To see the other types of publications on this topic, follow the link: Techniques of neutralization.

Journal articles on the topic 'Techniques of neutralization'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Techniques of neutralization.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

AGNEW, ROBERT, and ARDITH A. R. PETERS. "The Techniques of Neutralization." Criminal Justice and Behavior 13, no. 1 (March 1986): 81–97. http://dx.doi.org/10.1177/0093854886013001005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

SAMPSON, ROBERT J. "Techniques of Research Neutralization." Theoretical Criminology 3, no. 4 (November 1999): 438–51. http://dx.doi.org/10.1177/1362480699003004004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kaptein, Muel, and Martien van Helvoort. "A Model of Neutralization Techniques." Deviant Behavior 40, no. 10 (December 1, 2018): 1260–85. http://dx.doi.org/10.1080/01639625.2018.1491696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

AGNEW, ROBERT. "THE TECHNIQUES OF NEUTRALIZATION AND VIOLENCE." Criminology 32, no. 4 (November 1994): 555–80. http://dx.doi.org/10.1111/j.1745-9125.1994.tb01165.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jantz, Paul B., and Richard H. Morley. "Techniques of Neutralization: A Brain Network Perspective." International Journal of Offender Therapy and Comparative Criminology 62, no. 9 (October 6, 2017): 2759–80. http://dx.doi.org/10.1177/0306624x17735045.

Full text
Abstract:
Sykes and Matza introduced neutralization theory in 1957 to explain how juvenile delinquents retain a positive self-image when engaging in delinquent acts. Since then, aspects of neutralization theory have been incorporated into sociological and criminological theories to explain socially deviant behavior. Functional brain mapping research utilizing advanced magnetic resonance imaging techniques has identified complex, intrinsically organized, large-scale brain networks. Higher order operations commonly attributed to three brain networks (default mode network [DMN], central executive network [CEN], salience network [SN]) align closely with neutralization theory. This article briefly discusses brain networks in general and the DMN, CEN, and SN specifically. It also discusses how these networks are involved when engaging in the use of techniques of neutralization and offers implications for future research.
APA, Harvard, Vancouver, ISO, and other styles
6

K., Chandrashekar, and A. M. Manjunatha. "Tactical Neutralization Techniques of Track and Field Essentials For Educators and Mentors." International Journal of Physical Education & Sports Sciences 13, no. 1 (January 1, 2018): 29–32. http://dx.doi.org/10.29070/13/56094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Munoz, Laura, and Michael Mallin. "Unethical sales behavior neutralization: the impact of salesperson role variables and moderating effects of role relationship orientation." Journal of Business & Industrial Marketing 34, no. 1 (February 13, 2019): 62–79. http://dx.doi.org/10.1108/jbim-10-2017-0243.

Full text
Abstract:
Purpose The purpose of this paper is to explore the relationship between salesperson role perceptions and use of neutralization techniques, given the relationship orientation of the salesperson. Direct relationships between salesperson role conflict, role ambiguity, role task self-efficacy and a salesperson’s propensity to use neutralizations to attribute their unethical selling behavior are tested. The moderating effects of role-relationship orientation on the aforementioned relationships are also explored Design/methodology/approach Survey data were collected from 163 (cross-industry, B2B/B2C non-retail) salespeople. Results were analyzed and seven hypotheses were tested using SmartPLS to estimate and evaluate a (partial least squares) structural model. Findings The study findings conclude that role ambiguity, role task self-efficacy and role relationship orientation directly impact a salesperson’s tendency to use neutralization techniques to justify unethical sales behavior. Role relationship orientation serves to moderate the relationship between role conflict and neutralization use. Research limitations/implications This research integrates attribution and role theories to isolate the conditions where salespeople are prone to use neutralization techniques to justify their unethical behavior. Salesperson role relationship orientation is explored to understand the moderating effects on the salesperson role–neutralization relationships. Practical implications Sales managers are provided guidance (e.g. training and coaching) to help salespeople navigate feelings of negative role perceptions (role conflict, role ambiguity, role self-efficacy) to minimize the impact on justification of unethical sales behaviors. Originality/value This research builds on the sales and ethics literatures by incorporating role and attribution theory to better understand how salespeople approach dealing with their own unethical behavior and the implications on maintaining relationships with their customers.
APA, Harvard, Vancouver, ISO, and other styles
8

Swanepoel, R., J. K. Struthers, M. J. Erasmus, S. P. Shepherd, G. M. McGillivray, B. J. Erasmus, and B. J. H. Barnard. "Comparison of techniques for demonstrating antibodies to Rift Valley fever virus." Journal of Hygiene 97, no. 2 (October 1986): 317–29. http://dx.doi.org/10.1017/s0022172400065414.

Full text
Abstract:
SummaryNine serological techniques were compared by monitoring the response to infection with Rift Valley fever (RVF) virus in three sheep. Antibodies were monitored daily for the first 14 days after infection, then weekly and later fortnightly up to week 24. The earliest antibody response was detected in one sheep on day 3 by a plaque reduction neutralization test, and by day 6 antibodies were demonstrable in all three sheep by haemagglutination-inhibition, reversed passive haemagglutination-inhibition, immunodiffusion, indirect immunofluorescence (IF), enzyme-linked immunosorbent assay and neutralization of cytopathic effect in cell cultures. Antibodies were demonstrable by complement fixation on day 8 at the earliest. IF and the two neutralization techniques produced the highest titres, but all tests could be used satisfactorily for the serological diagnosis of RVF. Inactivated antigen could be used for all except the neutralization tests. A radioimmunoassay technique using125I-labelIed staphylococcal protein A detected antibodies on day 8 at the earliest and produced lower mean titres than some of the other techniques. This was probably because sheep immunoglobulins bind protein A poorly.
APA, Harvard, Vancouver, ISO, and other styles
9

Shoenberger, Nicole, Alex Heckert, and Druann Heckert. "Techniques of Neutralization Theory and Positive Deviance." Deviant Behavior 33, no. 10 (November 2012): 774–91. http://dx.doi.org/10.1080/01639625.2012.707497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liddick, Don. "Techniques of Neutralization and Animal Rights Activists." Deviant Behavior 34, no. 8 (August 2013): 618–34. http://dx.doi.org/10.1080/01639625.2012.759048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Vitell, Scott J., and Stephen J. Grove. "Marketing ethics and the techniques of neutralization." Journal of Business Ethics 6, no. 6 (August 1987): 433–38. http://dx.doi.org/10.1007/bf00383285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Teh, Pei-Lee, Pervaiz K. Ahmed, and John D'Arcy. "What Drives Information Security Policy Violations among Banking Employees?" Journal of Global Information Management 23, no. 1 (January 2015): 44–64. http://dx.doi.org/10.4018/jgim.2015010103.

Full text
Abstract:
Employees' information security policy (ISP) violations are a major problem that plagues organizations worldwide, particularly in the banking/financial sector. Research shows that employees use neutralization techniques to rationalize their ISP violating behaviors; it is therefore important to understand what leads to and influences these neutralization techniques. The authors' study draws upon social exchange theory to develop a set of factors that drive employees' neutralization of ISP violations. The model specifies previously untested relationships between job satisfaction, organizational commitment, role conflict, role ambiguity, and neutralization techniques. Using a sample of Malaysian banking employees, the authors found a positive relationship between role conflict and neutralization of ISP violations, whereas organizational commitment was negatively related to neutralization in this context. The authors' findings offer fresh insights for scholars and practitioners in dealing with the problem of employees' intentional ISP violations while extending the reach of neutralization theory beyond North American and European cultures.
APA, Harvard, Vancouver, ISO, and other styles
13

Ugelvik, Thomas. "Prisoners and their victims: Techniques of neutralization, techniques of the self." Ethnography 13, no. 3 (February 8, 2012): 259–77. http://dx.doi.org/10.1177/1466138111435447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Li, Jessica C. M., and Joseph Wu. "Validating an Indigenous Scale Measuring Neutralization Techniques among Chinese Juvenile Thieves." Psychological Reports 111, no. 3 (December 2012): 971–84. http://dx.doi.org/10.2466/16.02.09.pr0.111.6.971-984.

Full text
Abstract:
Despite a large number of studies with Western samples on neutralization among juvenile offenders, similar investigations on this phenomenon in Chinese society are lacking. This paper aims to fill this gap in the literature by constructing a scale to measure the use of neutralization during offenses by Chinese juvenile offenders. A scale consisting of 13 items falling under 3 subscales, with a Cronbach's alpha ranging from .48 to .73 was used in a survey interview of 200 Chinese juveniles (95 boys, 105 girls; M age = 13.6 yr., range = 10–17) who had been arrested by the police for commission of theft. The data highlight the importance of not only developing and validating a measurement of neutralization specific to the offense and the offender, but also discussing individual differences among respondents in terms of their application of neutralization.
APA, Harvard, Vancouver, ISO, and other styles
15

Park, Kyung-Ae. "Techniques of Neutralization on Unethical Customer Return Behaviors." Journal of the Korean Society of Clothing and Textiles 32, no. 9 (September 30, 2008): 1376–86. http://dx.doi.org/10.5850/jksct.2008.32.9.1376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

LI Chi-mei, Jessica. "Neutralization Techniques, Crime Decision-making and Juvenile Thieves." International Journal of Adolescence and Youth 14, no. 3 (January 2008): 251–65. http://dx.doi.org/10.1080/02673843.2008.9748006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Heydari, Payam. "Neutralization Techniques for High-Frequency Amplifiers: An Overview." IEEE Solid-State Circuits Magazine 9, no. 4 (2017): 82–89. http://dx.doi.org/10.1109/mssc.2017.2745858.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Copes, Heith. "societal attachments, offending frequency, and techniques of neutralization." Deviant Behavior 24, no. 2 (March 2003): 101–27. http://dx.doi.org/10.1080/01639620390117200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

De Bock, Tine, and Patrick Van Kenhove. "Double Standards: The Role of Techniques of Neutralization." Journal of Business Ethics 99, no. 2 (September 25, 2010): 283–96. http://dx.doi.org/10.1007/s10551-010-0654-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Schoultz, Isabel, and Janne Flyghed. "From “We Didn’t Do It” to “We’ve Learned Our Lesson”: Development of a Typology of Neutralizations of Corporate Crime." Critical Criminology 28, no. 4 (December 16, 2019): 739–57. http://dx.doi.org/10.1007/s10612-019-09483-3.

Full text
Abstract:
AbstractWhen corporations are faced with accusations of crime, they usually find it necessary to justify their actions to the public, the media and their shareholders. Corporate self-defense, aimed at protecting a corporation’s image and legitimacy, belongs to a broader category of offenders’ denials and neutralizations. The objective of this article is to compile and discuss literature that is of value for an understanding of neutralizations of corporate crime and, by means of this literature and our own empirical studies on corporate denials, to outline a typology of corporate neutralizations. The typology distinguishes between a wide variety of corporate responses to allegations of crime and exemplifies how these techniques have been used. We also discuss the function of corporate neutralization techniques and argue that corporate accounts mediate action; they influence both other actors and future corporate actions.
APA, Harvard, Vancouver, ISO, and other styles
21

Costello, Barbara J. "techniques of neutralization and self-esteem: a critical test of social control and neutralization theory." Deviant Behavior 21, no. 4 (July 2000): 307–29. http://dx.doi.org/10.1080/016396200404113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

James, Veronyka. "Denying the Darkness: Exploring the Discourses of Neutralization of Bundy, Gacy, and Dahmer." Societies 9, no. 2 (June 11, 2019): 46. http://dx.doi.org/10.3390/soc9020046.

Full text
Abstract:
This exploratory study analyzed how three serial killers (i.e., Bundy, Gacy, and Dahmer) potentially rationalized and justified their murders by applying techniques of neutralization. This paper discusses how the use of these neutralizations also functions as a form of stigma management assisting in the maintenance of a positive presentation of self, thus mitigating responsibility for their crimes. This study conducted a content analysis of data comprised from interviews and case histories of these three serial killers. Based on these analyses, the impression is conveyed that these killers used neutralizations to manage their identities (i.e., present “normal” selves), mitigate responsibility for their actions, and minimize the stigma associated with being labeled a serial killer.
APA, Harvard, Vancouver, ISO, and other styles
23

Padayachee, Keshnee. "Understanding the Relationship Between the Dark Triad of Personality Traits and Neutralization Techniques Toward Cybersecurity Behaviour." International Journal of Cyber Warfare and Terrorism 10, no. 4 (October 2020): 1–19. http://dx.doi.org/10.4018/ijcwt.2020100101.

Full text
Abstract:
This study considers the framework of neutralization techniques, which responds to the attitude/rationalization leg of the fraud triangle with respect to the dark triad of personality traits' predictability toward compliant cybersecurity behaviour. Logically, organizations focus on reducing the insider's motivation and opportunities for malfeasance. However, it may be prudent to consider the rationalization for insider crime, which is arguably the most obscure element. This study is a unique contribution as it considers both the roles of neutralization techniques and the dark triad of personality traits with respect to insider threats and compliance intention. Furthermore, the specific categories of neutralization techniques will be considered as antecedents towards insider maleficence.
APA, Harvard, Vancouver, ISO, and other styles
24

McLuhan, Arthur. "Adopting a Cloak of Incompetence: Impression Management Techniques for Feigning Lesser Selves." Sociological Theory 38, no. 2 (June 2020): 122–41. http://dx.doi.org/10.1177/0735275120926222.

Full text
Abstract:
The “cloak of competence” concept captures attempts to disguise limitations and exaggerate abilities. The author examines the conceptual converse: the “cloak of incompetence,” or the various ways people deliberately disregard, disguise, downplay, or diminish their personal abilities. Drawing on a comparative analysis of manifold empirical cases, the author identifies three generic competence-concealing techniques—avoidance, performance, and neutralization—and considers some of the interactional contingencies that can enhance or reduce their effectiveness. Avoidance and performance techniques are used to manage creditable competence. Neutralization techniques are used to manage credited competence. Each strategy obstructs the appearance and attribution of competence in a particular way: avoidance techniques prevent the dramatic realization of competence, performance techniques dramatically realize incompetence, and neutralization techniques discount, downplay, distance, or otherwise explain away evident but undesirable competent performances. The author concludes by discussing some implications for sociologies of persons, culture, and structure.
APA, Harvard, Vancouver, ISO, and other styles
25

Spraitz, Jason D., and Kendra N. Bowen. "Techniques of Neutralization and Persistent Sexual Abuse by Clergy." Journal of Interpersonal Violence 31, no. 15 (July 10, 2016): 2515–38. http://dx.doi.org/10.1177/0886260515579509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Heltsley, Martha, and Thomas C. Calhoun. "the good mother: neutralization techniques used by pageant mothers." Deviant Behavior 24, no. 2 (March 2003): 81–100. http://dx.doi.org/10.1080/01639620390117202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Vasquez, Arthur, and Lynne M. Vieraitis. "“It’s Just Paint”: Street Taggers’ Use of Neutralization Techniques." Deviant Behavior 37, no. 10 (May 9, 2016): 1179–95. http://dx.doi.org/10.1080/01639625.2016.1169830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Froggio, Giacinto, Nereo Zamaro, and Massimo Lori. "Exploring the Relationship between Strain and Some Neutralization Techniques." European Journal of Criminology 6, no. 1 (January 2009): 73–88. http://dx.doi.org/10.1177/1477370808098106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Tomita, Susan K. "The Denial of Elder Mistreatment by Victims and Abusers: The Application of Neutralization Theory." Violence and Victims 5, no. 3 (September 1, 1990): 171–84. http://dx.doi.org/10.1891/0886-6708.5.3.171.

Full text
Abstract:
Denial is often mentioned as a constraining factor in the assessment and intervention of domestic violence cases. Within the context of elder mistreatment, this paper utilizes neutralization theory to explain how the abuser and the elderly victim justify or rationalize abusive or neglectful behavior. Intervention techniques are provided to counteract different types of denial, and practitioners are cautioned against utilizing neutralization techniques themselves.
APA, Harvard, Vancouver, ISO, and other styles
30

Dootson, Paula, Kim A. Johnston, Ian Lings, and Amanda Beatson. "Tactics to deter deviant consumer behavior: a research agenda." Journal of Consumer Marketing 35, no. 6 (September 10, 2018): 577–87. http://dx.doi.org/10.1108/jcm-10-2015-1575.

Full text
Abstract:
Purpose Deviant consumer behavior (DCB) has serious negative effects on organizations, employees and other customers. While research to date has largely focused on understanding why consumers engage in deviant behaviors, less focus has been placed on exploring how to deter them. This paper aims to shift the conversation from research exploring why consumers engage in deviant behaviors to understanding how DCB could be deterred. Design/methodology/approach In this conceptual paper, a research agenda of deterrence tactics is provided with associated propositions to guide future research in the field of DCB. Findings A deterrence–neutralization–behavior (DNB) framework is proposed to underpin the seven deterrence tactics outlined in this research agenda. The DNB framework illustrates the positive relationship between neutralization techniques and engagement in DCB, because the techniques reduce the level of cognitive dissonance associated with performing a deviant act beyond an individual’s deviance threshold. The framework adds a new proposed moderating role of deterrence tactics. Deterrence tactics are mechanisms that will reintroduce cognitive dissonance, previously reduced through a neutralization technique, by presenting the consumer with a competing piece of information that challenges their attitudes, beliefs or behavior. Therefore, the authors propose that certain deterrence tactics could diminish the positive effect of different neutralization techniques on DCB if the tactics challenge the justifications consumers are using to excuse their actions – subsequently reintroducing cognitive dissonance. Practical implications Practically, this paper is the next step in an effort to provide evidence-based solutions for managers seeking to reduce the negative impact that deviance has on the organization. Originality/value To date, research has focused on understanding why DCB occurs with limited attention on how it can be deterred. The value in this paper is in proposing a series of deterrence tactics that are theoretically matched to established antecedents and neutralization techniques associated with DCB. Overall, this paper provides a future research agenda with propositions to build knowledge on effective deterrence tactics for curbing instances of DCB.
APA, Harvard, Vancouver, ISO, and other styles
31

Rai, Suchita, KL Wasewar, and A. Agnihotri. "Treatment of alumina refinery waste (red mud) through neutralization techniques: A review." Waste Management & Research: The Journal for a Sustainable Circular Economy 35, no. 6 (March 21, 2017): 563–80. http://dx.doi.org/10.1177/0734242x17696147.

Full text
Abstract:
In the Bayer process of extraction of alumina from bauxite, the insoluble product generated after bauxite digestion with sodium hydroxide at elevated temperature and pressure is known as ‘red mud’ or ‘bauxite residue’. This alumina refinery waste is highly alkaline in nature with a pH of 10.5–12.5 and is conventionally disposed of in mostly clay-lined land-based impoundments. The alkaline constituents in the red mud impose severe and alarming environmental problems, such as soil and air pollution. Keeping in view sustainable re-vegetation and residue management, neutralization/treatment of red mud using different techniques is the only alternative to make the bauxite residue environmentally benign. Hence, neutralization techniques, such as using mineral acids, acidic waste (pickling liquor waste), coal dust, superphosphate and gypsum as amenders, CO2, sintering with silicate material and seawater for treatment of red mud have been studied in detail. This paper is based upon and emphasizes the experimental work carried out for all the neutralization techniques along with a comprehensive review of each of the processes. The scope, applicability, limitations and feasibility of these processes have been compared exhaustively. Merits and demerits have been discussed using flow diagrams. All the techniques described are technically feasible, wherein findings obtained with seawater neutralization can be set as a benchmark for future work. Further studies should be focused on exploring the economical viability of these processes for better waste management and disposal of red mud.
APA, Harvard, Vancouver, ISO, and other styles
32

Pershing, Jana L. "To Snitch or Not to Snitch? Applying the Concept of Neutralization Techniques to the Enforcement of Occupational Misconduct." Sociological Perspectives 46, no. 2 (June 2003): 149–78. http://dx.doi.org/10.1525/sop.2003.46.2.149.

Full text
Abstract:
The controversy over self-regulation has been a central topic of inquiry in sociological research on occupational misconduct and crime. However, few studies have examined the process by which organizational members decide whether to respond to the misconduct of peers, and none have examined the use of neutralization techniques by rule enforcers in organizational settings. The research presented here is based on a case study of the U.S. Naval Academy. Three data sources are analyzed: Survey data collected from Academy midshipmen, semistructured interviews with graduates, and official statistics on occupational misconduct. Findings reveal that Academy members employ a number of neutralization techniques depending on whether they counsel peers, report peers, or choose not to respond to misconduct. Midshipmen who counsel are appealing to peer loyalty, while those who report wrongdoing find themselves neutralizing the effects of violating informal norms about peer loyalty. In contrast, those who ignore misconduct must neutralize the potential effects of betraying loyalty to the institution. In addition to calling for the expansion of neutralization techniques research to include rule enforcers, the implications of this study suggest that the concept be refined to examine the impact of conflicting loyalties on the types of neutralization techniques employed in systems of self-regulation.
APA, Harvard, Vancouver, ISO, and other styles
33

Boiral, Olivier, Marie-Christine Brotherton, Alexander Yuriev, and David Talbot. "Through the Smokescreen of the Dieselgate Disclosure: Neutralizing the Impacts of a Major Sustainability Scandal." Organization & Environment 35, no. 2 (November 17, 2021): 175–201. http://dx.doi.org/10.1177/10860266211043561.

Full text
Abstract:
This article analyzes the main neutralization techniques used in car manufacturers’ sustainability reports to disclose on the Dieselgate scandal. We conduct a conventional qualitative content analysis of 72 sustainability reports, covering the period 2013-2017, from 15 car manufacturers that were accused of unethical behaviors related to the measurement of diesel vehicle pollutant emissions. We then present a framework based on four configurations of neutralization techniques, namely, “head in the sand,” “self-proclaimed green leadership,” “wait and see,” and “start of a new era.” We describe that the manufacturers used heterogeneous neutralization techniques. Furthermore, the sustainability reports analyzed are relatively opaque and disconnected from the accusations made against the companies, which are widely reported by external sources. This article contributes to the emerging literature on the defensive impression management practices used to rationalize corporate misconduct in this area.
APA, Harvard, Vancouver, ISO, and other styles
34

D. Hochscheidt, Bruna, Eduardo S. Possamai, Mateus P. M. da Silva, Jonathan Dieter, Fabiano R. da Silva, and Rodrigo Sequinel. "Neutralization or Esterification as Input Improvement Techniques for Biodiesel Production." Revista Virtual de Química 12, no. 2 (2020): 325–34. http://dx.doi.org/10.21577/1984-6835.20200025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Alvarez, Alexander. "Adjusting to Genocide: The Techniques of Neutralization and the Holocaust." Social Science History 21, no. 2 (1997): 139. http://dx.doi.org/10.2307/1171272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Alvarez, Alexander. "Adjusting to Genocide: The Techniques of Neutralization and the Holocaust." Social Science History 21, no. 2 (1997): 139–78. http://dx.doi.org/10.1017/s0145553200017697.

Full text
Abstract:
In recent years, as social scientists questioned the intellectual boundaries set by customary perceptions of criminality, their discourse expanded to incorporate more than purely legalistic definitions of crime. In addition to conventional street crimes, some scholars began examining both interpersonal and collective actions and behaviors that were once considered to be outside the scope of commonly accepted definitions of criminality. For example, criminologists now study crime categorized as occupational (Albanese 1987; Cressey 1953; Green 1990; Hollinger and Clark 1983; Horning 1979; Nettler 1974; Tracy and Fox 1989), environmental (Block and Bernard 1988; Brady 1987; Stone 1987; Tallmer 1987), political (Barak 1994; Block 1989; Block and Chambliss 1981; Chambliss 1993; Quinney 1970; Schwendinger and Schwendinger 1970; Tunnell 1993; Turk 1969), and corporate (Clinard and Yeager 1980; Clinard et al. 1979; Coleman 1994; Reiman 1979; Sutherland 1949), using methodology and terminology once reserved for predatory street crime. This trend can be traced to the pioneering work of Thorsten Sellin (1938) and Edwin Sutherland (1940, 1949), who argued for broader, more inclusive definitions of criminality and less conventional approaches to the study of crime.
APA, Harvard, Vancouver, ISO, and other styles
37

Bryant, Emily, Emily Brooke Schimke, Hollie Nyseth Brehm, and Christopher Uggen. "Techniques of Neutralization and Identity Work Among Accused Genocide Perpetrators." Social Problems 65, no. 4 (July 29, 2017): 584–602. http://dx.doi.org/10.1093/socpro/spx026.

Full text
Abstract:
Abstract Following the 1994 Rwandan genocide, many defendants on trial at the International Criminal Tribunal for Rwanda (ICTR) testified on their own behalf. This article analyzes transcripts of their testimonies to learn (1) how defendants discuss the grave crimes of which they are accused, and (2) how their explanatory styles allow them to rationalize their actions and negotiate their tarnished identities. We find that defendants employ Gresham Sykes and David Matza’s (1957) classic techniques of neutralization as a means of rationalization, impression management, and identity negotiation. Nevertheless, these techniques, along with those developed in the decades since, do not capture all aspects of defendants’ accounts. We thus identify additional techniques of neutralization to provide a more comprehensive understanding of how defendants account for their actions. By extending this classic literature, we call attention to the situational context of international trials, the nature of the crime of genocide, the relatively high social status many defendants once occupied, and existing narratives surrounding the legitimacy of the ICTR. In doing so, our analysis contributes to understandings of narratives of violence and accused genocide perpetrators.
APA, Harvard, Vancouver, ISO, and other styles
38

Naganuma, Yusuke, and Kyoko Fujino. "The relationship between relationally aggressed victims and techniques of neutralization." Proceedings of the Annual Convention of the Japanese Psychological Association 75 (September 15, 2011): 3EV060. http://dx.doi.org/10.4992/pacjpa.75.0_3ev060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Christensen, Tony. "Presumed Guilty: Constructing Deviance and Deviants through Techniques of Neutralization." Deviant Behavior 31, no. 6 (June 23, 2010): 552–77. http://dx.doi.org/10.1080/01639620903004929.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

van Baak, Carlijn, Brittany E. Hayes, Joshua D. Freilich, and Steven M. Chermak. "Honor Crimes in the United States and Offenders’ Neutralization Techniques." Deviant Behavior 39, no. 2 (January 6, 2017): 187–202. http://dx.doi.org/10.1080/01639625.2016.1266870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Flyghed, Janne, and Isabel Schoultz. "Företags försvar vid anklagelser om brott – betydelsen av den nordiska kontexten." Nordisk Tidsskrift for Kriminalvidenskab 106, no. 3 (December 1, 2019): 297–314. http://dx.doi.org/10.7146/ntfk.v106i3.124795.

Full text
Abstract:
AbstractIn recent years, several Swedish companies have been accused in the media, by NGOs, and via legal proceedings of engaging in criminal activities. Two of these companies, TeliaSonera and Lundin Petroleum have been the focus of substantial public attention. During the years following the revelations that TeliaSonera, a partly state owned telecommunications company, had committed bribery offences in Central Asia, the affair went from a public scandal in Sweden to a legal process in Sweden and abroad. Lundin Petroleum, a family owned oil company accused of participating in crimes against humanity in Sudan, has continuously denied the accusation by using a variety of denials and neutralizations. The current paper analyzes the strategies employed by these two businesses when defending themselves against allegations of criminal acts. Drawing on Stanley Cohen’s (2009) theoretical work on processes of denial and neutralization techniques, we have identified four main techniques used by the two companies to deflect allegations of criminal wrongdoing: literal denial; denial of knowledge; condemning the condemners; and appealing to a higher loyalty. In addition, we identify how the corporations emphasise their “Nordic values” by linking into a post-colonial discourse and justify their behaviour by relativising it. The article contributes to the discussion of neutralization strategies by pointing out the importance of the context in which a defence takes place.
APA, Harvard, Vancouver, ISO, and other styles
42

Gauthier, Deann K. "professional lapses: occupational deviance and neutralization techniques in veterinary medical practice." Deviant Behavior 22, no. 6 (November 2001): 467–90. http://dx.doi.org/10.1080/016396201753227691.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Gruber, Verena, and Bodo B. Schlegelmilch. "How Techniques of Neutralization Legitimize Norm- and Attitude-Inconsistent Consumer Behavior." Journal of Business Ethics 121, no. 1 (March 26, 2013): 29–45. http://dx.doi.org/10.1007/s10551-013-1667-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Chamola, Vinay, Pavan Kotesh, Aayush Agarwal, Naren, Navneet Gupta, and Mohsen Guizani. "A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques." Ad Hoc Networks 111 (February 2021): 102324. http://dx.doi.org/10.1016/j.adhoc.2020.102324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Aurilana, Ghaidha Izdihar, M. R. Nababan, and Riyadi Santosa. "The Impact of Translation Techniques Toward Translation Quality of Javanese Swear Words in Subtitle Film Yowis Ben 2." International Journal of Multicultural and Multireligious Understanding 9, no. 2 (February 3, 2022): 111. http://dx.doi.org/10.18415/ijmmu.v9i2.3340.

Full text
Abstract:
The aims of this research are to identify translation techniques and translation quality of swear words in subtitle film Yowis Ben 2. This research uses descriptive qualitative method. This qualitative descriptive research is an embedded-cased study and oriented to translation product. The source data of the research are Javanese swear word in subtitle film Yowis Ben 2. The data were collected by document analysis and FGD (Focus Group Discussion). The result of this research reveal that the translation techniques found in subtitle film Yowis Ben 2 are adaptation, establish equivalence, deletion, neutralization, borrowing, discursive creation and literal translation. Furthermore, the adaptation and establish equivalence techniques contributed positively in accuracy, acceptability and readability aspects. Meanwhile, deletion, neutralization, borrowing, discursive creation and literal translation decreased the translation quality.
APA, Harvard, Vancouver, ISO, and other styles
46

Dinnsen, Daniel A. "A re-examination of phonological neutralization." Journal of Linguistics 21, no. 2 (September 1985): 265–79. http://dx.doi.org/10.1017/s0022226700010276.

Full text
Abstract:
One of the most fundamental constructs of phonological theory past and present is ‘neutralization’, i.e. the merger of a contrast in certain contexts. It is as basic as such other constructs as ‘contrast’, ‘distinctive feature’, and ‘segment’. While there exists a substantial body of literature on the phonetics of various phonological constructs (e.g. acoustic correlates for features, acoustic invariance, descriptive phonetics of particular languages, instrumental measurement techniques and segmentation criteria), the phonetics of neutralization has largely been assumed on the basis of casual impressionistic phonetics. The assumption is that forms which are distinguishable phonetically and phonologically in certain contexts and/or levels of representation (e.g. intervocalic voiced and voiceless obstruents in German) are under certain other well-defined circumstances totally indistinguishable at the level of phonetics (e.g. only voiceless obstruents occur word-finally in German).
APA, Harvard, Vancouver, ISO, and other styles
47

AGNEW, ROBERT S. "Neutralizing the Impact of Crime." Criminal Justice and Behavior 12, no. 2 (June 1985): 221–39. http://dx.doi.org/10.1177/0093854885012002005.

Full text
Abstract:
Contrary to mass media accounts and popular beliefs, quantitative data indicate that the relationship between victimization and fear of crime is weak. Efforts to explain this weak relationship have, so far, been unsatisfactory. This article attempts to explain the weak relationship by arguing that the impact of victimization is mediated by the beliefs of the individual. In particular, victims often employ certain beliefs or “techniques of neutralization” to convince themselves that their particular victimization was not harmful. By defining their victimization in this way, they avoid the fear and other negative reactions that sometimes accompany victimization. This article lists the five major techniques of neutralization employed by victims, presents evidence for their existence, and discusses their relevance to victimology.
APA, Harvard, Vancouver, ISO, and other styles
48

Zagorevskii, Dmitri. "The Generation of Neutral Derivatives of Low-Valence Iron, RFe(I), by Netralization—Reionization Mass Spectrometry." European Journal of Mass Spectrometry 11, no. 3 (June 2005): 267–75. http://dx.doi.org/10.1255/ejms.743.

Full text
Abstract:
Neutralization–reionization mass spectrometry is applied for the generation of low-valence iron derivatives. Neutralization of RFe+ (R = H, F, Cl, Br, I, CN, OH, NH2, acac, C6H5) ions resulted in the corresponding neutrals having lifetimes of at least 5 μs. Atom connectivities in RFe ions and neutrals were elucidated by a variety of tandem mass spectrometry techniques. The present study provides the first experimental evidence of the intrinsic stability of neutral IFe, NCFe, acacFe and C6H5Fe.
APA, Harvard, Vancouver, ISO, and other styles
49

Belinda, Mia Yasmin, and Hajan Hidayat. "ACADEMIC CHEATING BEHAVIOR REVIEWED FROM NEUTRALIZATION OF CHEATING BEHAVIOR AND GENDER OF THE ACCOUNTING STUDENTS AT UNIVERSITIES IN BATAM." JOURNAL OF APPLIED MANAGERIAL ACCOUNTING 2, no. 2 (October 3, 2018): 282–89. http://dx.doi.org/10.30871/jama.v2i2.882.

Full text
Abstract:
This study aimed to determine the neutralization relationship with the academic cheating behavior and differences in students perceptions of male and female on neutralization who is do cheating behaviors in academic studies. The sampling method used purposive sampling techniques. The subjects were as 378 who is take the accounting courses with accredited B (Good) in several universities in Batam. The questionnaires were distributed to each universities about 125 questionnaires. Hypothesis testing used a Pearson product moment correlation analysis and t-test Independent test. The results of this study found that, there is a strong positive correlation between neutralization with the academic cheating behavior with a correlation coefficient r = 0,829 with probability p = 0.000 (P <0.05). The results of the study for the t-test Independent test showed that there are differences in perception between male students and female with an average of male students is higher by 63.79% and the female with a percentage of 35.03%. Moreover, the conclusion for further study, it can carry out educational purpose suppress the neutralization process, ethics education should consider the perspective of male and female, and study the factors affecting the dynamics of neutralization and neutralization of both male and female.
APA, Harvard, Vancouver, ISO, and other styles
50

Zuber, Małgorzata J., Edward W. Greenberg, and Linda M. Williams. "Differentiable Attitudes Towards Specific Crimes and Contexts: A Quantification of Neutralization Techniques." Resocjalizacja Polska 11 (December 13, 2016): 163. http://dx.doi.org/10.22432/pjsr.2016.11.12.

Full text
Abstract:
Teoria neutralizacji Greshama Sykes’a i Davida Matzy (1957, s. 699) zakłada, że przestępcy nieustannie próbują reintegrować się ze społeczeństwem poprzez psychologiczne uznanie swoich dewiacyjnych zachowań za właściwie normatywne, przy użyciu ,,wymówek” nazwanych technikami neutralizacji. Sykes i Matza wyróżnili pięć takich technik: kwestionowanie odpowiedzialności, kwestionowanie szkody, kwestionowanie ofiary, potępianie potępiających oraz odwoływanie się do wyższych racji. Autorzy początkowo skupiali się na szerszym rozumieniu zjawiska neutralizacji niż na zgłębianiu funkcjonowania poszczególnych technik, które wyróżnili. Celem niniejszego artykułu jest ustalenie, które techniki neutralizacji są najczęściej używane oraz w jakich okolicznościach (przy popełnieniu jakich przestępstw) neutralizacja jest najbardziej efektywna. Za pomocą planu czynnikowego sondażu diagnostycznego, który objął grupę studentów z Polski i ze Stanów Zjednoczonych ustalono, iż stosowalność neutralizacji różni się w zależności od użytej techniki i od okoliczności oraz że kwestionowanie odpowiedzialności stanowi najsilniejszą z technik.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography