Auswahl der wissenschaftlichen Literatur zum Thema „Anonymous reports“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Anonymous reports" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Anonymous reports"

1

Guthrie, Cynthia P., Carolyn Strand Norman und Jacob M. Rose. „Chief Audit Executives' Evaluations of Whistle-Blowing Allegations“. Behavioral Research in Accounting 24, Nr. 2 (01.03.2012): 87–99. http://dx.doi.org/10.2308/bria-50154.

Der volle Inhalt der Quelle
Annotation:
ABSTRACT This study examines the effects of the source of whistle-blowing allegations and potential for allegations to trigger concerns about reputation threats on chief audit executives' handling of whistle-blowing allegations. The participants for this study, chief audit executives (CAEs) and deputy CAEs, evaluated whistle-blowing reports related to financial reporting malfeasance that were received from either an anonymous or a non-anonymous source. The whistle-blowing reports alleged that the wrongdoing resulted from either the exploitation of substantial weaknesses in internal controls (suggesting higher responsibility of the CAE and internal audit) or the circumvention of internal controls (suggesting lower responsibility of the CAE or internal audit). Findings indicate that CAEs believe anonymous whistle-blowing reports to be significantly less credible than non-anonymous reports. Although CAEs assessed lower credibility ratings for the reports alleging wrongdoing by the exploitation of substantial weaknesses in internal controls, they allocated more resources to investigating these allegations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Zuravin, Susan J., Brenda Watson und Mark Ehrenschaft. „Anonymous reports of child physical abuse: Are they as serious as reports from other sources?“ Child Abuse & Neglect 11, Nr. 4 (Januar 1987): 521–29. http://dx.doi.org/10.1016/0145-2134(87)90078-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Dieudonné, Yoann, und Andrzej Pelc. „Deterministic Network Exploration by Anonymous Silent Agents with Local Traffic Reports“. ACM Transactions on Algorithms 11, Nr. 2 (17.11.2014): 1–29. http://dx.doi.org/10.1145/2594581.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Cerdeña, Jessica P., Tehreem Rehman und Rachel R. Hardeman. „Why Bias Matters in Medicine: Qualitative Insights from Anonymous, Online Reports“. Journal of the National Medical Association 112, Nr. 1 (Februar 2020): 6–14. http://dx.doi.org/10.1016/j.jnma.2019.10.004.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Johnson, W. „Benjamin robins: Anonymous pamphlets and reports of 1739–1742, shortly summarized“. International Journal of Mechanical Sciences 36, Nr. 2 (Februar 1994): 157–68. http://dx.doi.org/10.1016/0020-7403(94)90083-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Gogoleski, Mary Ann, Bruce A. Thyer und Raymond J. Waller. „Reports of Childhood Incest by Adults with Panic Disorder or Agoraphobia“. Psychological Reports 73, Nr. 1 (August 1993): 289–90. http://dx.doi.org/10.2466/pr0.1993.73.1.289.

Der volle Inhalt der Quelle
Annotation:
A convenience sample of 94 members of an agoraphobia self-help group responded to an anonymous survey on their possible histories of childhood incest. 12 (13%) respondents reported such a history. These results are discussed in terms of hypothesized etiologies of panic disorder and agoraphobia.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Thomas, Sara E., Emily Weinstein und Robert L. Selman. „Did I Cross the Line?: Gender Differences in Adolescents’ Anonymous Digital Self-Reports of Wrongdoing in an Online Anonymous Context“. Sex Roles 77, Nr. 1-2 (04.10.2016): 59–71. http://dx.doi.org/10.1007/s11199-016-0684-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Teixeira da Silva, Jaime A., und Judit Dobránszki. „A new dimension in publishing ethics: social media-based ethics-related accusations“. Journal of Information, Communication and Ethics in Society 17, Nr. 3 (12.08.2019): 354–70. http://dx.doi.org/10.1108/jices-05-2018-0051.

Der volle Inhalt der Quelle
Annotation:
Purpose Whistle-blowing, which has become an integral part of the post-publication peer-review movement, is being fortified by social media. Anonymous commenting on blogs as well as Tweets about suspicions of academic misconduct can spread quickly on social media sites like Twitter. The purpose of this paper is to examine two cases to expand the discussion about how complex post-publication peer review is and to contextualize the use of social media within this movement. Design/methodology/approach This paper examines a Twitter-based exchange between an established pseudonymous blogger and science critic, Neuroskeptic, and Elizabeth Wager, the former COPE Chair, within a wider discussion of the use of social media in post-publication peer review. The paper also discusses false claims made on Twitter by another science watchdog, Leonid Schneider. The policies of 15 publishers related to anonymous or pseudonymous whistle-blowing are examined. Findings Four issues in the Neuroskeptic–Wager case were debated: the solicitation by Wager to publish in RIPR; the use of commercial software by Neuroskeptic to make anonymous reports to journals; the links between “publication ethics” leaders and whistle-blowers or pseudonymous identities; the issues of transparency and possible hidden conflicts of interest. Only one publisher (Wiley) out of 15 scientific publishers examined claimed in its official ethical guidelines that anonymous reports should be investigated in the same way as named reports, while three publishers (Inderscience, PLOS and Springer Nature) referred to the COPE guidelines. Originality/value No such Twitter-based case has yet been examined in detail in the publishing ethics literature.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Gorassini, Donald R. „Brief Hypnotic Suggestibility Training: A Confirmation of its Effectiveness and a Test of Self-Report Validity“. Imagination, Cognition and Personality 22, Nr. 3 (März 2003): 291–302. http://dx.doi.org/10.2190/l111-3x0r-w5pw-738m.

Der volle Inhalt der Quelle
Annotation:
Participants who pretested low in hypnotic suggestibility were, prior to a retest, either given a four-minute version of the Carleton Skill Training Package or encouraged to try hard. Large pre- to posttest gains in behavioral and nonvolitional suggestibility scores occurred in the training condition only. In order to evaluate the possibility that nonvolition self-reports of trained participants were faked, self-ratings of nonvolition were elicited under anonymous as well as public conditions. Training-induced gains in nonvolition were as great when the ratings were made anonymously as when they were made in public. The implications of these findings are discussed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Figueredo, Magdalena, und Fabiana Larrobla. „Uruguayan mortuaries and the No Names: the long story of the unidentified bodies found on the coastline of Uruguay during the Condor Plan“. Human Remains and Violence: An Interdisciplinary Journal 3, Nr. 2 (2017): 56–73. http://dx.doi.org/10.7227/hrv.3.2.5.

Der volle Inhalt der Quelle
Annotation:
Between 1975 and 1979, thirty-one unidentified bodies bearing marks of torture appeared at various locations along Uruguays coastline. These bodies were material proof of the death flights implemented in neighbouring Argentina after the military coup. In Uruguay, in a general context of political crisis, the appearance of these anonymous cadavers first generated local terror and was then rapidly transformed into a traumatic event at the national level. This article focuses on the various reports established by Uruguayan police and mortuary services. It aims to show how,the administrative and funeral treatments given at that time to the dead bodies, buried anonymously (under the NN label) in local cemeteries, make visible some of the multiple complicities between the Uruguayan and Argentinean dictatorships in the broader framework of the Condor Plan. The repressive strategy implemented in Argentina through torture and forced disappearance was indeed echoed by the bureaucratic repressive strategy implemented in Uruguay through incomplete and false reports, aiming to make the NN disappear once again.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Anonymous reports"

1

Schaer, John. „Assessment of personalisation with anonymous users in major e-commerce systems /“. Leeds : University of Leeds, School of Computer Studies, 2008. http://www.comp.leeds.ac.uk/fyproj/reports/0708/Schaer.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

NATALELLO, DORIANA. „LA DISCIPLINA DEGLI SCRITTI ANONIMI NEL DIRITTO AMMINISTRATIVO“. Doctoral thesis, Università Cattolica del Sacro Cuore, 2021. http://hdl.handle.net/10280/98840.

Der volle Inhalt der Quelle
Annotation:
La tesi ha ricostruito la disciplina degli scritti anonimi nel diritto amministrativo. In particolare, in assenza di disposizioni di carattere generale, la ricerca ha avuto l’obiettivo di comprendere la rilevanza attribuita dall’ordinamento pubblicistico alle segnalazioni anonime, sia sul versante processuale sia su quello procedimentale. Nel diritto amministrativo, il fenomeno degli scritti anonimi è stato meno esplorato che nel diritto penale. Di recente, tuttavia, si è registrata una progressiva attenzione per il tema, come si evince soprattutto da due elementi: le numerose pronunce della giurisprudenza relative alla presentazione di denunce anonime volte a sollecitare l’avvio del procedimento amministrativo e i regolamenti delle Autorità amministrative indipendenti che hanno esplicitamente disciplinato il fenomeno. Anche le indicazioni che provengono dal legislatore in alcuni settori speciali sono significative dell’importanza che gli scritti anonimi hanno progressivamente assunto nel diritto amministrativo. La tesi, pertanto, ha analizzato gli indici, peraltro spesso contraddittori, desumibili dall’ordinamento pubblicistico per comprendere le dimensioni del fenomeno degli scritti anonimi e per valutarne la compatibilità con i principi generali dell’attività amministrativa. Domandarsi se la presentazione di una denuncia anonima imponga l’avvio del procedimento significa, infatti, riflettere sulla compatibilità dell’eventuale impiego di tali denunce con i principi che governano l’esercizio dell’azione amministrativa all’interno di un ordinamento democratico.
The dissertation aims to conduct an in-depth examination of anonymous reports’ legal framework in administrative law. In the absence of general provisions on the topic, the research focused on understanding the relevance attributed to anonymous reports by italian public law, both substantive and procedural. Much has been written on the subject of anonymous documents in the field of criminal law, yet the topic was much less studied in administrative law. Recently, though, attention to this theme increased, as demonstrated both by the issuance of regulations concerning anonymous reporting by several independent authorities and the numerous court rulings about anonymous reporting and its effects on the initiation of administrative proceedings. Significant signs of the increasing importance of the phenomenon in administrative law can also be inferred from the specific legislation of certain sectors of the law. The dissertation analyzed the various and often contradictory occurrences of anonymous reports in administrative law, in order to understand the scope of the phenomenon of anonymous reporting and to evaluate its compatibility with the general principles of administrative action. Indeed, the question of whether the submission of an anonymous report can bind the administration to initiate administrative proceedings calls for a in-depth consideration of the compatibility of the use of these reports with the principles governing administrative action in a democracy.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Guthrie, Cynthia. „The Effects of Reputation Threat and Whistle-Blowing Report Source on Chief Audit Executives' Investigation Decisions“. VCU Scholars Compass, 2008. http://scholarscompass.vcu.edu/etd/1609.

Der volle Inhalt der Quelle
Annotation:
This study examines the effects of reputation threats and anonymous whistle-blowing channels on Chief Audit Executives’ (CAEs) decisions to investigate whistle-blowing allegations. Participants were 94 CAEs and Deputy CAEs from publicly traded companies in the eastern half of the United States. Participants received whistle-blowing reports from either an anonymous or a non-anonymous source. In the high reputation threat condition the whistle-blowing report alleged that the wrongdoing was perpetrated by the exploitation of substantial weaknesses in internal controls that had been previously evaluated by external auditors and the internal audit function. The report in the lower threat condition alleged that the wrongdoing was accomplished by the circumvention of internal controls. Findings show that CAEs found anonymous whistle-blowing reports to be significantly less credible than non-anonymous reports. Although CAEs assessed lower credibility ratings for the reports alleging wrongdoing by the exploitation of substantial weaknesses in internal controls, they perceived greater personal and departmental responsibility in this condition. CAEs did not, however, perceive a significant reputation threat in either the Exploitation or Circumvention condition. Regardless of report source credibility, perceived reputation threat, or felt responsibility, CAEs’ resource allocation decisions consistently demonstrated a determination to thoroughly investigate the allegations of wrongdoing and uncover the truth.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Christianson-Silva, Paula. „The AIDS prevention media campaign in Michigan impact on clients of anonymous HIV counseling and testing sites : a research report submitted in partial fulfillment ... /“. 1988. http://catalog.hathitrust.org/api/volumes/oclc/68788072.html.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Anonymous reports"

1

Don, Wycliff, und American Society of Newspaper Editors. Ethics and Values Committee., Hrsg. Anonymous sources: Pathways and pitfalls : a report. Reston VA: ASNE Foundation Publications Fulfillment, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Alcoholics Anonymous. World Service Meeting. Service through love and humility: Final report. New York, N.Y. (Box 459, Grand Central Station, New York 10163): Alcoholics Anonymous World Services, 1987.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Alcoholics Anonymous. World Service Meeting. The World Service Meeting takes its inventory: Final report. New York, N.Y. (Box 459, Grand Central Station, New York 10163): Alcoholics Anonymous World Services, 1985.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Alcoholics Anonymous. World Service Meeting. A.A. and its responsibilities: Tenth World Service Meeting, 1988 : final report, Roosevelt Hotel, New York, New York, October 23-27. New York, N.Y. (Box 459, Grand Central Station 10163): Alcoholics Anonymous World Services, 1989.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Meeting, Alcoholics Anonymous World Service. The twelve concepts for world service: Eleventh World Service Meeting : 1990 final report, Bayerischer Hof München Hotel, Munich, Germany, October 14-18. New York, N.Y. (Box 459, Grand Central Station, New York 10163): Alcoholics Anonymous World Services, 1991.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Meeting, Alcoholics Anonymous World Service. Anonymous, but not invisible: 19th World Service Meeting 2006 : Malahide, Ireland : final report. New York: Alcoholics Anonymous World Services, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

L, Nelson Michael. Electronic document distribution: Design of anonymous FTP Langley technical report server. Hampton, Va: National Aeronautics and Space Administration, Langley Research Center, 1994.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Alcoholics Anonymous. World Service Meeting. The A.A. message-- a message without borders: 17th World Service Meeting, Oviedo, Spain, October 6-10, 2002 : final report. New York: Alcoholics Anonymous World Services, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Meeting, Alcoholics Anonymous World Service. A.A., our future is our responsibility: 16th World Service Meeting, New York, New York, October 22-26, 2000 : final report. New York: Alcoholics Anonymous World Services, 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Alcoholics Anonymous. World Service Meeting. Service-- basic to personal recovery and A.A. unity: 15th World Service Meeting, Auckland, New Zealand, October 4-8, 1998 : final report. New York: Alcoholics Anonymous World Services, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Anonymous reports"

1

Dieudonné, Yoann, und Andrzej Pelc. „Deterministic Network Exploration by Anonymous Silent Agents with Local Traffic Reports“. In Automata, Languages, and Programming, 500–512. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31585-5_45.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Seamons, Kent. „Privacy-Enhancing Technologies“. In Modern Socio-Technical Perspectives on Privacy, 149–70. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-82786-1_8.

Der volle Inhalt der Quelle
Annotation:
AbstractAn increasing amount of sensitive information is being communicated and stored online. Frequent reports of data breaches and sensitive data disclosures underscore the need for effective technologies that users and administrators can deploy to protect sensitive data. Privacy-enhancing technologies can control access to sensitive information to prevent or limit privacy violations. This chapter focuses on some of the technologies that prevent unauthorized access to sensitive information. These technologies include secure messaging, secure email, HTTPS, two-factor authentication, and anonymous communication. Usability is an essential component of a security evaluation because human error or unwarranted inconvenience can render the strongest security guarantees meaningless. Quantitative and qualitative studies from the usable security research community evaluate privacy-enhancing technologies from a socio-technical viewpoint and provide insights for future efforts to design and develop practical techniques to safeguard privacy. This chapter discusses the primary privacy-enhancing technologies that the usable security research community has analyzed and identifies issues, recommendations, and future research directions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Tomaselli, Venera, und Giulio Giacomo Cantone. „Multipoint vs slider: a protocol for experiments“. In Proceedings e report, 91–96. Florence: Firenze University Press, 2021. http://dx.doi.org/10.36253/978-88-5518-304-8.19.

Der volle Inhalt der Quelle
Annotation:
Since the broad diffusion of Computer-Assisted survey tools (i.e. web surveys), a lively debate about innovative scales of measure arose among social scientists and practitioners. Implications are relevant for applied Statistics and evaluation research since while traditional scales collect ordinal observations, data from sliders can be interpreted as continuous. Literature, however, report excessive times of completion of the task from sliders in web surveys. This experimental protocol is aimed at testing hypotheses on the accuracy in prediction and dispersion of estimates from anonymous participants who are recruited online and randomly assigned into tasks in recognition of shades of colour. The treatment variable is two scales: a traditional multipoint 0-10 multipoint vs a slider 0-100. Shades have a unique parametrisation (true value) and participants have to guess the true value through the scale. These tasks are designed to recreate situations of uncertainty among participants while minimizing the subjective component of a perceptual assessment and maximizing information about scale-driven differences and biases. We propose to test statistical differences in the treatment variable: (i) mean absolute error from the true value (ii), time of completion of the task. To correct biases due to the variance in the number of completed tasks among participants, data about participants can be collected through both pre-tasks acceptance of web cookies and post-tasks explicit questions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Piscitelli, Alfonso, Roberto Fasanelli, Elena Cuomo und Ida Galli. „Understanding the sensory characteristics of edible insects to promote entomophagy: A projective sensory experience among consumers“. In Proceedings e report, 223–27. Florence: Firenze University Press, 2021. http://dx.doi.org/10.36253/978-88-5518-461-8.42.

Der volle Inhalt der Quelle
Annotation:
In recent years, a remarkable number of studies have investigated sensory characteristics, such as flavor and texture, of edible insect and insect-based foods, their contribution to consumers’ attitudes toward edible insects are important in consumer appeal and their willingness to try eating insects in the future. This paper addresses the problem of describing the sensory characteristics aof edible insect and insect-based foods in terms of preferences. To this end, we conducted a study to explore the representations of sensory experiences related to an insect-based dish involving a voluntary sample of 154 consumers. The quasi-experiment, which we have called projective sensory experience (PSE), follows a two-step procedure. In the first step, we asked the participants to imagine tasting an insect-based dish and then to rate, from 1 (imperceptible) up to 10 (very perceptible), the following taste-olfactory sensations: Sapidity, Bitter tendency, Acidity, Sweet, Spiciness, Aroma, Greasiness-Unctuosity, Succulence, Sweet, Fatness, Persistence. In the second step, we asked our interviewees to indicate, through a specific check-list, which was the most disturbing and least disturbing taste-olfactory sensation imagined. We collected data from May to July 2020 by using an anonymous on-line questionnaire. Results could help understand the sensory characteristics of “insects as food” that should be used or avoided, for example, in communication aimed at promoting familiarity with edible insects and improving the acceptability of insects as a novel food.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

„Pfarr v. Anonymous 180 ILR 422“. In International Law Reports, herausgegeben von Christopher Greenwood und Karen Lee, 422–32. 79 Anson Road, #06–04/06, Singapore 079906: Cambridge University Press, 2019. http://dx.doi.org/10.1017/9781108562454.011.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

„Anonymous reports of lethal cases of ovarian hyperstimulation syndrome“. In Ovarian Hyperstimulation Syndrome, 75–86. CRC Press, 2006. http://dx.doi.org/10.1201/9780203018873-13.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

„Hostile Reports of Anonymous Referees on Novelty in Graphical Bioinfomatics“. In Solved and Unsolved Problems of Structural Chemistry, 433–36. CRC Press, 2016. http://dx.doi.org/10.1201/b19046-30.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Isoni, Andrea, Daniel Read, Julia Kolodko, Julián Arango-Ochoa, Jiarong Chua, Shristi Tiku und Alanda Kariza. „Can upfront declarations of honesty improve anonymous self-reports of sensitive information?“ In Dishonesty in Behavioral Economics, 319–40. Elsevier, 2019. http://dx.doi.org/10.1016/b978-0-12-815857-9.00017-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

McAnulty, Richard. „Frotteurism“. In Unusual and Rare Psychological Disorders, 136–48. Oxford University Press, 2016. http://dx.doi.org/10.1093/med:psych/9780190245863.003.0010.

Der volle Inhalt der Quelle
Annotation:
Frotteurism, also known as forcible touching, is a paraphilia characterized by recurrent and persistent sexual arousal from touching or rubbing against a nonconsenting person, usually a stranger. When reports of such aberrant incidents were first published at the turn of the 19th century, these crimes were viewed as deviant and rare. Today, however, unwanted sexual “groping” or “grinding,” as it is known in the popular press, is rather commonly reported. This unwanted contact often occurs in congested areas and on crowded public transportation systems.The chapter discusses potential etiologies for frotteurism, along with potentially aggravating factors. Despite the anonymous nature of their crimes, frotteurs, when compared with other sex offenders, have some of the highest number of victims.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Rakova, Snezhana. „The Earliest Records of Income and Expenses of the Sultan“. In Hilâl. Venice: Edizioni Ca' Foscari, 2018. http://dx.doi.org/10.30687/978-88-6969-260-4/002.

Der volle Inhalt der Quelle
Annotation:
This paper presents in a chronological order some Venetian sources (primarily, but not only) containing data about the Ottoman state, governance, income and army. This information is analyzed and presented in the form of tables, which give us different types of revenues and expenses. It is unique for the 15th century and can be compared partially only with the contemporary ottoman written documentation. Presented here is the data from the works of Laonicos Chalkokondyles, and manuscripts of Iacopo Promontorio de Campis, a Venetian anonymous author from 1490, the Venetian Relazione by Alvise Sagondino from 1496 and other diplomatic reports from the first decades of the 16th century. The report of Felix Petantius from 1502 to the Hungarian king has been added to other Venetian texts, because it was edited in a different manuscript version and presented to Venice.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Anonymous reports"

1

Perry, Jo, und Sarah Probine. „Reconceptualising the Assessment Practices Within Early Childhood Field Placements: Using Collaborative Reflective Conversations to Mentor Student Teachers on Practicum“. In Rangahau Horonuku Hou – New Research Landscapes, Unitec/MIT Research Symposium 2021. Unitec ePress, 2022. http://dx.doi.org/10.34074/proc.2206004.

Der volle Inhalt der Quelle
Annotation:
The practicum components in early childhood field-based programmes form a core part of achieving praxis, or the balance between theory and practice, which is interwoven with values, beliefs and experiences that form a teacher identity. The practicum assessment involves achieving competency against a set of discipline-based criteria during a period of observation by an external, registered teacher. This paper reports on responses to the national Covid-19 lockdown restrictions, under which the requirements of the traditional practicum could not be met and an alternative version of the assessment had to be developed. The methodology for this project was constructivist grounded theory coupled with a socio-constructivist ethos. The method of data collection was an anonymous survey of students, lecturers and centre-based teachers. The findings indicate an unexpected growth in student empowerment in discussing their own practice.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Wu, Hao, Jonathan Corney und Michael Grant. „Crowdsourcing Measures of Design Quality“. In ASME 2014 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/detc2014-34967.

Der volle Inhalt der Quelle
Annotation:
Today there are numerous examples of collaborative online communities effectively creating innovative products (e.g., RepRap, Linux). But the potential of anonymous crowds to also engage in generative design, through the aggregation of many small contributions, is less clear. Although in recent years the “power of the crowd” has been repeatedly demonstrated in areas that range from image labelling to linguistic translation. The application of crowdsourcing in the fields of design research and creative innovation has been much slower to emerge. As a result, although there have been reports of systems and researchers using Internet crowdsourcing to carry out generative design, there are still many gaps in knowledge about the capability and limitations of the technology. For example on commercial crowdsourcing platforms, the relationship between remuneration and the final quality of designs has not been established, so it is unclear how much payment should be offered in order to ensure a particular standard of result. Key to investigating the relationship between the crowd’s remuneration and the value of their innovation is a robust method for quantifying the quality of the designs produced. This paper reports how payment for a design task (a 2D layout problem) was systematically varied and the quality of the output assessed through a separate crowdsourcing process. The work provides some interesting and valuable insight into how Crowdsourcing can be most effectively employed in design tasks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Vinh, Paul, Lichun Zhang und Rick Barlow. „Extreme Testing: Assessing CPM Leak Detection Systems on a Northern Oil Pipeline“. In 2012 9th International Pipeline Conference. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/ipc2012-90258.

Der volle Inhalt der Quelle
Annotation:
Pipelines in remote and ecologically sensitive regions pose special challenges for pipeline integrity monitoring. These challenges include difficulties of access, reliability issues of communication and instrumentation that may impact the leak detection technology applied in these regions. The selection, application and continuous testing of an appropriate technology to detect possible leaks are important to pipeline integrity monitoring. The paper reports theoretical assessment and extensive testing on an Enbridge subarctic liquid pipeline. It also reports the comprehensive cost-benefit analysis to guide the leak detection instrument design/configuration and the evaluation of the capabilities of alternative computational pipeline monitoring (CPM) technologies for leak detection. The selected test pipeline is an 869 kilometer (540 mile), NPS 12 inch pipeline that transports sweet crude through environmentally sensitive areas. This pipeline currently uses a real-time transient model (RTTM) style CPM as the leak detection system (LDS). The pipeline LDS is tested annually by a number of industry-recognized methodologies. These include fluid withdrawal tests, simulated leak tests and an API-1130 instrument adjustment approach. This pipeline is also assessed by API-1149 for its theoretical CPM leak detection sensitivity. A pilot project invited commercial CPM-style vendors to participate in an LDS test using data from fluid withdrawal and simulated leak tests. Five vendors responded and were included in the test suite. The paper describes the design and implementation of the test process. The results of the commercial systems are presented in aggregated form and the participating vendors remain anonymous. Performance assessment focuses on the LDS evaluation factors of sensitivity and accuracy. The paper concludes with a “lessons learned” review of issues associated with test design.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Thomas, Robert W., und Jose M. Vidal. „Assessing the credibility of vehicle data reported by anonymous sources“. In 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON). IEEE, 2017. http://dx.doi.org/10.1109/uemcon.2017.8249085.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Da Silveira, Márcio V. C., und Wladmir C. Brandão. „Characterizing Crimes from Web“. In VI Brazilian Workshop on Social Network Analysis and Mining. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/brasnam.2017.3249.

Der volle Inhalt der Quelle
Annotation:
Crime prevention requires the effective use of police resources, which demands the access of criminal information for planning security actions. The number of crime occurrences is higher than the official reported numbers. Many victims do not report crimes directly to the security agencies. Instead, they prefer to anonymously report using different channels, such as the Web. In this article, we introduce our approach to characterize crimes reported in the Web. Particularly, we collect criminal data from popular websites that store crime occurrences, and we use clustering analysis to discover crime patterns on the collected data. Applying our approach to a popular Brazilian crime report website, we observe that more than 41% of the crimes were not reported to the security agencies, and most of them are thefts and robberies occurring at night and dawn. In addition, minor offenses present different patterns of serious crimes. Moreover, crime patterns are different in rich and poor neighborhood.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Ermolenko, G., und S. Kozhevnikov. „DECONSTRUCTION OF AUTHORSHIP IN MODERN ART PRACTICES“. In Aesthetics and Hermeneutics. LCC MAKS Press, 2022. http://dx.doi.org/10.29003/m2565.978-5-317-06726-7/142-144.

Der volle Inhalt der Quelle
Annotation:
The report presents the main trends in modern art practices related to the transformation of the institution of authorship. In street art and landscape design, authorship is a function of urban aesthetic spaces,so the work of urban artists tends to be anonymous, the conceptual expression of which belongs to Banksy. Deconstruction of authorship in modern art practices is an attempt to revise the author's role in creating an aesthetic environment by artistic means in the context of turning art into an open communication platform.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Frazier, Colin M., Alexa S. Burr und Ryan D. Meng. „API's Process Safety Site Assessment Program (PSSAP®): Programmatic Updates, Regional Assessments and New Programs Discussion“. In ADIPEC. SPE, 2022. http://dx.doi.org/10.2118/210851-ms.

Der volle Inhalt der Quelle
Annotation:
Abstract The American Petroleum Institute (API) and the U.S. oil and natural gas industry prioritize protecting the health and safety of workers, contractors and the communities in which we operate. For more the 100 years, API has led the development of industry standards, sharing lessons learned as well as the establishment of training and certification programs, all available worldwide. API continues to operate the Process Safety Site Assessment Program (PSSAP®), an assessment program focused on evaluating higher risk activities in a refining, petrochemical, or chemical facility. This program is intended to: Promote process safety performance improvement industry wide;Promote learnings from industry practices;Provide benchmarking through the consistent use of industry-developed good practice protocols;Serve as a feedback mechanism for an analysis of industry performance; and,Encourage safety collaboration among participating sites and industry experts. In early 2022, API finalized the creation of the Hydrofluoric Acid Alkylation Assessment based on Recommended Practice 751, Safe Operation of Hydrofluoric Acid Alkylation Units, 5th Edition. This updated assessment protocol incorporates changes from the 4th Edition to the 5th Edition of Recommended Practice (RP) 751, which includes double the requirements from the previous edition. API launched a new offering: PSSAP Extended Learning. Following a PSSAP assessment, this offering allows sites to utilize assessors to conduct dedicated good practice sharing in areas warranting more focus. This offering can help sites struggling with certain topics to get more details about what good practices exist within industry in these areas. Over the past two years, API and industry experts developed a new Safeguards protocol, focused on how well they are implemented after they are identified in a process hazard analysis. This will allow sites to better gauge how well they are mitigating risks identified in their analyses. Finally, as more operators in Europe, Asia, and the Middle East utilize PSSAP, API has approved the creation of regionally specific benchmarking in addition to the benchmarking reports received for assessments, contingent upon ten (10) operators having conducted assessments in a specific region. Looking forward, API anticipates the ability to produce this blinded and anonymous benchmarking for other regions starting in 2022, which will allow operators to compare their performance in PSSAP assessments to those of their regional peers. PSSAP has completed over 160 assessments to date, with 24 currently scheduled in 2022. Eleven (11) of these 24 assessments are to be conducted internationally in 2022, demonstrating robust growth in international interest in PSSAP. To that end, API completed the first RP 751 5th Edition assessment in the Middle East Region in 2Q 2022. These updates, along with other program-specific updates, will be discussed to ensure attendees are aware of PSSAP's evolving suite of offerings.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Arroyo-de Dompablo, Elena M., und María José Ibáñez-González. „Analysis of two Leveling Courses in Chemistry: objectives, methodology, assessments and future prospects“. In Fourth International Conference on Higher Education Advances. Valencia: Universitat Politècnica València, 2018. http://dx.doi.org/10.4995/head18.2018.7929.

Der volle Inhalt der Quelle
Annotation:
The purpose of this report is to analyze different aspects of two levelling courses in Chemistry, offered to entry-levels students in the Degree in Geology (Universidad Complutense de Madrid) and in the degree in Agricultural Engineering (Universidad de Almería). We comparatively analyze the motivations for offering the course, its aims and objectives, the course design and finally the methodology ans assessments of the course in both universities. The assessment of the learning process is done through quizzes at the beginning and at the end of the courses. Voluntary and anonymous surveys show that the students are very satisfied with the courses. In the future, the aim is to improve the learning methodology in order to achieve greater student motivation
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

SUGLIANO, Nathalie. „Proficiency testing for calibration of multimeter“. In 19th International Congress of Metrology (CIM2019), herausgegeben von Sandrine Gazal. Les Ulis, France: EDP Sciences, 2019. http://dx.doi.org/10.1051/metrology/201911006.

Der volle Inhalt der Quelle
Annotation:
In 2018 and 2019, CT2M organize an inter-laboratory comparison of multimeter calibration in which 27 Europeans laboratories participated. Among them were calibration laboratories (accredited or not) but also laboratories performing themselves the calibrations of their multimeter. The principle of this inter-laboratory comparison is to circulate a multimeter from one laboratory to another in order to compare the calibration results (including correction and calibration uncertainty). The processing of the results is carried out according to the ISO 13528 statistical principles and in compliance with the requirements of ISO 17043. A final report in 2019 will indicate to the participants all the results in anonymous way and the performance scores to evaluate the ability of laboratories to carry out this calibration. This article will present the organization of this inter-laboratory comparison as well as the results obtained.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Cavalli, Jessica, und Anita Cservenka. „Sex Moderates Associations Between Dimensions of Emotion Dysregulation and Problematic Cannabis Use“. In 2021 Virtual Scientific Meeting of the Research Society on Marijuana. Research Society on Marijuana, 2022. http://dx.doi.org/10.26828/cannabis.2022.01.000.31.

Der volle Inhalt der Quelle
Annotation:
Background. Research consistently finds that male cannabis users report greater problematic cannabis use (i.e., negative outcomes related to one’s cannabis use), compared to female cannabis users. Further, emotion dysregulation is a transdiagnostic risk factor for substance use and addiction and is associated with greater problematic cannabis use. Therefore, the current study examined whether sex moderates associations between emotion dysregulation (overall and dimensions of emotion dysregulation) and problematic cannabis use. Methods. 741 adults reporting past-month cannabis use (31.44% female) completed an online anonymous survey, including questions on demographics, substance use, problematic cannabis use (via the Marijuana Problem Scale) and emotion dysregulation (via the Difficulties in Emotion Regulation Scale). Independent samples t-tests and hierarchical multiple linear regressions were performed. Results. Male cannabis users reported significantly higher scores on overall emotion dysregulation and five of six dimensions (nonacceptance, impulse, awareness, strategies, and clarity) compared to female cannabis users. Further, sex moderated associations between emotion dysregulation (overall, nonacceptance, goals, impulse, awareness, and strategies) and problematic cannabis use. Overall, nonacceptance, goals, impulse, and strategies were positively associated with problematic cannabis use, and these relationships were stronger in male cannabis users. Lack of emotional awareness was negatively associated with problematic cannabis use in male cannabis users and no relationship was found for female cannabis users. Conclusions. Overall, these results denote the importance of examining individual differences in emotion dysregulation as they relate to problematic cannabis use. Interventions and treatments may need to be tailored for male cannabis users with a focus on specific emotion dysregulation dimensions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Anonymous reports"

1

Tobin, J. G. Anonymous Referee Report. Office of Scientific and Technical Information (OSTI), Mai 2015. http://dx.doi.org/10.2172/1184184.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Tobin, J. G. An Anonymous Referee Report. Office of Scientific and Technical Information (OSTI), Juni 2015. http://dx.doi.org/10.2172/1251079.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Fields, C. A. Identification of genes in anonymous DNA sequences. Final report: Report period, 15 April 1993--15 April 1994. Office of Scientific and Technical Information (OSTI), September 1994. http://dx.doi.org/10.2172/10182960.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Fields, C. A. Identification of genes in anonymous DNA sequences. Annual performance report, February 1, 1991--January 31, 1992. Office of Scientific and Technical Information (OSTI), Juni 1996. http://dx.doi.org/10.2172/243485.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Rannenberg, Kai, Sebastian Pape, Frédéric Tronnier und Sascha Löbner. Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Universitätsbibliothek Johann Christian Senckenberg, Oktober 2021. http://dx.doi.org/10.21248/gups.63413.

Der volle Inhalt der Quelle
Annotation:
The aim of this study was to identify and evaluate different de-identification techniques that may be used in several mobility-related use cases. To do so, four use cases have been defined in accordance with a project partner that focused on the legal aspects of this project, as well as with the VDA/FAT working group. Each use case aims to create different legal and technical issues with regards to the data and information that are to be gathered, used and transferred in the specific scenario. Use cases should therefore differ in the type and frequency of data that is gathered as well as the level of privacy and the speed of computation that is needed for the data. Upon identifying use cases, a systematic literature review has been performed to identify suitable de-identification techniques to provide data privacy. Additionally, external databases have been considered as data that is expected to be anonymous might be reidentified through the combination of existing data with such external data. For each case, requirements and possible attack scenarios were created to illustrate where exactly privacy-related issues could occur and how exactly such issues could impact data subjects, data processors or data controllers. Suitable de-identification techniques should be able to withstand these attack scenarios. Based on a series of additional criteria, de-identification techniques are then analyzed for each use case. Possible solutions are then discussed individually in chapters 6.1 - 6.2. It is evident that no one-size-fits-all approach to protect privacy in the mobility domain exists. While all techniques that are analyzed in detail in this report, e.g., homomorphic encryption, differential privacy, secure multiparty computation and federated learning, are able to successfully protect user privacy in certain instances, their overall effectiveness differs depending on the specifics of each use case.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie