study investigates the techniques of neutralization that white collar criminals employ when they commit their crimes. Five well known financial crimes committed by shareholders, professionals and managers were selected in the study. All resulted in guilty verdicts at district courts. Using Sykes and Matza’s idea of “techniques of neutralization”, the study collected the indictment and trial documents for these five cases and analyzed how the processes were employed in court. The results indicated that other than the five techniques mentioned in Sykes and Matza’s work, there are two more techniques often used by these ‘white-collar’professionals, namely, seeking to enhance profits for the company (a ‘worthy’ motive) and also the idea of simply‘professional judgment’ at that moment. Further suggestions are discussed in this study.
APA, Harvard, Vancouver, ISO, and other styles
22

Chang, Chia-Yi, and 張嘉益. "A Study on Tourist Harassment Perspective from the Techniques of Neutralization." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/90688802882729551926.

Full text
Abstract:
碩士
高雄餐旅學院
旅遊管理研究所
98
Visitors may receive pushing up price, promote by force, even the negative experience of buying the faulty goods of street peddler, driver, guide or locals while travelling. This kind of harassing phenomenon, not only influences travel quality but also threaten the image of the tourist city at the same time. From a perspective of Neutralization, it is caused by influence of the external social environment, and harassment source does not think the damage that one''s own behavior causes is damaging. Tourist harassment source does not make a self-criticism, but blaming the person punishing him instead. This research gathering all tourist harassment phenomenons in Taiwan together, i.e. the speech harassment, the body harassment and harassment with the freedom will. According to the techniques of neutralization, one would rationalize his/her behavior by subsequent seven points of view: denial of responsibility, denial of injury, denial of the victim, condemnation of the condemners, appeal to higher loyalties, claim to entitlement and everyone else is doing it. This research emphasizes that what causes the service providers in tourism industry become source of tourist harassment. By exploring of tourist harassment, we shall stop this kind of phenomenon, Also, educating the tourism service staff members, resident and all the other interested parties, in order to raise the quality level, generate more economic incomes, encourage better social interactions, and even realize the vision of environmental, social and economic sustainability.
APA, Harvard, Vancouver, ISO, and other styles
23

Jui-Min, Chen, and 陳瑞旻. "A Study on the use of Neutralization Techniques by Drunk Driving Offenders." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/5e65ry.

Full text
Abstract:
碩士
國立中正大學
犯罪防治研究所
106
This research aims to explore the behaviors of repeated offenders of driving under the influence of alcohol (DUI offenders) through the Neutralization Theory. The study makes an attempt to interpret how DUI offenders utilize the techniques of neutralization and compare the differences in their tendency to neutralize their behaviors and the techniques of neutralization they used in different situations, such as with/without victims and numbers of times arrested for DUI. Further study also analyzed the differences among DUI offenders in the tendency to neutralize their behaviors under different background variables, levels of knowledge in the laws, psychological attributes and types of dependency. In recent years, incidents associated with drunk driving have been frequently reported and many of these perpetrators were repeated offenders. Although the government enforced the “three strike clause”, reinforced DUI patrol and surveillance and organized a series of DUI seminars, expecting to achieve effective prevention through policies, law enforcement and consultation, the effectiveness of these measures is still yet to be verified. In view of which, this research makes an attempt to explore the behaviors of DUI offenders, using the Neutralization Theory to analyze whether repeated offenders have the tendency to neutralize and rationalize their behaviors through the neutralization techniques. Results of this research will provide suggestions and recommendations to the competent authority for future policymaking on DUI prevention. This research developed its studies from the five dimensions proposed by Sykes & Matza (1957) in the Neutralization Theory (denial of responsibility, denial of injury, denial of the victim, condemnation of the condemners and appeal to higher loyalties), the defense of necessity (Minor, 1981;Maruna & Copes, 2005) and the claim of normalcy (Coleman, 1985). Study subjects were sampled from the detained DUI offenders and those mandated to participate in DUI seminars through purposive sampling. A control group was also sampled from the general public. The studies found significant differences between the DUI and control groups, and people who are older and have lower level of education show higher tendency to neutralize their behaviors. Further analysis found statistical significance in “agreeing with the laws” and “understanding of the laws”. DUI offenders who responded with higher level of agreement with the laws or understanding of the laws have lower tendency to neutralize their behaviors. Furthermore, DUI offenders who have 2 to 3 records have higher tendency to neutralize their behaviors than the first-time offenders. This result indicates that offenders who have committed the offense two or more times tend to “permit” themselves of such conducts through neutralization. Among the repeated offenders, those who have 4 or more records use “denial of injury” and “denial of the victim” techniques more often than offenders with 2 to 3 records. This indicates that repeated DUI offenders tend to defend themselves by saying, “There is no crime, since no one is hurt (denial of injury)” or “I didn’t mean to drive after drinking. I have no choice (denial of responsibility).” Based on the results, our recommendation for future DUI prevention policy is to start relevant education from young. Once the correct concept is instilled in the cognitive development of all citizens, they will be able to judge their own conducts and carry out safe and law-binding behaviors. Our recommendations for correction of DUI behaviors include the following: 1. Design counseling courses to reinforce DUI offenders’ sense of legal conformity and understanding of the punishments for DUI offenses. 2. Plan in-depth counseling strategies for repeat DUI offenders, emphasizing their responsibilities and the safety concerns associated with drunk driving. 3. Increase the number of the mandated DUI prevention courses, highlighting the danger and responsibilities involved in DUI to achieve the change of perception and behavior.
APA, Harvard, Vancouver, ISO, and other styles
24

Fukukawa, Kyoko, M.-M. Zaharie, and A.-I. Romonti-Maniu. "Neutralization techniques as a moderating mechanism: ethically questionable behavior in the Romanian consumer context." 2018. http://hdl.handle.net/10454/16561.

Full text
Abstract:
Yes
Based on an empirical investigation in the context of Romania, this paper identifies a moderating role of neutralization techniques within ethically questionable consumer behavior. The quantitative study is based upon a synthesized model of Theory of Planned Behavior incorporating the factor of perceived unfairness and neutralization techniques. Significantly, neutralization techniques are shown to have a negative, but definite impact on the action to behave unethically. This leads to their consideration as a process of thinking, rather than as static judgement. As such, neutralization techniques are conceptually distinctive to the other factors. The paper analyses the results specific to the Romanian context, but noting implications for an understanding of the morality of markets with similar historical, political and economic conditions. Overall, the findings offer a more nuanced reading of consumer behavior. The paper places moral flexibility in terms of a specific cultural context, but also reveals how neutralization techniques can moderate ethically questionable behaviors beyond matters of self-interest, which in turn has implications for how companies can consider their responsibilities in relation to their customers.
APA, Harvard, Vancouver, ISO, and other styles
25

Schneider, Hendrik. "Cognitive dissonance as a prevention strategy: considerations on the prospects of neutralizing the techniques of neutralization." 2017. https://ul.qucosa.de/id/qucosa%3A16207.

Full text
Abstract:
In the light of Michael Walters’s declarations on the relationship of the perpetrator to the offense based on the theory of techniques of neutralization the article sets its sights on the structuring of in-house compliance programs in order to ensure internally prevention measures. In doing so the author states that those compliance programs should primarily rely on creating an atmosphere in which common neutralization strategies are not accepted. In order to be successful the companies need in-depth programs, which are goal-oriented. But there has to be a company interest in compliance as well. The “tone from the top” plays an important role when it comes to neutralization strategies. The essay shows the meaning of techniques of neutralization within the area of applied economic criminology.
APA, Harvard, Vancouver, ISO, and other styles
26

KO, I.-WEN, and 柯意雯. "The Techniques of Neutralization and the Violation of the “Fair Use” of Copyright Law among School Teachers." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/16117533595169656997.

Full text
Abstract:
碩士
國立臺北大學
犯罪學研究所
104
Among the various high school teaching methods, the most popular one among teachers is to play audio and video media in the classroom. However, teachers often overlook the possible violation of the Copyright Law, particularly the “fair use” article, when they do so. Previous literature regarding "fair use" of copyright law mainly focuses on the comparative experiences across countries, with very little discussion about the main users or the “norms” of the users. Nor has previous research explored the motivation of such users. A questionnaire was designed by the author based on two constructs: the extent of awareness of illegality of such acts and the techniques of neutralization to analyze the reasoning school teachers employ when they played unauthorized audio or video in classroom. 300 Taipei City and New Taipei City Junior High School Teachers were sampled. Main findings are (1) Teaching subject was significantly associated with unawareness of their illegal acts, neutralization techniques and actual violations of copy right among teachers; (2) the more highly educated teachers are, the more neutralization, and more engagement in infringing copyright in classroom; (3) there are significant relationships between unawareness of illegality, the techniques of neutralization and actual engagement in infringing copyright; and finally (4) the higher unawareness of illegality, the higher neutralization techniques teachers are, furthermore, neutralization, particularly is significant for the “appeal to higher loyalties” as a mediator between unawareness of illegality and the actual violation of copyright among teachers. This study recommends prevention measures for schools and teachers, including enhancing the legal knowledge of school teachers. On the other hand, the study also calls for a re-thinking of the balance of copyright law and the wider public interest. Without rich resources and budgets, schools and teachers cannot possibly afford to buy the copyrights of all video and audio for teaching. This study argues that there should a sufficient flexibility in law to allow teachers to use them in a “fair” way and for the sake of education. Keywords:copyright law, “fair use” article, unawareness of illegal acts, the Techniques of Neutralization
APA, Harvard, Vancouver, ISO, and other styles
27

WANG, YING-YA, and 王盈雅. "The Relations among the Evaluation of the Benefits of Delinquency, Techniques of Neutralization, Deviant Peer Associations, and Junior High School Students' Delinquency." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/22247314255996894355.

Full text
Abstract:
碩士
南華大學
應用社會學系教育社會學碩士班
105
The main purpose of this study was to investigate the relationship among the relationship among the evaluation of the benefits of delinquency, techniques of neutralization, deviant peer associations, and junior high school students’ de-linquency. Self-report questionnaire was used to collect data. The sample in this study consisted of 869 students from 12 junior high schools in Chiayi City, Yunlin County, and Chiayi County. The statistical methods of this study included descriptive statistics, correlation analysis, and regression analysis.   The results of this study were summarized as follows: (1) The psychological benefits of delinquency had significant impacts on delinquency; (2) The techniques of neutralization such as denial of victim, condemnation of condemner, and appeal to higher loyalties were related to delinquency; (3) Deviant peer associations had positive impacts on delinquency.   Finally, the detailed results and suggestions for further research and implementation were discussed.
APA, Harvard, Vancouver, ISO, and other styles
28

Gordon, Shanlea. "FEAR AND LOATHING IN THE HOOKUP CULTURE: A STUDY OF FEMALE ENGAGEMENT IN NON-RELATIONAL SEX ON A UNIVERSITY CAMPUS." Thesis, 2013. http://hdl.handle.net/1974/8136.

Full text
Abstract:
Recent empirical evidence suggests that we have entered a new period of courtship known as the hookup era. Contemporary research which explores hooking up has confirmed the prevalence of this dating script, particularly within post-secondary institutions. The relevant literature has focused on a variety of important issues including the conceptual meaning of hooking up and the identification of potential correlates and consequences of these behaviours. Despite this increase in scholarly interest, several problems remain unaddressed. Principal among these is the way(s) in which young women mediate the self-perceived risks involved in the sexual exchange known as the hookup, so as to facilitate their participation in this culture. The current paper examines the controversy that is female hookup participation by investigating the risks – and subsequent negotiation of these risks – which women face in the hookup culture. Specifically, this paper makes use of detailed qualitative data gathered from a sample of female undergraduate students at a medium-sized Canadian university, in order to uncover the social processes by which female proponents of the hookup culture account for their actions to themselves and to others, in this the seemingly risky courtship script.
Thesis (Master, Sociology) -- Queen's University, 2013-07-31 19:46:46.027
APA, Harvard, Vancouver, ISO, and other styles
29

Chiu, Ren-Geng, and 邱稔耕. "Design of Power Amplifiers Using Transformer Coupling And Neutralization Capacitor Technique." Thesis, 2019. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22107NCHU5441050%22.&searchmode=basic.

Full text
Abstract:
碩士
國立中興大學
電機工程學系所
107
This thesis aims to explore the design of power amplifiers using transformer coupling. The implemented chip uses the TSMC 90nm CMOS and 40nm CMOS process technology support provided by the TSRI. In the design of the power amplifier part is designed with power combination technology, the content contains the principle introduction, circuit and component design, simulation analysis, wafer measurement, results discussion. Firstly, the development of the RF circuit and the derivation of the relevant formula of the power amplifier are introduced. Then, the parameters used in this paper are introduced, and finally the various structures of the power amplifier are analyzed. Power amplifier design uses transformer-coupled structure for power dividing and combining, which also includes impedance matching function, which analyzes the principle, circuit structure, simulation, measurement and summary of the designed circuit. The circuit design structure of this paper is similar, one is the power amplifier designed in the W band, and the other is to increase the frequency design to the D band. Both circuit designs utilize the characteristics of the differential circuit plus the neutralization capacitor to increase stability, and there is no risk of oscillation during measurement and simulation. Finally, the research results of each chapter are summarized, and the problems found are discussed and improved, and the future research is improved.
APA, Harvard, Vancouver, ISO, and other styles
30

Marzudi, W. N. N. W., Z. Z. Abidin, S. Z. M. Muji, Y. Ma, and Raed A. Abd-Alhameed. "Minimization of Mutual Coupling Using Neutralization Line Technique for 2.4 GHz Wireless Applications." 2015. http://hdl.handle.net/10454/9195.

Full text
Abstract:
No
This paper presented a planar printed multiple-input-multiple-output (MIMO) antenna with a dimension of 100 x 45 mm2. It composed of two crescent shaped radiators placed symmetrically with respect to the ground plane. Neutralization line applied to suppress mutual coupling. The proposed antenna examined both theoretically and experimentally, which achieves an impedance bandwidth of 18.67% (over 2.04-2.46 GHz) with a reflection coefficient < -10 dB and mutual coupling minimization of < -20 dB. An evaluation of MIMO antennas is presented, with analysis of correlation coefficient, total active reflection coefficient (TARC), capacity loss and channel capacity. These characteristics indicate that the proposed antenna suitable for some wireless applications.
APA, Harvard, Vancouver, ISO, and other styles
31

Marzudi, W. N. N. W., Z. Z. Abidin, S. Z. M. Muji, Ma Yue, and Raed A. Abd-Alhameed. "Minimization of Mutual Coupling Using Neutralization Line Technique for 2.4 GHz Wireless Applications." 2014. http://hdl.handle.net/10454/8467.

Full text
Abstract:
Yes
This paper presented a planar printed multiple-input-multiple-output (MIMO) antenna with a dimension of 100 x 45 mm2. It composed of two crescent shaped radiators placed symmetrically with respect to the ground plane. Neutralization line applied to suppress mutual coupling. The proposed antenna examined both theoretically and experimentally, which achieves an impedance bandwidth of 18.67% (over 2.04-2.46 GHz) with a reflection coefficient < -10 dB and mutual coupling minimization of < -20 dB. An evaluation of MIMO antennas is presented, with analysis of correlation coefficient, total active reflection coefficient (TARC), capacity loss and channel capacity. These characteristics indicate that the proposed antenna suitable for some wireless applications.
APA, Harvard, Vancouver, ISO, and other styles
32

Junqueira, Gabriel Marson. "A prevenção da corrupção na administração pública (contributos criminológicos, do corporate compliance e public compliance)." Master's thesis, 2018. http://hdl.handle.net/10316/85801.

Full text
Abstract:
Dissertação de Mestrado em Direito apresentada à Faculdade de Direito
Currently, some studies already propose that the public compliance incorporates the lessons learnt in the context of the corporate compliance, which has developed most in recent decades. At the same time, as the compliance was incorporated in the universe of criminal law, in the direction of the principles of a “global science of the criminal law”, it seems to be useful checking the contributions which can be provided by criminology in order to its improvement. The aim is to check which contributions for the public compliance improvement can be provided by criminology and by the corporate compliance, specially outlining guidelines for the improvement of the prevention of bribery in the public administration. White-collar crime theory, situational crime prevention perspective and techniques of neutralization are analysed. The corporate compliance is subsequently examined in its essential aspects and elements (compliance-culture, institutionalization, gap analysis, compliance programme and internal investigation procedure). Some guidelines for the improvement of public compliance are outlined at the end. The contributions provided by criminology has primarily focused on the compliance-culture, the gap analysis and the compliance programme. It was possible to notice a greater weight of the corporate compliance contributions in public compliance institutionalization, in internal investigation procedures and in the incentives for the adoption by the public sector of an effective system to prevention and detection of irregularities. A better definition of these incentives, in the frame of public compliance, deserves, however, a deep approach.
Atualmente, alguns autores já propõem que o public compliance – entendido, numa primeira aproximação, como conjunto sistemático de medidas tendentes a garantir que todos os agentes públicos ajam, no âmbito da Administração Pública, em conformidade com o ordenamento jurídico-penal – assimile lições aprendidas, nas últimas décadas, no âmbito do corporate compliance, por ter este se desenvolvido mais no período. Ao mesmo tempo, como o compliance foi integrado ao universo penal, na perspectiva de uma “ciência conjunta do direito penal”, parece natural a verificação de contribuições que podem ser prestadas pela criminologia para seu aprimoramento. O objetivo, aqui, é examinar algumas contribuições para o aprimoramento do public compliance que podem ser extraídas da criminologia e do corporate compliance, com a expectativa de esboçar, em seguida, diretrizes para o aperfeiçoamento da prevenção da corrupção na Administração Pública. São analisadas as teorias do crime de colarinho branco, da prevenção situacional do delito e das técnicas de neutralização da culpa. O corporate compliance, na sequência, é examinado, em seus aspectos e elementos essenciais (cultura de compliance, institucionalização, análise de riscos, programa de compliance e procedimento de investigação interna). Algumas diretrizes para o aperfeiçoamento do public compliance são, ao final, esboçadas. As contribuições prestadas pela criminologia centraram-se sobretudo na implantação de uma cultura de compliance, na análise de riscos e na organização do programa de compliance. Foi possível notar um peso maior das contribuições do corporate compliance na institucionalização do public compliance, no desenho de procedimentos de investigação interna e nos estímulos para a adoção, pelo setor público, de um sistema eficaz de prevenção e detecção de delitos. Uma melhor definição de tais estímulos, no marco do public compliance, merece, todavia, futuro aprofundamento.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography