Littérature scientifique sur le sujet « Consent search »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Consent search ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Consent search"
McMullan, Sam. « Third Party Consent Searches Following the Search and Surveillance Act ». Victoria University of Wellington Law Review 43, no 3 (1 septembre 2012) : 447. http://dx.doi.org/10.26686/vuwlr.v43i3.5030.
Texte intégralAn, Seong-Su. « Consent search and seizure ». Korean Journal of Comparative Criminal Law 10, no 1 (juillet 2008) : 301–36. http://dx.doi.org/10.23894/kjccl.2008.10.1.013.
Texte intégralKim, Gi Ho. « A study on consent search ». Wonkwang University Legal Research Institute 40, no 2 (30 juin 2024) : 41–59. http://dx.doi.org/10.22397/wlri.2024.40.2.41.
Texte intégralZuk, Peter, et Gabriel Lázaro-Muñoz. « Treatment Search Fatigue and Informed Consent ». AJOB Neuroscience 12, no 1 (2 janvier 2021) : 77–79. http://dx.doi.org/10.1080/21507740.2020.1866115.
Texte intégralKappeler, Victor E., et Joseph B. Vaughn. « The evolution of consent search law ». American Journal of Criminal Justice 10, no 2 (mars 1986) : 163–77. http://dx.doi.org/10.1007/bf02887468.
Texte intégralWulach, James S. « Psychological Evaluation of the Consent to Search ». Journal of Psychiatry & ; Law 18, no 3-4 (septembre 1990) : 319–28. http://dx.doi.org/10.1177/0093185390018003-404.
Texte intégralLokshin, G. « Vietnam-China Relations : a Difficult Search for Consent ». Problemy Dalnego Vostoka, no 2 (avril 2019) : 126–35. http://dx.doi.org/10.31857/s013128120005187-6.
Texte intégralSchellings, Ron, Alfons G. Kessels, Gerben ter Riet, J. André Knottnerus et Ferd Sturmans. « Randomized consent designs in randomized controlled trials : Systematic literature search ». Contemporary Clinical Trials 27, no 4 (août 2006) : 320–32. http://dx.doi.org/10.1016/j.cct.2005.11.009.
Texte intégralJafarbeiki, Sara, Amin Sakzad, Ron Steinfeld, Shabnam Kasra Kermanshahi, Chandra Thapa et Yuki Kume. « ACE : A Consent-Embedded privacy-preserving search on genomic database ». Heliyon 10, no 8 (avril 2024) : e29399. http://dx.doi.org/10.1016/j.heliyon.2024.e29399.
Texte intégralLepola, Pirkko, Allison Needham, Jo Mendum, Peter Sallabank, David Neubauer et Saskia de Wildt. « Informed consent for paediatric clinical trials in Europe ». Archives of Disease in Childhood 101, no 11 (25 mai 2016) : 1017–25. http://dx.doi.org/10.1136/archdischild-2015-310001.
Texte intégralThèses sur le sujet "Consent search"
Gold, Rebecca M. « Perceptions of Search Consent Voluntariness as a Function of Race ». Scholarship @ Claremont, 2015. http://scholarship.claremont.edu/scripps_theses/652.
Texte intégralHowe, Julie E. « Voluntary Consent to Police Searches : A Result of the Foot-In-The-Door Technique ». W&M ScholarWorks, 1993. https://scholarworks.wm.edu/etd/1539625845.
Texte intégralGuénolé, Nicolas. « Conseil adaptatif et accompagnement des demandeurs d'emploi ». Phd thesis, Conservatoire national des arts et metiers - CNAM, 2013. http://tel.archives-ouvertes.fr/tel-01062786.
Texte intégralPanjwani, Hasnain. « Development of a torsion balance facility and a search for temporal variations in the Newtonian gravitational constant ». Thesis, University of Birmingham, 2012. http://etheses.bham.ac.uk//id/eprint/3758/.
Texte intégralPoulet, Sarah. « Contextual Cueing : apprentissage des régularités spatiales de l’environnement au cours de la recherche visuelle et accès conscient aux connaissances ». Thesis, Bourgogne Franche-Comté, 2019. http://www.theses.fr/2019UBFCC027.
Texte intégralWhile deeply complex, the visual world is highly structured and redundant. Through experience, human beings can thus learn regularities present in the visual world, and exploit them to deal with information overload and facilitate behaviors. For the past twenty years, the Contextual Cueing (CC) paradigm has provided an experimental tool to study, in the laboratory, how spatial regularities can be learned to expedite visual search. The first part of this dissertation reviews the existing literature related to this paradigm. It mainly discusses the implicit nature of CC, the characterization of the acquired knowledge and its facilitating effect, as well as the generalization of spatial CC to other regularities and environments. In a second part, three experimental studies using the CC paradigm are presented. The first one shows that, in natural scenes, the acquisition of implicit knowledge tends to precede the conscious exploitation of regularities that classically accompanies CC in this type of environment. In artificial scenes (i.e., letter configurations), even if CC does not seem to primarily depend on the proper implementation of explicit and conscious processes, our second study reports that its integrity is threatened during normal ageing. Finally, our third study investigates whether CC can emerge from very brief exposures of regularities (i.e., 50ms), and suggests that regularities can actually be extracted and exploited even though search displays are not (physically) available long enough to complete the search
Marzioni, Maria Francesca. « Axion dark matter and two-neutrino double electron capture searches in the Large Underground Xenon experiment ». Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31054.
Texte intégralKhalil, Sadia. « Measurement of the branching fraction of D+ meson going to muon+ neutrino and the pseudoscalar decay constant fD+ using the full psi'' sample and search for neutral D meson going to proton-electron and neutral D meson going to antiproton-positron ». Related electronic resource : Current Research at SU : database of SU dissertations, recent titles available full text, 2009. http://wwwlib.umi.com/cr/syr/main.
Texte intégralJin, Shendan. « Online computation beyond standard models ». Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS152.
Texte intégralIn the standard setting of online computation, the input is not entirely available from the beginning, but is revealed incrementally, piece by piece, as a sequence of requests. Whenever a request arrives, the online algorithm has to make immediately irrevocable decisions to serve the request, without knowledge on the future requests. Usually, the standard framework to evaluate the performance of online algorithms is competitive analysis, which compares the worst-case performance of an online algorithm to an offline optimal solution. In this thesis, we will study some new ways of looking at online problems. First, we study the online computation in the recourse model, in which the irrevocability on online decisions is relaxed. In other words, the online algorithm is allowed to go back and change previously made decisions. More precisely, we show how to identify the trade-off between the number of re-optimization and the performance of online algorithms for the online maximum matching problem. Moreover, we study measures other than competitive analysis for evaluating the performance of online algorithms. We observe that sometimes, competitive analysis cannot distinguish the performance of different algorithms due to the worst-case nature of the competitive ratio. We demonstrate that a similar situation arises in the linear search problem. More precisely, we revisit the linear search problem and introduce a measure, which can be applied as a refinement of the competitive ratio. Last, we study the online computation in the advice model, in which the algorithm receives as input not only a sequence of requests, but also some advice on the request sequence. Specifically, we study a recent model with untrusted advice, in which the advice can be either trusted or untrusted. Assume that in the latter case, the advice can be generated from a malicious source. We show how to identify a Pareto optimal strategy for the online bidding problem in the untrusted advice model
Gervier, Pauline. « La limitation des droits fondamentaux constitutionnels par l’ordre public ». Thesis, Bordeaux 4, 2013. http://www.theses.fr/2013BOR40058/document.
Texte intégralThe dialectics of public order and freedoms has been traveling throughout legal thought since the 18th century. Sparked by new forms of delinquency and criminality, the strengthening of public order requirements leads to questioning the limitation of fundamental constitutional rights. Despite its crucible place between public order and freedoms, the limitation process remains undetermined in French law. This research, which aims at determining the limitations to protected rights, identifying the limitations to those limitations themselves, and then redefining fundamental rights through those limitations, not only helps to specify this mechanism, but also to identify the restrictions brought to the enjoyment of rights and freedoms. The Conseil constitutionnel self-restraint reveals a gradual shift in the protection of fundamental rights. Acknowledging the former leads to considering a supra legislative framework to the limitations to protected rights, and advocating in favor of the constitutional entrenchment of such a clause
李巧雯. « Consent search ». Thesis, 2016. http://ndltd.ncl.edu.tw/handle/jx7abq.
Texte intégral輔仁大學
法律學系碩士在職專班
104
This paper explores the practice of “consent searches”, searching without warrants when necessary for an investigation as an exception to the principle of legal reservation. While it violates the people’s constitutional right by nature, it is widely used in practice. For this reason, it is necessary to study the possible approaches to control the legality of searching without warrants, such as a threshold to initiate, and the limits for, such searches. Since “consent search” is a form of search, this paper discusses the threshold to initiate, and the scope of, searches with and without warrants in Chapter 2. Chapter 3 explores the theoretical bases for consent searches (consent given by those affected or by third persons), and discusses whether “consent” may be the basis for a search, which is a compulsory measure that interferes and violates the people’s constitutional right. Chapter 4 analyzes the elements of consent searches: subject, party, capacity, obligation of disclosure upon refusal to searches, voluntariness, rescinding, display of credentials and display of consent on record. This Chapter also provides, on the basis of Chapter 3, solutions to problems in determining whether a party has the capacity to give consent, or resolving conflicts between parties. Further, this Chapter reviews the practices of Taiwan and the U.S. on the voluntariness of consent, which is difficult to determine for searches. Finally, this paper studies Taiwan’s current legal framework and practices, and concludes that because of Taiwan’s unique practical approach, consent searches have become a shortcoming in Taiwan’s human rights protection regime. Therefore, this paper deems that the necessity of consent searches, which only serve the convenience of investigations while violating the people’s constitutional right, should be subject to skepticism.
Livres sur le sujet "Consent search"
Decker, Scott H. Reducing gun violence : The St. Louis consent-to-search program. Washington, DC (810 Seventh St., N.W., Washington 20531) : U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 2004.
Trouver le texte intégralDecker, Scott H. Reducing gun violence : The St. Louis Consent-to-Search Program. [Washington, D.C.] : U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 2004.
Trouver le texte intégralDecker, Scott H. Reducing gun violence : The St. Louis Consent-to-Search Program. [Washington, D.C.] : U.S. Department of Justice, Office of Justice Programs, National Institute of Justice, 2004.
Trouver le texte intégralOlson, Theodore B. The senate confirmation process : Advise and consent, or search and destroy ? Washington, D.C : National Legal Center for the Public Interest, 2006.
Trouver le texte intégralEurope, Council of, dir. Council of Europe Convention on Laundering, Search, Seizure and Confiscation of the Proceeds from Crime and on the Financing of Terrorism = : Convention du Conseil de l'Europe relative au blanchiment, au dépistage, `a la saisie et `a la confiscation des produits du crime et au financement du terrorisme. Strasbourg : Council of Europe Publishing, 2005.
Trouver le texte intégralSearch & Research, Lectures and Papers Vol 22 : The Murder of the Jews and Popular Consent : German Society during the Nazi Dictatorship. Yad Vashem Publications, 2015.
Trouver le texte intégralCrépon, Marc. Murderous Consent. Traduit par Michael Loriaux et Jacob Levi. Fordham University Press, 2019. http://dx.doi.org/10.5422/fordham/9780823283750.001.0001.
Texte intégralEileen, Denza. Inviolability of the Mission Premises. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198703969.003.0020.
Texte intégralCutter, Mary Ann G. Thinking Through Breast Cancer. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190637033.001.0001.
Texte intégralMøller, Ann Merete. Evidence-based medicine in anaesthesia. Sous la direction de Jonathan G. Hardman. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780199642045.003.0029.
Texte intégralChapitres de livres sur le sujet "Consent search"
Waites, Matthew. « Sexual Liberationism and the Search for New Sexual Knowledge ». Dans The Age of Consent, 119–57. London : Palgrave Macmillan UK, 2005. http://dx.doi.org/10.1057/9780230505933_6.
Texte intégralBisht, Renuka. « The Search for a Happy Ending ». Dans Desire and Consent in Representations of Adolescent Sexuality with Adults, 169–84. London : Routledge, 2023. http://dx.doi.org/10.4324/9781003283768-12.
Texte intégralMacLean, Charles E., et James A. Densley. « Court-Approved Police Deception in Obtaining Consent to Search ». Dans Police, Prosecutors, Courts, and the Constitution, 41–49. Cham : Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-39082-1_4.
Texte intégralVito, Anthony G., et George E. Higgins. « Understanding the role of race, gender and age in request to consent search drivers ». Dans Over-Policing Black Bodies, 43–63. London : Routledge, 2023. http://dx.doi.org/10.4324/9781003379652-4.
Texte intégralSignorelli, Walter P. « Consent Searches ». Dans Criminal Law, Procedure, and Evidence, 165–78. 2e éd. New York : Routledge, 2023. http://dx.doi.org/10.4324/9781003415091-16.
Texte intégraldel Carmen, Rolando V., et Jeffery T. Walker. « Searches with Consent ». Dans Briefs of Leading Cases in Law Enforcement, 117–30. Tenth edition. | Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2020. : Routledge, 2019. http://dx.doi.org/10.4324/9780429053139-8.
Texte intégralKagehiro, Dorothy K., et Ralph B. Taylor. « Exploring the Fourth Amendment : Searches Based on Consent ». Dans Handbook of Psychology and Law, 21–36. New York, NY : Springer New York, 1992. http://dx.doi.org/10.1007/978-1-4757-4038-7_2.
Texte intégralMurphy, Erin. « Conceptions of consent, family and jurisdiction in forensic genetic genealogical searches ». Dans Law, Practice and Politics of Forensic DNA Profiling, 217–33. London : Routledge, 2022. http://dx.doi.org/10.4324/9780429322358-17.
Texte intégralJackson Kimball, Derek F., Leanne D. Duffy et David J. E. Marsh. « Ultralight Bosonic Dark Matter Theory ». Dans The Search for Ultralight Bosonic Dark Matter, 31–72. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95852-7_2.
Texte intégralGupte, Akshay, Melanie Siebenhofer et Angelika Wiegele. « Computing the Edge Expansion of a Graph Using Semidefinite Programming ». Dans Lecture Notes in Computer Science, 111–24. Cham : Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-60924-4_9.
Texte intégralActes de conférences sur le sujet "Consent search"
Jung, Eun Sun, Luis Fernando Gomes Carreira, Vinicius Finisguerra Vianna, Taina Ribeiro Azevedo et Rubens José Gagliardi. « General knowledge of stroke in Aparecida city : reports from an academic expedition ». Dans XIV Congresso Paulista de Neurologia. Zeppelini Editorial e Comunicação, 2023. http://dx.doi.org/10.5327/1516-3180.141s1.452.
Texte intégralКиреева, Виктория, Viktoriya Kireeva, Ю. Усольцев, Yu Usolcev, Ж. Капустенская, Zh Kapustenskaya, Е. Кожевникова et al. « Intermediate results 2016 of a search study of translational diagnostic methods Mitochondrial dysfunction in patients with chronic myocardial ischemia and/or head Brain ». Dans Topical issues of translational medicine : a collection of articles dedicated to the 5th anniversary of the day The creation of a department for biomedical research and technology of the Irkutsk Scientific Center Siberian Branch of RAS. Москва : INFRA-M Academic Publishing LLC., 2017. http://dx.doi.org/10.12737/conferencearticle_58be81ec94893.
Texte intégralSavade, Latika C., et Suraj Chavan. « A technique to search log records using system of linear equations ». Dans 2012 CSI Sixth International Conference on Software Engineering (CONSEG). IEEE, 2012. http://dx.doi.org/10.1109/conseg.2012.6349471.
Texte intégral« Private Web Search with Constant Round Efficiency ». Dans 1st International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0005225602050212.
Texte intégralBonte, Charlotte, et Ilia Iliashenko. « Homomorphic String Search with Constant Multiplicative Depth ». Dans CCS '20 : 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA : ACM, 2020. http://dx.doi.org/10.1145/3411495.3421361.
Texte intégralHu, Qi, et Yangqiu Song. « User Consented Federated Recommender System Against Personalized Attribute Inference Attack ». Dans WSDM '24 : The 17th ACM International Conference on Web Search and Data Mining. New York, NY, USA : ACM, 2024. http://dx.doi.org/10.1145/3616855.3635830.
Texte intégralNagy, Allen L., et Robert R. Sanchez. « Color differences required for parallel visual search ». Dans OSA Annual Meeting. Washington, D.C. : Optica Publishing Group, 1988. http://dx.doi.org/10.1364/oam.1988.mh5.
Texte intégralNiu, Li, Xiong Liu, Youyi Wang, Amit K. Gupta et Jianyang Zhai. « Induction machine rotor time constant identification using bisection search method ». Dans TENCON 2016 - 2016 IEEE Region 10 Conference. IEEE, 2016. http://dx.doi.org/10.1109/tencon.2016.7848738.
Texte intégralLimin Xiang, Kai Cheng et K. Ushijiam. « Encoding a Binary Search Tree in Constant Time on BSR ». Dans Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05). IEEE, 2005. http://dx.doi.org/10.1109/pdcat.2005.133.
Texte intégralTisdale, John, et J. Karl Hedrick. « A UAV Trajectory Planning Algorithm for Simultaneous Search and Track ». Dans ASME 2005 International Mechanical Engineering Congress and Exposition. ASMEDC, 2005. http://dx.doi.org/10.1115/imece2005-81100.
Texte intégralRapports d'organisations sur le sujet "Consent search"
Stephens, Jaime, Thomas McLaren, Caitlyn Gillespie et Claire Stuyck. Landbird monitoring : 2022 results from Crater Lake National Park, Lassen Volcanic National Park, Oregon Caves National Monument and Preserve, and Whiskeytown National Recreation Area. National Park Service, 2024. http://dx.doi.org/10.36967/2303313.
Texte intégralSentcоv, Valentin, Andrei Reutov et Vyacheslav Kuzmin. Electronic training manual "Acute poisoning with psychotropic substances". SIB-Expertise, janvier 2024. http://dx.doi.org/10.12731/er0777.29012024.
Texte intégralKerber, Steve, et Robin Zevotek. Fire Service Summary Report : Study of Residential Attic Fire Mitigation Tactics and Exterior Fire Spread Hazards on Firefighter Safety. UL Firefighter Safety Research Institute, novembre 2014. http://dx.doi.org/10.54206/102376/pxtq2256.
Texte intégralKerber, Steve, et Robin Zevotek. Study of Residential Attic Fire Mitigation Tactics and Exterior Fire Spread Hazards on Firefighter Safety Released. UL Firefighter Safety Research Institute, novembre 2014. http://dx.doi.org/10.54206/102376/lihb1439.
Texte intégralCantor, Amy G., Rebecca M. Jungbauer, Andrea C. Skelly, Erica L. Hart, Katherine Jorda, Cynthia Davis-O'Reilly, Aaron B. Caughey et Ellen L. Tilden. Respectful Maternity Care : Dissemination and Implementation of Perinatal Safety Culture To Improve Equitable Maternal Healthcare Delivery and Outcomes. Agency for Healthcare Research and Quality (AHRQ), janvier 2024. http://dx.doi.org/10.23970/ahrqepccer269.
Texte intégralGalili, Naftali, Roger P. Rohrbach, Itzhak Shmulevich, Yoram Fuchs et Giora Zauberman. Non-Destructive Quality Sensing of High-Value Agricultural Commodities Through Response Analysis. United States Department of Agriculture, octobre 1994. http://dx.doi.org/10.32747/1994.7570549.bard.
Texte intégral