Academic literature on the topic 'Anonymous reports'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Anonymous reports.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Anonymous reports"

1

Guthrie, Cynthia P., Carolyn Strand Norman, and Jacob M. Rose. "Chief Audit Executives' Evaluations of Whistle-Blowing Allegations." Behavioral Research in Accounting 24, no. 2 (March 1, 2012): 87–99. http://dx.doi.org/10.2308/bria-50154.

Full text
Abstract:
ABSTRACT This study examines the effects of the source of whistle-blowing allegations and potential for allegations to trigger concerns about reputation threats on chief audit executives' handling of whistle-blowing allegations. The participants for this study, chief audit executives (CAEs) and deputy CAEs, evaluated whistle-blowing reports related to financial reporting malfeasance that were received from either an anonymous or a non-anonymous source. The whistle-blowing reports alleged that the wrongdoing resulted from either the exploitation of substantial weaknesses in internal controls (suggesting higher responsibility of the CAE and internal audit) or the circumvention of internal controls (suggesting lower responsibility of the CAE or internal audit). Findings indicate that CAEs believe anonymous whistle-blowing reports to be significantly less credible than non-anonymous reports. Although CAEs assessed lower credibility ratings for the reports alleging wrongdoing by the exploitation of substantial weaknesses in internal controls, they allocated more resources to investigating these allegations.
APA, Harvard, Vancouver, ISO, and other styles
2

Zuravin, Susan J., Brenda Watson, and Mark Ehrenschaft. "Anonymous reports of child physical abuse: Are they as serious as reports from other sources?" Child Abuse & Neglect 11, no. 4 (January 1987): 521–29. http://dx.doi.org/10.1016/0145-2134(87)90078-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dieudonné, Yoann, and Andrzej Pelc. "Deterministic Network Exploration by Anonymous Silent Agents with Local Traffic Reports." ACM Transactions on Algorithms 11, no. 2 (November 17, 2014): 1–29. http://dx.doi.org/10.1145/2594581.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cerdeña, Jessica P., Tehreem Rehman, and Rachel R. Hardeman. "Why Bias Matters in Medicine: Qualitative Insights from Anonymous, Online Reports." Journal of the National Medical Association 112, no. 1 (February 2020): 6–14. http://dx.doi.org/10.1016/j.jnma.2019.10.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Johnson, W. "Benjamin robins: Anonymous pamphlets and reports of 1739–1742, shortly summarized." International Journal of Mechanical Sciences 36, no. 2 (February 1994): 157–68. http://dx.doi.org/10.1016/0020-7403(94)90083-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gogoleski, Mary Ann, Bruce A. Thyer, and Raymond J. Waller. "Reports of Childhood Incest by Adults with Panic Disorder or Agoraphobia." Psychological Reports 73, no. 1 (August 1993): 289–90. http://dx.doi.org/10.2466/pr0.1993.73.1.289.

Full text
Abstract:
A convenience sample of 94 members of an agoraphobia self-help group responded to an anonymous survey on their possible histories of childhood incest. 12 (13%) respondents reported such a history. These results are discussed in terms of hypothesized etiologies of panic disorder and agoraphobia.
APA, Harvard, Vancouver, ISO, and other styles
7

Thomas, Sara E., Emily Weinstein, and Robert L. Selman. "Did I Cross the Line?: Gender Differences in Adolescents’ Anonymous Digital Self-Reports of Wrongdoing in an Online Anonymous Context." Sex Roles 77, no. 1-2 (October 4, 2016): 59–71. http://dx.doi.org/10.1007/s11199-016-0684-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Teixeira da Silva, Jaime A., and Judit Dobránszki. "A new dimension in publishing ethics: social media-based ethics-related accusations." Journal of Information, Communication and Ethics in Society 17, no. 3 (August 12, 2019): 354–70. http://dx.doi.org/10.1108/jices-05-2018-0051.

Full text
Abstract:
Purpose Whistle-blowing, which has become an integral part of the post-publication peer-review movement, is being fortified by social media. Anonymous commenting on blogs as well as Tweets about suspicions of academic misconduct can spread quickly on social media sites like Twitter. The purpose of this paper is to examine two cases to expand the discussion about how complex post-publication peer review is and to contextualize the use of social media within this movement. Design/methodology/approach This paper examines a Twitter-based exchange between an established pseudonymous blogger and science critic, Neuroskeptic, and Elizabeth Wager, the former COPE Chair, within a wider discussion of the use of social media in post-publication peer review. The paper also discusses false claims made on Twitter by another science watchdog, Leonid Schneider. The policies of 15 publishers related to anonymous or pseudonymous whistle-blowing are examined. Findings Four issues in the Neuroskeptic–Wager case were debated: the solicitation by Wager to publish in RIPR; the use of commercial software by Neuroskeptic to make anonymous reports to journals; the links between “publication ethics” leaders and whistle-blowers or pseudonymous identities; the issues of transparency and possible hidden conflicts of interest. Only one publisher (Wiley) out of 15 scientific publishers examined claimed in its official ethical guidelines that anonymous reports should be investigated in the same way as named reports, while three publishers (Inderscience, PLOS and Springer Nature) referred to the COPE guidelines. Originality/value No such Twitter-based case has yet been examined in detail in the publishing ethics literature.
APA, Harvard, Vancouver, ISO, and other styles
9

Gorassini, Donald R. "Brief Hypnotic Suggestibility Training: A Confirmation of its Effectiveness and a Test of Self-Report Validity." Imagination, Cognition and Personality 22, no. 3 (March 2003): 291–302. http://dx.doi.org/10.2190/l111-3x0r-w5pw-738m.

Full text
Abstract:
Participants who pretested low in hypnotic suggestibility were, prior to a retest, either given a four-minute version of the Carleton Skill Training Package or encouraged to try hard. Large pre- to posttest gains in behavioral and nonvolitional suggestibility scores occurred in the training condition only. In order to evaluate the possibility that nonvolition self-reports of trained participants were faked, self-ratings of nonvolition were elicited under anonymous as well as public conditions. Training-induced gains in nonvolition were as great when the ratings were made anonymously as when they were made in public. The implications of these findings are discussed.
APA, Harvard, Vancouver, ISO, and other styles
10

Figueredo, Magdalena, and Fabiana Larrobla. "Uruguayan mortuaries and the No Names: the long story of the unidentified bodies found on the coastline of Uruguay during the Condor Plan." Human Remains and Violence: An Interdisciplinary Journal 3, no. 2 (2017): 56–73. http://dx.doi.org/10.7227/hrv.3.2.5.

Full text
Abstract:
Between 1975 and 1979, thirty-one unidentified bodies bearing marks of torture appeared at various locations along Uruguays coastline. These bodies were material proof of the death flights implemented in neighbouring Argentina after the military coup. In Uruguay, in a general context of political crisis, the appearance of these anonymous cadavers first generated local terror and was then rapidly transformed into a traumatic event at the national level. This article focuses on the various reports established by Uruguayan police and mortuary services. It aims to show how,the administrative and funeral treatments given at that time to the dead bodies, buried anonymously (under the NN label) in local cemeteries, make visible some of the multiple complicities between the Uruguayan and Argentinean dictatorships in the broader framework of the Condor Plan. The repressive strategy implemented in Argentina through torture and forced disappearance was indeed echoed by the bureaucratic repressive strategy implemented in Uruguay through incomplete and false reports, aiming to make the NN disappear once again.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Anonymous reports"

1

Schaer, John. "Assessment of personalisation with anonymous users in major e-commerce systems /." Leeds : University of Leeds, School of Computer Studies, 2008. http://www.comp.leeds.ac.uk/fyproj/reports/0708/Schaer.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

NATALELLO, DORIANA. "LA DISCIPLINA DEGLI SCRITTI ANONIMI NEL DIRITTO AMMINISTRATIVO." Doctoral thesis, Università Cattolica del Sacro Cuore, 2021. http://hdl.handle.net/10280/98840.

Full text
Abstract:
La tesi ha ricostruito la disciplina degli scritti anonimi nel diritto amministrativo. In particolare, in assenza di disposizioni di carattere generale, la ricerca ha avuto l’obiettivo di comprendere la rilevanza attribuita dall’ordinamento pubblicistico alle segnalazioni anonime, sia sul versante processuale sia su quello procedimentale. Nel diritto amministrativo, il fenomeno degli scritti anonimi è stato meno esplorato che nel diritto penale. Di recente, tuttavia, si è registrata una progressiva attenzione per il tema, come si evince soprattutto da due elementi: le numerose pronunce della giurisprudenza relative alla presentazione di denunce anonime volte a sollecitare l’avvio del procedimento amministrativo e i regolamenti delle Autorità amministrative indipendenti che hanno esplicitamente disciplinato il fenomeno. Anche le indicazioni che provengono dal legislatore in alcuni settori speciali sono significative dell’importanza che gli scritti anonimi hanno progressivamente assunto nel diritto amministrativo. La tesi, pertanto, ha analizzato gli indici, peraltro spesso contraddittori, desumibili dall’ordinamento pubblicistico per comprendere le dimensioni del fenomeno degli scritti anonimi e per valutarne la compatibilità con i principi generali dell’attività amministrativa. Domandarsi se la presentazione di una denuncia anonima imponga l’avvio del procedimento significa, infatti, riflettere sulla compatibilità dell’eventuale impiego di tali denunce con i principi che governano l’esercizio dell’azione amministrativa all’interno di un ordinamento democratico.
The dissertation aims to conduct an in-depth examination of anonymous reports’ legal framework in administrative law. In the absence of general provisions on the topic, the research focused on understanding the relevance attributed to anonymous reports by italian public law, both substantive and procedural. Much has been written on the subject of anonymous documents in the field of criminal law, yet the topic was much less studied in administrative law. Recently, though, attention to this theme increased, as demonstrated both by the issuance of regulations concerning anonymous reporting by several independent authorities and the numerous court rulings about anonymous reporting and its effects on the initiation of administrative proceedings. Significant signs of the increasing importance of the phenomenon in administrative law can also be inferred from the specific legislation of certain sectors of the law. The dissertation analyzed the various and often contradictory occurrences of anonymous reports in administrative law, in order to understand the scope of the phenomenon of anonymous reporting and to evaluate its compatibility with the general principles of administrative action. Indeed, the question of whether the submission of an anonymous report can bind the administration to initiate administrative proceedings calls for a in-depth consideration of the compatibility of the use of these reports with the principles governing administrative action in a democracy.
APA, Harvard, Vancouver, ISO, and other styles
3

Guthrie, Cynthia. "The Effects of Reputation Threat and Whistle-Blowing Report Source on Chief Audit Executives' Investigation Decisions." VCU Scholars Compass, 2008. http://scholarscompass.vcu.edu/etd/1609.

Full text
Abstract:
This study examines the effects of reputation threats and anonymous whistle-blowing channels on Chief Audit Executives’ (CAEs) decisions to investigate whistle-blowing allegations. Participants were 94 CAEs and Deputy CAEs from publicly traded companies in the eastern half of the United States. Participants received whistle-blowing reports from either an anonymous or a non-anonymous source. In the high reputation threat condition the whistle-blowing report alleged that the wrongdoing was perpetrated by the exploitation of substantial weaknesses in internal controls that had been previously evaluated by external auditors and the internal audit function. The report in the lower threat condition alleged that the wrongdoing was accomplished by the circumvention of internal controls. Findings show that CAEs found anonymous whistle-blowing reports to be significantly less credible than non-anonymous reports. Although CAEs assessed lower credibility ratings for the reports alleging wrongdoing by the exploitation of substantial weaknesses in internal controls, they perceived greater personal and departmental responsibility in this condition. CAEs did not, however, perceive a significant reputation threat in either the Exploitation or Circumvention condition. Regardless of report source credibility, perceived reputation threat, or felt responsibility, CAEs’ resource allocation decisions consistently demonstrated a determination to thoroughly investigate the allegations of wrongdoing and uncover the truth.
APA, Harvard, Vancouver, ISO, and other styles
4

Christianson-Silva, Paula. "The AIDS prevention media campaign in Michigan impact on clients of anonymous HIV counseling and testing sites : a research report submitted in partial fulfillment ... /." 1988. http://catalog.hathitrust.org/api/volumes/oclc/68788072.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Anonymous reports"

1

Don, Wycliff, and American Society of Newspaper Editors. Ethics and Values Committee., eds. Anonymous sources: Pathways and pitfalls : a report. Reston VA: ASNE Foundation Publications Fulfillment, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alcoholics Anonymous. World Service Meeting. Service through love and humility: Final report. New York, N.Y. (Box 459, Grand Central Station, New York 10163): Alcoholics Anonymous World Services, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alcoholics Anonymous. World Service Meeting. The World Service Meeting takes its inventory: Final report. New York, N.Y. (Box 459, Grand Central Station, New York 10163): Alcoholics Anonymous World Services, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alcoholics Anonymous. World Service Meeting. A.A. and its responsibilities: Tenth World Service Meeting, 1988 : final report, Roosevelt Hotel, New York, New York, October 23-27. New York, N.Y. (Box 459, Grand Central Station 10163): Alcoholics Anonymous World Services, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Meeting, Alcoholics Anonymous World Service. The twelve concepts for world service: Eleventh World Service Meeting : 1990 final report, Bayerischer Hof München Hotel, Munich, Germany, October 14-18. New York, N.Y. (Box 459, Grand Central Station, New York 10163): Alcoholics Anonymous World Services, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Meeting, Alcoholics Anonymous World Service. Anonymous, but not invisible: 19th World Service Meeting 2006 : Malahide, Ireland : final report. New York: Alcoholics Anonymous World Services, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

L, Nelson Michael. Electronic document distribution: Design of anonymous FTP Langley technical report server. Hampton, Va: National Aeronautics and Space Administration, Langley Research Center, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alcoholics Anonymous. World Service Meeting. The A.A. message-- a message without borders: 17th World Service Meeting, Oviedo, Spain, October 6-10, 2002 : final report. New York: Alcoholics Anonymous World Services, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Meeting, Alcoholics Anonymous World Service. A.A., our future is our responsibility: 16th World Service Meeting, New York, New York, October 22-26, 2000 : final report. New York: Alcoholics Anonymous World Services, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alcoholics Anonymous. World Service Meeting. Service-- basic to personal recovery and A.A. unity: 15th World Service Meeting, Auckland, New Zealand, October 4-8, 1998 : final report. New York: Alcoholics Anonymous World Services, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Anonymous reports"

1

Dieudonné, Yoann, and Andrzej Pelc. "Deterministic Network Exploration by Anonymous Silent Agents with Local Traffic Reports." In Automata, Languages, and Programming, 500–512. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31585-5_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Seamons, Kent. "Privacy-Enhancing Technologies." In Modern Socio-Technical Perspectives on Privacy, 149–70. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-82786-1_8.

Full text
Abstract:
AbstractAn increasing amount of sensitive information is being communicated and stored online. Frequent reports of data breaches and sensitive data disclosures underscore the need for effective technologies that users and administrators can deploy to protect sensitive data. Privacy-enhancing technologies can control access to sensitive information to prevent or limit privacy violations. This chapter focuses on some of the technologies that prevent unauthorized access to sensitive information. These technologies include secure messaging, secure email, HTTPS, two-factor authentication, and anonymous communication. Usability is an essential component of a security evaluation because human error or unwarranted inconvenience can render the strongest security guarantees meaningless. Quantitative and qualitative studies from the usable security research community evaluate privacy-enhancing technologies from a socio-technical viewpoint and provide insights for future efforts to design and develop practical techniques to safeguard privacy. This chapter discusses the primary privacy-enhancing technologies that the usable security research community has analyzed and identifies issues, recommendations, and future research directions.
APA, Harvard, Vancouver, ISO, and other styles
3

Tomaselli, Venera, and Giulio Giacomo Cantone. "Multipoint vs slider: a protocol for experiments." In Proceedings e report, 91–96. Florence: Firenze University Press, 2021. http://dx.doi.org/10.36253/978-88-5518-304-8.19.

Full text
Abstract:
Since the broad diffusion of Computer-Assisted survey tools (i.e. web surveys), a lively debate about innovative scales of measure arose among social scientists and practitioners. Implications are relevant for applied Statistics and evaluation research since while traditional scales collect ordinal observations, data from sliders can be interpreted as continuous. Literature, however, report excessive times of completion of the task from sliders in web surveys. This experimental protocol is aimed at testing hypotheses on the accuracy in prediction and dispersion of estimates from anonymous participants who are recruited online and randomly assigned into tasks in recognition of shades of colour. The treatment variable is two scales: a traditional multipoint 0-10 multipoint vs a slider 0-100. Shades have a unique parametrisation (true value) and participants have to guess the true value through the scale. These tasks are designed to recreate situations of uncertainty among participants while minimizing the subjective component of a perceptual assessment and maximizing information about scale-driven differences and biases. We propose to test statistical differences in the treatment variable: (i) mean absolute error from the true value (ii), time of completion of the task. To correct biases due to the variance in the number of completed tasks among participants, data about participants can be collected through both pre-tasks acceptance of web cookies and post-tasks explicit questions.
APA, Harvard, Vancouver, ISO, and other styles
4

Piscitelli, Alfonso, Roberto Fasanelli, Elena Cuomo, and Ida Galli. "Understanding the sensory characteristics of edible insects to promote entomophagy: A projective sensory experience among consumers." In Proceedings e report, 223–27. Florence: Firenze University Press, 2021. http://dx.doi.org/10.36253/978-88-5518-461-8.42.

Full text
Abstract:
In recent years, a remarkable number of studies have investigated sensory characteristics, such as flavor and texture, of edible insect and insect-based foods, their contribution to consumers’ attitudes toward edible insects are important in consumer appeal and their willingness to try eating insects in the future. This paper addresses the problem of describing the sensory characteristics aof edible insect and insect-based foods in terms of preferences. To this end, we conducted a study to explore the representations of sensory experiences related to an insect-based dish involving a voluntary sample of 154 consumers. The quasi-experiment, which we have called projective sensory experience (PSE), follows a two-step procedure. In the first step, we asked the participants to imagine tasting an insect-based dish and then to rate, from 1 (imperceptible) up to 10 (very perceptible), the following taste-olfactory sensations: Sapidity, Bitter tendency, Acidity, Sweet, Spiciness, Aroma, Greasiness-Unctuosity, Succulence, Sweet, Fatness, Persistence. In the second step, we asked our interviewees to indicate, through a specific check-list, which was the most disturbing and least disturbing taste-olfactory sensation imagined. We collected data from May to July 2020 by using an anonymous on-line questionnaire. Results could help understand the sensory characteristics of “insects as food” that should be used or avoided, for example, in communication aimed at promoting familiarity with edible insects and improving the acceptability of insects as a novel food.
APA, Harvard, Vancouver, ISO, and other styles
5

"Pfarr v. Anonymous 180 ILR 422." In International Law Reports, edited by Christopher Greenwood and Karen Lee, 422–32. 79 Anson Road, #06–04/06, Singapore 079906: Cambridge University Press, 2019. http://dx.doi.org/10.1017/9781108562454.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Anonymous reports of lethal cases of ovarian hyperstimulation syndrome." In Ovarian Hyperstimulation Syndrome, 75–86. CRC Press, 2006. http://dx.doi.org/10.1201/9780203018873-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Hostile Reports of Anonymous Referees on Novelty in Graphical Bioinfomatics." In Solved and Unsolved Problems of Structural Chemistry, 433–36. CRC Press, 2016. http://dx.doi.org/10.1201/b19046-30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Isoni, Andrea, Daniel Read, Julia Kolodko, Julián Arango-Ochoa, Jiarong Chua, Shristi Tiku, and Alanda Kariza. "Can upfront declarations of honesty improve anonymous self-reports of sensitive information?" In Dishonesty in Behavioral Economics, 319–40. Elsevier, 2019. http://dx.doi.org/10.1016/b978-0-12-815857-9.00017-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

McAnulty, Richard. "Frotteurism." In Unusual and Rare Psychological Disorders, 136–48. Oxford University Press, 2016. http://dx.doi.org/10.1093/med:psych/9780190245863.003.0010.

Full text
Abstract:
Frotteurism, also known as forcible touching, is a paraphilia characterized by recurrent and persistent sexual arousal from touching or rubbing against a nonconsenting person, usually a stranger. When reports of such aberrant incidents were first published at the turn of the 19th century, these crimes were viewed as deviant and rare. Today, however, unwanted sexual “groping” or “grinding,” as it is known in the popular press, is rather commonly reported. This unwanted contact often occurs in congested areas and on crowded public transportation systems.The chapter discusses potential etiologies for frotteurism, along with potentially aggravating factors. Despite the anonymous nature of their crimes, frotteurs, when compared with other sex offenders, have some of the highest number of victims.
APA, Harvard, Vancouver, ISO, and other styles
10

Rakova, Snezhana. "The Earliest Records of Income and Expenses of the Sultan." In Hilâl. Venice: Edizioni Ca' Foscari, 2018. http://dx.doi.org/10.30687/978-88-6969-260-4/002.

Full text
Abstract:
This paper presents in a chronological order some Venetian sources (primarily, but not only) containing data about the Ottoman state, governance, income and army. This information is analyzed and presented in the form of tables, which give us different types of revenues and expenses. It is unique for the 15th century and can be compared partially only with the contemporary ottoman written documentation. Presented here is the data from the works of Laonicos Chalkokondyles, and manuscripts of Iacopo Promontorio de Campis, a Venetian anonymous author from 1490, the Venetian Relazione by Alvise Sagondino from 1496 and other diplomatic reports from the first decades of the 16th century. The report of Felix Petantius from 1502 to the Hungarian king has been added to other Venetian texts, because it was edited in a different manuscript version and presented to Venice.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Anonymous reports"

1

Perry, Jo, and Sarah Probine. "Reconceptualising the Assessment Practices Within Early Childhood Field Placements: Using Collaborative Reflective Conversations to Mentor Student Teachers on Practicum." In Rangahau Horonuku Hou – New Research Landscapes, Unitec/MIT Research Symposium 2021. Unitec ePress, 2022. http://dx.doi.org/10.34074/proc.2206004.

Full text
Abstract:
The practicum components in early childhood field-based programmes form a core part of achieving praxis, or the balance between theory and practice, which is interwoven with values, beliefs and experiences that form a teacher identity. The practicum assessment involves achieving competency against a set of discipline-based criteria during a period of observation by an external, registered teacher. This paper reports on responses to the national Covid-19 lockdown restrictions, under which the requirements of the traditional practicum could not be met and an alternative version of the assessment had to be developed. The methodology for this project was constructivist grounded theory coupled with a socio-constructivist ethos. The method of data collection was an anonymous survey of students, lecturers and centre-based teachers. The findings indicate an unexpected growth in student empowerment in discussing their own practice.
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Hao, Jonathan Corney, and Michael Grant. "Crowdsourcing Measures of Design Quality." In ASME 2014 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/detc2014-34967.

Full text
Abstract:
Today there are numerous examples of collaborative online communities effectively creating innovative products (e.g., RepRap, Linux). But the potential of anonymous crowds to also engage in generative design, through the aggregation of many small contributions, is less clear. Although in recent years the “power of the crowd” has been repeatedly demonstrated in areas that range from image labelling to linguistic translation. The application of crowdsourcing in the fields of design research and creative innovation has been much slower to emerge. As a result, although there have been reports of systems and researchers using Internet crowdsourcing to carry out generative design, there are still many gaps in knowledge about the capability and limitations of the technology. For example on commercial crowdsourcing platforms, the relationship between remuneration and the final quality of designs has not been established, so it is unclear how much payment should be offered in order to ensure a particular standard of result. Key to investigating the relationship between the crowd’s remuneration and the value of their innovation is a robust method for quantifying the quality of the designs produced. This paper reports how payment for a design task (a 2D layout problem) was systematically varied and the quality of the output assessed through a separate crowdsourcing process. The work provides some interesting and valuable insight into how Crowdsourcing can be most effectively employed in design tasks.
APA, Harvard, Vancouver, ISO, and other styles
3

Vinh, Paul, Lichun Zhang, and Rick Barlow. "Extreme Testing: Assessing CPM Leak Detection Systems on a Northern Oil Pipeline." In 2012 9th International Pipeline Conference. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/ipc2012-90258.

Full text
Abstract:
Pipelines in remote and ecologically sensitive regions pose special challenges for pipeline integrity monitoring. These challenges include difficulties of access, reliability issues of communication and instrumentation that may impact the leak detection technology applied in these regions. The selection, application and continuous testing of an appropriate technology to detect possible leaks are important to pipeline integrity monitoring. The paper reports theoretical assessment and extensive testing on an Enbridge subarctic liquid pipeline. It also reports the comprehensive cost-benefit analysis to guide the leak detection instrument design/configuration and the evaluation of the capabilities of alternative computational pipeline monitoring (CPM) technologies for leak detection. The selected test pipeline is an 869 kilometer (540 mile), NPS 12 inch pipeline that transports sweet crude through environmentally sensitive areas. This pipeline currently uses a real-time transient model (RTTM) style CPM as the leak detection system (LDS). The pipeline LDS is tested annually by a number of industry-recognized methodologies. These include fluid withdrawal tests, simulated leak tests and an API-1130 instrument adjustment approach. This pipeline is also assessed by API-1149 for its theoretical CPM leak detection sensitivity. A pilot project invited commercial CPM-style vendors to participate in an LDS test using data from fluid withdrawal and simulated leak tests. Five vendors responded and were included in the test suite. The paper describes the design and implementation of the test process. The results of the commercial systems are presented in aggregated form and the participating vendors remain anonymous. Performance assessment focuses on the LDS evaluation factors of sensitivity and accuracy. The paper concludes with a “lessons learned” review of issues associated with test design.
APA, Harvard, Vancouver, ISO, and other styles
4

Thomas, Robert W., and Jose M. Vidal. "Assessing the credibility of vehicle data reported by anonymous sources." In 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON). IEEE, 2017. http://dx.doi.org/10.1109/uemcon.2017.8249085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Da Silveira, Márcio V. C., and Wladmir C. Brandão. "Characterizing Crimes from Web." In VI Brazilian Workshop on Social Network Analysis and Mining. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/brasnam.2017.3249.

Full text
Abstract:
Crime prevention requires the effective use of police resources, which demands the access of criminal information for planning security actions. The number of crime occurrences is higher than the official reported numbers. Many victims do not report crimes directly to the security agencies. Instead, they prefer to anonymously report using different channels, such as the Web. In this article, we introduce our approach to characterize crimes reported in the Web. Particularly, we collect criminal data from popular websites that store crime occurrences, and we use clustering analysis to discover crime patterns on the collected data. Applying our approach to a popular Brazilian crime report website, we observe that more than 41% of the crimes were not reported to the security agencies, and most of them are thefts and robberies occurring at night and dawn. In addition, minor offenses present different patterns of serious crimes. Moreover, crime patterns are different in rich and poor neighborhood.
APA, Harvard, Vancouver, ISO, and other styles
6

Ermolenko, G., and S. Kozhevnikov. "DECONSTRUCTION OF AUTHORSHIP IN MODERN ART PRACTICES." In Aesthetics and Hermeneutics. LCC MAKS Press, 2022. http://dx.doi.org/10.29003/m2565.978-5-317-06726-7/142-144.

Full text
Abstract:
The report presents the main trends in modern art practices related to the transformation of the institution of authorship. In street art and landscape design, authorship is a function of urban aesthetic spaces,so the work of urban artists tends to be anonymous, the conceptual expression of which belongs to Banksy. Deconstruction of authorship in modern art practices is an attempt to revise the author's role in creating an aesthetic environment by artistic means in the context of turning art into an open communication platform.
APA, Harvard, Vancouver, ISO, and other styles
7

Frazier, Colin M., Alexa S. Burr, and Ryan D. Meng. "API's Process Safety Site Assessment Program (PSSAP®): Programmatic Updates, Regional Assessments and New Programs Discussion." In ADIPEC. SPE, 2022. http://dx.doi.org/10.2118/210851-ms.

Full text
Abstract:
Abstract The American Petroleum Institute (API) and the U.S. oil and natural gas industry prioritize protecting the health and safety of workers, contractors and the communities in which we operate. For more the 100 years, API has led the development of industry standards, sharing lessons learned as well as the establishment of training and certification programs, all available worldwide. API continues to operate the Process Safety Site Assessment Program (PSSAP®), an assessment program focused on evaluating higher risk activities in a refining, petrochemical, or chemical facility. This program is intended to: Promote process safety performance improvement industry wide;Promote learnings from industry practices;Provide benchmarking through the consistent use of industry-developed good practice protocols;Serve as a feedback mechanism for an analysis of industry performance; and,Encourage safety collaboration among participating sites and industry experts. In early 2022, API finalized the creation of the Hydrofluoric Acid Alkylation Assessment based on Recommended Practice 751, Safe Operation of Hydrofluoric Acid Alkylation Units, 5th Edition. This updated assessment protocol incorporates changes from the 4th Edition to the 5th Edition of Recommended Practice (RP) 751, which includes double the requirements from the previous edition. API launched a new offering: PSSAP Extended Learning. Following a PSSAP assessment, this offering allows sites to utilize assessors to conduct dedicated good practice sharing in areas warranting more focus. This offering can help sites struggling with certain topics to get more details about what good practices exist within industry in these areas. Over the past two years, API and industry experts developed a new Safeguards protocol, focused on how well they are implemented after they are identified in a process hazard analysis. This will allow sites to better gauge how well they are mitigating risks identified in their analyses. Finally, as more operators in Europe, Asia, and the Middle East utilize PSSAP, API has approved the creation of regionally specific benchmarking in addition to the benchmarking reports received for assessments, contingent upon ten (10) operators having conducted assessments in a specific region. Looking forward, API anticipates the ability to produce this blinded and anonymous benchmarking for other regions starting in 2022, which will allow operators to compare their performance in PSSAP assessments to those of their regional peers. PSSAP has completed over 160 assessments to date, with 24 currently scheduled in 2022. Eleven (11) of these 24 assessments are to be conducted internationally in 2022, demonstrating robust growth in international interest in PSSAP. To that end, API completed the first RP 751 5th Edition assessment in the Middle East Region in 2Q 2022. These updates, along with other program-specific updates, will be discussed to ensure attendees are aware of PSSAP's evolving suite of offerings.
APA, Harvard, Vancouver, ISO, and other styles
8

Arroyo-de Dompablo, Elena M., and María José Ibáñez-González. "Analysis of two Leveling Courses in Chemistry: objectives, methodology, assessments and future prospects." In Fourth International Conference on Higher Education Advances. Valencia: Universitat Politècnica València, 2018. http://dx.doi.org/10.4995/head18.2018.7929.

Full text
Abstract:
The purpose of this report is to analyze different aspects of two levelling courses in Chemistry, offered to entry-levels students in the Degree in Geology (Universidad Complutense de Madrid) and in the degree in Agricultural Engineering (Universidad de Almería). We comparatively analyze the motivations for offering the course, its aims and objectives, the course design and finally the methodology ans assessments of the course in both universities. The assessment of the learning process is done through quizzes at the beginning and at the end of the courses. Voluntary and anonymous surveys show that the students are very satisfied with the courses. In the future, the aim is to improve the learning methodology in order to achieve greater student motivation
APA, Harvard, Vancouver, ISO, and other styles
9

SUGLIANO, Nathalie. "Proficiency testing for calibration of multimeter." In 19th International Congress of Metrology (CIM2019), edited by Sandrine Gazal. Les Ulis, France: EDP Sciences, 2019. http://dx.doi.org/10.1051/metrology/201911006.

Full text
Abstract:
In 2018 and 2019, CT2M organize an inter-laboratory comparison of multimeter calibration in which 27 Europeans laboratories participated. Among them were calibration laboratories (accredited or not) but also laboratories performing themselves the calibrations of their multimeter. The principle of this inter-laboratory comparison is to circulate a multimeter from one laboratory to another in order to compare the calibration results (including correction and calibration uncertainty). The processing of the results is carried out according to the ISO 13528 statistical principles and in compliance with the requirements of ISO 17043. A final report in 2019 will indicate to the participants all the results in anonymous way and the performance scores to evaluate the ability of laboratories to carry out this calibration. This article will present the organization of this inter-laboratory comparison as well as the results obtained.
APA, Harvard, Vancouver, ISO, and other styles
10

Cavalli, Jessica, and Anita Cservenka. "Sex Moderates Associations Between Dimensions of Emotion Dysregulation and Problematic Cannabis Use." In 2021 Virtual Scientific Meeting of the Research Society on Marijuana. Research Society on Marijuana, 2022. http://dx.doi.org/10.26828/cannabis.2022.01.000.31.

Full text
Abstract:
Background. Research consistently finds that male cannabis users report greater problematic cannabis use (i.e., negative outcomes related to one’s cannabis use), compared to female cannabis users. Further, emotion dysregulation is a transdiagnostic risk factor for substance use and addiction and is associated with greater problematic cannabis use. Therefore, the current study examined whether sex moderates associations between emotion dysregulation (overall and dimensions of emotion dysregulation) and problematic cannabis use. Methods. 741 adults reporting past-month cannabis use (31.44% female) completed an online anonymous survey, including questions on demographics, substance use, problematic cannabis use (via the Marijuana Problem Scale) and emotion dysregulation (via the Difficulties in Emotion Regulation Scale). Independent samples t-tests and hierarchical multiple linear regressions were performed. Results. Male cannabis users reported significantly higher scores on overall emotion dysregulation and five of six dimensions (nonacceptance, impulse, awareness, strategies, and clarity) compared to female cannabis users. Further, sex moderated associations between emotion dysregulation (overall, nonacceptance, goals, impulse, awareness, and strategies) and problematic cannabis use. Overall, nonacceptance, goals, impulse, and strategies were positively associated with problematic cannabis use, and these relationships were stronger in male cannabis users. Lack of emotional awareness was negatively associated with problematic cannabis use in male cannabis users and no relationship was found for female cannabis users. Conclusions. Overall, these results denote the importance of examining individual differences in emotion dysregulation as they relate to problematic cannabis use. Interventions and treatments may need to be tailored for male cannabis users with a focus on specific emotion dysregulation dimensions.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Anonymous reports"

1

Tobin, J. G. Anonymous Referee Report. Office of Scientific and Technical Information (OSTI), May 2015. http://dx.doi.org/10.2172/1184184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tobin, J. G. An Anonymous Referee Report. Office of Scientific and Technical Information (OSTI), June 2015. http://dx.doi.org/10.2172/1251079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fields, C. A. Identification of genes in anonymous DNA sequences. Final report: Report period, 15 April 1993--15 April 1994. Office of Scientific and Technical Information (OSTI), September 1994. http://dx.doi.org/10.2172/10182960.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fields, C. A. Identification of genes in anonymous DNA sequences. Annual performance report, February 1, 1991--January 31, 1992. Office of Scientific and Technical Information (OSTI), June 1996. http://dx.doi.org/10.2172/243485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rannenberg, Kai, Sebastian Pape, Frédéric Tronnier, and Sascha Löbner. Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Universitätsbibliothek Johann Christian Senckenberg, October 2021. http://dx.doi.org/10.21248/gups.63413.

Full text
Abstract:
The aim of this study was to identify and evaluate different de-identification techniques that may be used in several mobility-related use cases. To do so, four use cases have been defined in accordance with a project partner that focused on the legal aspects of this project, as well as with the VDA/FAT working group. Each use case aims to create different legal and technical issues with regards to the data and information that are to be gathered, used and transferred in the specific scenario. Use cases should therefore differ in the type and frequency of data that is gathered as well as the level of privacy and the speed of computation that is needed for the data. Upon identifying use cases, a systematic literature review has been performed to identify suitable de-identification techniques to provide data privacy. Additionally, external databases have been considered as data that is expected to be anonymous might be reidentified through the combination of existing data with such external data. For each case, requirements and possible attack scenarios were created to illustrate where exactly privacy-related issues could occur and how exactly such issues could impact data subjects, data processors or data controllers. Suitable de-identification techniques should be able to withstand these attack scenarios. Based on a series of additional criteria, de-identification techniques are then analyzed for each use case. Possible solutions are then discussed individually in chapters 6.1 - 6.2. It is evident that no one-size-fits-all approach to protect privacy in the mobility domain exists. While all techniques that are analyzed in detail in this report, e.g., homomorphic encryption, differential privacy, secure multiparty computation and federated learning, are able to successfully protect user privacy in certain instances, their overall effectiveness differs depending on the specifics of each use case.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography