Rozprawy doktorskie na temat „Police code”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Police code.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Police code”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Webber, Jason J. "Indiana Criminal Code 9-30-2-2 who does it protect? /". [Muncie, Ind.] : Ball State University, 2008. http://cardinalscholar.bsu.edu/375.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Morrow, Jadi Leigh. "Creating the blue code: Identity, gender and class in a police training environment". Connect to online resource, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3303888.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Ede, Andrew, i andrew ede@premiers qld gov au. "The Prevention of Police Corruption and Misconduct: A Criminological Analysis of Complaints Against Police". Griffith University. School of Criminology and Criminal Justice, 2000. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20030102.114721.

Pełny tekst źródła
Streszczenie:
The reform measures recommended by the Commission of Inquiry into Possible Illegal Activities and Associated Police Misconduct (referred to as the "Fitzgerald Inquiry") radically transformed the face of policing in Queensland. The most significant of these recommendations was the establishment of an external oversight body, the Criminal Justice Commission (CJC), which has independence from executive government and holds the power to investigate not only police but any public servant or politician. Other recommendations included "Whistleblower" legislation, increasing sanctions for serious misconduct, lateral recruitment and promotion by merit rather than seniority. The first main research question tested in this thesis is whether these reform measures have produced improvements in the following areas: the efficiency and effectiveness of the processes for dealing with complaints against police; public confidence in those processes and the public standing of the Queensland Police Service (QPS) generally; standards of police behaviour; the incidence of corrupt conduct; and police attitudes towards reporting misconduct by their fellow officers. These Fitzgerald Inquiry reforms were strategies primarily derived from two schools of thought describing the nature and cause of police corruption: deterrence based theory (including "individual" or "rotten apple" theory) and cultural (also labeled "cultural" or "socialisation") based theory. To date most strategies used to combat police corruption have been underpinned by these theories. A third theory - situational based theory (sometimes titled "environmental" or "opportunity" theory) - which has had success in crime prevention, has been scarcely used in the area of police corruption. However, an extensive body of research has affirmed the effects of situational factors on police behaviour, suggesting the potential for the application of situational crime prevention initiatives in combatting police corruption. The second research question proposed in this thesis is whether situational based theory could also be beneficial in the prevention of police corruption. Data drawn upon to test the first research question were interviews and surveys with police officers, public attitude surveys and statistics from the processing of complaints against police. Although each source has limitations, collectively the data are sufficiently comprehensive - and robust - to defend conclusions about the general direction of the changes which have occurred. These data indicate that the Fitzgerald Inquiry reforms have, at least to some degree, had their intended impact on the QPS. These reforms have contributed to an apparent improvement in public confidence in the complaints system and the QPS generally. Moreover, the available evidence suggests that the Fitzgerald Inquiry reforms have resulted in a weakening of the police code of silence. As far as the specific issue of corruption in the QPS is concerned, it is difficult to draw firm conclusions from existing data sources. However, the weight of the available evidence is that such conduct is less pervasive and occurs at lower levels than was the case in the pre-Fitzgerald Inquiry QPS. It is very difficult to ascertain which reform components were the most effective and which were not helpful at all, as these reform measures were initiated simultaneously. For example, the negative elements of the police culture may have been eliminated or reduced but whether it was the cultural strategies or one of the deterrence based strategies influencing officer behaviour remains unknown. The second main research question the thesis poses is that the use of situational crime prevention techniques has potential for contributing to the prevention of police corruption. A situational analysis of complaints against police data, including the development of a typology for classifying types of police corruption and misconduct, was used as an example of how this may be accomplished in Queensland. The study provides some, albeit limited, support for the hypothesis that situational crime prevention methods are applicable to police corruption. Based upon three years of complaints data, enough homogenous cases were gathered to enable the analysis of four categories of police corruption - Opportunistic Thefts, Driving under the Influence, Assault (while off-duty), and Theft from Employer. Given that this study only used three years of complaints data held by the CJC and more than nine years of data exist, productive situational analyses of many other categories of corruption is probable. This study also illustrated that complaints against police data are being under utilised by the QPS and the CJC. For future research in the situational analysis of complaints data, I recommend improving the gathering of data from complaints files for storage in electronic form to enable situational prevention analysis to be conducted more readily. A geographical example was used to illustrate further how complaints against police data could be more extensively utilised as a prevention tool. This analysis was conducted at an organisation unit level determined primarily by geographical factors. The complaint patterns of units of similar "task environments", as measured by unit size and type of duties performed, were compared in an attempt to identify those units experiencing the presence or absence of "bad apples" or a "negative culture". This study led to the conclusion that a divisional analysis of complaints data can provide information valuable in combatting police corruption. When task environment was held constant, it was possible to identify units experiencing the effects of possible "bad apples" and/or "negative cultures". Once these particular units were identified, intervention strategies to address the units' particular problem could be constructed. Future research in this area would involve ongoing divisional data analysis followed-up by individual assessment of officers identified as "bad apples", or a "compare-and-contrast" procedure to distinguish features requiring correction in units identified as having a "negative culture". The research findings presented in this thesis are that progress has occurred in a number of areas in addressing the problems identified by the Fitzgerald Inquiry, but that there is undoubtedly scope for more to be achieved. Despite the very significant increase in the resources and powers available to investigators post-Fitzgerald, it is still difficult to prove that a police officer engaged in misconduct, or that other officers were aware of this fact and had failed to take action, because of the constraints imposed by evidentiary and legal requirements. Thus, while it is vital to maintain an effective and credible independent complaints investigation system and ensure that there is a proper internal discipline process in place, the scope for increasing the "deterrent power" of the present system is limited. Putting more resources into complaints investigations might make a difference at the margins, but is unlikely to lead to a significant increase in the probability of a complaint being substantiated and a sanction imposed. Investing more resources in investigations has an additional cost in that such resources are then lost to other efforts to combat corruption that may provide more fruitful results in the long term. The value of an occasional substantiation is placed above the ability to engage in a large amount of prevention work. Inevitably then, three clear messages are apparent. First, continued effort must be made to modify the organisational climate of the QPS in terms of commitment to integrity. Recommended strategies to accomplish this end are to continue the recruitment of more educated, female and older officers to reduce police-citizen conflict and the negative elements of the police culture, and also to develop a comprehensive, integrated approach to ethics education for QPS officers at all ranks and positions. Second, other forms of deterrence against misconduct are needed such as the use of covert strategies like integrity testing which could be conducted in conjunction with the CJC. Third, a greater emphasis needs to be placed on developing and implementing preventive strategies. This thesis has shown that valuable prevention strategies can be gained from situational and divisional analysis of complaints data, and a range of proactive management options based upon situational crime prevention theory are recommended. These strategies have application in any police service.
Style APA, Harvard, Vancouver, ISO itp.
4

Adams, Carole Helen. "#Balance' in pre-trial criminal justice : suspects' experience in the nick under the revised PACE Code of Practice C". Thesis, London School of Economics and Political Science (University of London), 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.307469.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Gonzales, Jean-Luc. "Le commissaire de police et l'hospitalisation d'office d'urgence : pour une application unique de l'article L. 343 du code de la santé publique". Clermont-Ferrand 1, 1995. http://www.theses.fr/1995CLF10160.

Pełny tekst źródła
Streszczenie:
La loi No 90-527 de juin 1990 relative aux droits et à la protection des personnes hospitalisées en raison de troubles mentaux et à leurs conditions d’hospitalisation, n’a pas, véritablement modifié le régime juridique des hospitalisations d’office. Ainsi, l’article L. 343 du code de la santé publique précise : « en cas de danger imminent pour la sûreté des personnes, attesté par un certificat médical ou à défaut par la notoriété publique, le maire et à Paris, les commissaires de police arrêtent à l’égard des personnes dont le comportement révèle des troubles mentaux manifestes toutes mesures provisoires nécessaires, à charge d’en référer dans les vingt-quatre heures au préfet qui statue sans délai et prononce, s’il y a lieu, un arrêté d’hospitalisation d’office dans les formes prévues à l’article L. 342. Faute de décision préfectorale, ces mesures provisoires sont caduques au terme d’une durée de quarante-huit heures. » L’application de cet article soulève des difficultés. C’est à partir d’une étude de l’évolution juridique de la prise en charge publique des hospitalisations forcées et d’enquêtes relatives à la pratique de la police des aliénés, que l’auteur propose une modification de l’article L. 343 du code de la santé publique. Il prévoit de confier au commissaire de police uniquement, aussi bien en province qu’à Paris, les mesures provisoires prévues par la loi. Selon l’auteur, il s’agit de faciliter l’accès du malade aux soins médicaux tout en respectant le régime juridique de l’hospitalisation d’office.
Style APA, Harvard, Vancouver, ISO itp.
6

Foltynová, Hana. "Návrh na zefektivnění vztahů mezi policisty a občany". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2011. http://www.nusl.cz/ntk/nusl-222854.

Pełny tekst źródła
Streszczenie:
The diploma thesis discusses about the relationship between citizens and Police of the Czech Republic. It focuses on crime, its detection and problems concerning communication. This thesis contains informations about examinated object, various research methods and procedures how to streamline these relationships and also how to improve confidence in the police.
Style APA, Harvard, Vancouver, ISO itp.
7

Iosca, Benjamin. "L'effectivité de la sanction des infractions au Code de la Route". Thesis, Toulon, 2014. http://www.theses.fr/2014TOUL0086.

Pełny tekst źródła
Streszczenie:
L'année 1992 marque un tournant historique dans la répression des infractions routières. Désormais, chaque français dispose d'un permis de conduire affecté d'un capital de points s'amenuisant à chaque infraction. Cette loi, autoproclamée pédagogique, dont il est pourtant difficile de contester le caractère répressif est ambitieuse : éradiquer la mortalité routière ; le résultat est partiellement atteint. Mais passer de 15000 à 4000 en 30 ans a un coût : celui d'une répression toujours plus grande
The year 1992 marks an historic turning point in punishing infractions driving (licences) offences. Today each french citizen have a driving licence with a number of points that increases according to the offences. This autoproclamed pedagogical law, that it is hard contest the repressif and ambitions : eradicate roads deaths ; the target is parially achieved. But with more than 15000 death per 4000 in 30 years will a cost : a greater repression
Style APA, Harvard, Vancouver, ISO itp.
8

Gelin, Carl. "Polisens Tystnadskod - Översikt kring yrkeskulturella normer och sanktioner och dess följder inom den svenska polisorganisationen". Thesis, Malmö högskola, Fakulteten för hälsa och samhälle (HS), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-25398.

Pełny tekst źródła
Streszczenie:
Denna uppsats kommer övergripande beskriva fenomenet tystnadskod inom specifikt den svenska polisen. För att kunna göra detta måste bakomliggande faktorer så som det kollegiala kollektivets betydelse inom polisen först beskrivas liksom vissa organisationsinterna motsättningar som gett upphov till tystnadskoden. Uppsatsen kommer även med hjälp av utkast från bland annat nyhetsmedier belysa hur denna tystnadskod yttrat sig i praktiken och vilka följder detta fått. Tystnadskoden är ett fenomen som har skapats ur det kollegiala kollektivet och fyller till viss del funktion som social kontroll inom kollektivet. Men också rättsligt. Det är sällsynt att åtal väcks mot poliser liksom lika sällsynt att poliser får några disciplinära påföljder när överträdelser begåtts. Svensk polisforskning är eftersatt internationell motsvarighet varför den svenska litteraturen är relativt knapphändig inom området med ett fåtal undantag. Få forskare som belyst tystnadskoden har belyst vilka indirekta följder den kan få utanför det kollegiala kollektivet liksom utanför polisorganisationen vilket måste tas hänsyn till när man studerar fenomenet tystnadskod.
Style APA, Harvard, Vancouver, ISO itp.
9

Ancel, Baudouin. "Lois de police et ordre public dans le droit des conflits (XIIe siècle-XXe siècle) : genèse et réception de l'article 3, alinéa 1er du Code civil". Thesis, Paris 2, 2019. http://www.theses.fr/2019PA020043.

Pełny tekst źródła
Streszczenie:
Cette recherche propose un éclairage historique des avatars de deux mécanismes désormais intégrés au système français de droit international privé, celui des « lois de police » et celui de « l’ordre public international », qui ont pour trait commun de s’opposer au jeu normal de la règle de conflit et de s’appuyer, l’un et l’autre, sur l’art. 3, al. 1er du Code civil de 1804. Prévenant par préemption les atteintes à l’utilitas publica vel communis ou y réagissant par éviction de la loi normalement applicable, ces deux types de normes tissent une histoire commune depuis les antécédents que furent les statuts prohibitifs et les statuts territoriaux identifiés par la doctrine romano-canonique médiévale. Adaptés par les juristes de l’Ecole Hollandaise et de l’Ecole Française à l’hypothèse dominante à la fin de l’Ancien Régime des conflits de souverainetés, ceux-ci sont recueillis en 1804 par l’art. 3, al. 1er. Le travail conjoint de la doctrine et de la jurisprudence et une réaction à la notion hybride de « lois d’ordre public » qui émerge au long du siècle suivant permettent leur reformatage en les séparant l’un de l’autre dès le tournant des XIXe et XXe siècles. Le déclin du conflit des souverainetés qui porte à se désintéresser des lois de droit public, voire des lois pénales, et une représentation plus privatiste du conflit de lois qui ne peut cependant méconnaitre l’interventionnisme croissant de l’Etat, confirment la distinction de deux figures appelées à être théorisées sous les concepts de lois de police ou d’application immédiate (promouvant l’utilitas communis) et d’exception d’ordre public (défendant les valeurs fondamentales)
This research aims at shedding light on the historical background of the avatars of two mechanisms now integrated into the French system of private international law: lois de police (i.e. overriding mandatory rules) and (international) ordre public (i.e. public policy). Both share the common feature of opposing the normal interplay of choice-of-law rules and rely on Art. 3, para. 1 of the 1804 Civil Code. Preventing by pre-emption infringements of utilitas publica vel communis or reacting to them by eviction from the normally applicable law, these two types of norms have emerged from a common history beginning with the antecedents of prohibitive and territorial statutes identified by medieval romano-canonical commentators. Then members of the Dutch and French Schools adapted the two concepts to the prevailing hypothesis at the end of the Ancien Régime, that of conflicts of sovereignties. In 1804, lois de police and ordre public were collected in the French Civil Code. Thanks to the joint work of scholars and case law, on the one hand, and to a reaction to the hybrid notion of lois d’ordre public that emerged over the next century, on the other hand, the distinction between the two concepts was made possible at the turn of the 19th and 20th centuries. As conflict of sovereignties declined, leading to a loss of interest in public law, or even in criminal law, and as a more private-law-driven representation arose, without ignoring, however, growing state interventionism, the distinction has been confirmed between the two concepts: lois de police or d’application immédiate, promoting the utilitas communis, and exception d’ordre public, defending fundamental values
Style APA, Harvard, Vancouver, ISO itp.
10

Evans, David Elliot 1971. "Policy-directed code safety". Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86424.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Moll, Monica M. "HOW FAR HAVE WE COME? THE STATE OF POLICE ETHICS TRAINING IN POLICE ACADEMIES IN THE U.S". Kent State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=kent1461239418.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Hashii, Brant. "Policy-based protection against external programs via code transformation /". For electronic version search Digital dissertations database. Restricted to UC campuses. Access is free to UC campus dissertations, 2003. http://uclibs.org/PID/11984.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--University of California, Davis, 2004.
Degree granted in Computer Science. Dissertation completed in 2003; degree granted in 2004. Also available via the World Wide Web. (Restricted to UC campuses)
Style APA, Harvard, Vancouver, ISO itp.
13

Rezk, Tamara. "Verification of confidentiality policies for mobile code". Nice, 2009. http://www.theses.fr/2006NICE4099.

Pełny tekst źródła
Streszczenie:
Information flow policies guarantee confidentiality through the absence of undesirable information leakages during program executions. This work proposes specification and verification static techniques for information flow policies in several settings. The work is composed of three major parts. In the first part, we propose formulations for specification of information flow policies over deterministic and non-deterministic programs that can be applied to logically characterize confidentiality policies in temporal and programming logics. We show the applicability of our approach in several languages, including a language with parallel composition and a language with shared mutable data structures. In the second part, we propose the specification of non-interference, a particular information flow policy, for an unstructured Java-like Virtual Machine (JVM) language that includes objects, methods, classes with inheritance, and exceptions. We define a type system that insures that typable programs hold the specified property. In order to provide an application of language-based-security in the context of mobile code, in the third part of this work, we propose a type system for non-interference of Java-like programs and show a connection between source and JVM code typability, in the presence of an untrusted non-optimizing compiler
Les politiques de flux d’information garantissent la confidentialité à travers l’absence de fuites d’information non-désirables pendant l’exécution des programmes. Ce travail propose des techniques statiques de spécification et de vérification pour les politiques de flux d’information. Trois majeurs parties composent ce travail. Dans la première partie, nous proposons des formulations pour la spécification des politiques de flux d’information au sein de programmes déterministes et non-déterministes, et qui peuvent être appliqués afin de caractériser logiquement des politiques de confidentialité dans des logiques temporelles et de programmation. Nous démontrons l’applicabilité de notre approche dans le contexte de plusieurs langages incluant un langage permettant la composition parallèle et un langage possédant des structures de données partagées et mutables. Dans la deuxième partie, nous proposons la spécification de la non-interférence, une politique de flux d’information particulière, pour un langage non-structuré semblable à la machine virtuelle Java (JVM) et qui inclut des objets, des méthodes, des classes avec héritage, et des exceptions. Nous définissons un système de type qui assure que les programmes typables tiennent la propriété spécifiée. Afin de fournir une application de la sécurité des langages dans le contexte de code mobile, nous proposons un système de type pour la non-interférence des programmes semblables aux programmes Java et montrons une connexion entre la typabilité d’un code source et celle d’un code machine de la JVM, en présence d’un compilateur non-optimisant et non-fiable
Style APA, Harvard, Vancouver, ISO itp.
14

Sistany, Bahman. "A Certified Core Policy Language". Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/34865.

Pełny tekst źródła
Streszczenie:
We present the design and implementation of a Certified Core Policy Language (ACCPL) that can be used to express access-control rules and policies. Although full-blown access-control policy languages such as eXtensible Access Control Markup Language (XACML) [OAS13] already exist, because access rules in such languages are often expressed in a declarative manner using fragments of a natural language like English, it isn’t alwaysclear what the intended behaviour of the system encoded in these access rules should be. To remedy this ambiguity, formal specification of how an access-control mechanism should behave, is typically given in some sort of logic, often a subset of first order logic. To show that an access-control system actually behaves correctly with respect to its specification, proofs are needed, however the proofs that are often presented in the literature are hard or impossible to formally verify. The verification difficulty is partly due to the fact that the language used to do the proofs while mathematical in nature, utilizes intuitive justifications to derive the proofs. Intuitive language in proofs means that the proofs could be incomplete and/or contain subtle errors. ACCPL is small by design. By small we refer to the size of the language; the syntax, auxiliary definitions and the semantics of ACCPL only take a few pages to describe. This compactness allows us to concentrate on the main goal of this thesis which is the ability to reason about the policies written in ACCPL with respect to specific questions. By making the language compact, we have stayed away from completeness and expressive power in several directions. For example, ACCPL uses only a single policy combinator, the conjunction policy combinator. The design of ACCPL is therefore a trade-off between ease of formal proof of correctness and expressive power. We also consider ACCPL a core policy access-control language since we have retained the core features of many access-control policy languages. For instance ACCPL employs a single condition type called a “prerequisite” where other languages may have very expressive and rich sets of conditions.
Style APA, Harvard, Vancouver, ISO itp.
15

Stromberger, Joanne. "The Constitutionality of Dress Code and Uniform Policies". Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4725/.

Pełny tekst źródła
Streszczenie:
This dissertation proposes to delineate the criteria for determining the constitutionality of public school dress codes based on an examination of relevant case law. The study addresses the following underlying questions: (1) Do students have a constitutional right to freedom of choice regarding their personal dress and grooming in public schools? (2) If so, what is the origin of the right? (3) What justification does a school district need in order to intrude upon the right? (4) Does the extent to which there is a right, and that it is accorded support by the judiciary, depend on the student's age and grade level? (5) What do state statutes say about dress codes and uniforms? (6) Do state statutes comport with the circuit courts' rulings in the various jurisdictions? The first part of Chapter I examines the purpose of school uniforms as set forth in relevant educational literature and commentary. The second part of the chapter examines empirical evidence on the effects of dress codes and uniforms. Chapter II addresses the first three questions listed above concerning students' right to choice in personal dress, the origins of such a right, and the justification required for a school to intrude upon this right. Chapter III examines dress code rulings from the United States Courts of Appeals in order to ascertain patterns of judicial rationale and determine whether students' rights vary depending on age, grade level, or federal circuit court jurisdiction. Chapter IV examines existing state statutes with regard to dress codes and uniforms. Chapter V utilizes the legal principles that emerge from the research in Chapter III and draws from the survey of state statutes in Chapter IV to make a comparison of state statutes and circuit court rulings in each jurisdiction. If a state statute does not comport with federal law in its particular jurisdiction, modifications are suggested to bring the statute into line with relevant judicial rulings.
Style APA, Harvard, Vancouver, ISO itp.
16

Kingshott, Brian Frederick. "Ethics of policing a study of English police codes". Thesis, University of Exeter, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.272996.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Mwai, Paul Macharia. "Information security policy an investigation into rewriting the policy for Loreto College Msongari /". [Denver, Colo.] : Regis University, 2009. http://adr.coalliance.org/codr/fez/view/codr:148.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Allen, Kara Christine. "Breaking the “At Risk” Code: Deconstructing the Myth and the Label". Digital Commons at Loyola Marymount University and Loyola Law School, 2014. https://digitalcommons.lmu.edu/etd/196.

Pełny tekst źródła
Streszczenie:
The term “at risk” is a label that is used to describe students who encompass a host of prominent socially and politically constructed titles that are intended to simplify student understanding and awareness and allow for clear reporting. The purpose of this study was to demythologize the concept of “at risk” by creating the conditions for student voice and critical dialogue to emerge, through the use of narrative inquiry. This research hoped to provide an outlet for young people to find and use their own voices, while finding their own place within their lived histories. The research also aimed to raise awareness of the reality of the contemporary U.S. educational system: we often create policies and programs without considering the perspectives of the young people whom these services are designed to serve. Through critical narrative inquiry, six former student’s engaged in unstructured interviews and a focus group. Through analysis of the data set, five themes emerged and include 1) relationships with bicultural adults who understand, 2) instrumentalizing pedagogy, 3) the impact of money-driven policy, 4) the awareness of limitations of opportunities, and 5) the overall theme of the transparency of hegemony. This research hoped to problematize the label in an effort to move toward an emancipatory understanding of how we speak about young people and make sense of the circumstances these young people must navigate through their education and their world.
Style APA, Harvard, Vancouver, ISO itp.
19

Castle, Joseph Roland. "An Organizational Analysis of Publishing the People's Code". Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/97952.

Pełny tekst źródła
Streszczenie:
Publishing software publicly is a new phenomenon for U.S. federal government agencies. In August 2016, the White House issued the Federal Source Code Policy: Achieving Efficiency, Transparency, and Innovation through Reusable and Open Source Software (FSCP). The FSCP mandated Chief Financial Officers (CFO) Act agencies to publish at least 20% of their custom developed code as open source software (OSS). The federal government has the responsibility to account for public spending, including spending for IT. The publication of OSS is one way the public can know about government spending. OSS additionally benefits the public by providing access to code, thus, making it the "People's Code." From 2016 to 2019, the progress of CFO Act agencies in implementing the policy was mixed. This study examines whether and how organizational theoretical variables – cultural beliefs, public engagement, structural dimensions, and organizational location – affect policy implementation. The study uses the publication of OSS as an indicator of effective policy implementation, and it identifies the factors that hinder or aid publishing OSS. Using metadata collected from GitHub's application programming interface (API), I created a sampling frame that included 23 of 24 executive agencies publishing OSS before and after the FSCP was published. From the sampling frame, 25 participants from 20 agencies agreed to participate in the study. These participants were from software development units that minimally, moderately, or frequently published OSS. The sample consisted of participants from units mostly located outside a Chief Information Officer (CIO) office focused on software development and data science activities. Grounded theory provided an approach for data collection with elite interviews and artifact gathering allowing for analysis in an iterative, comparative manner for generating a theory of policy implementation for OSS publication. Units more frequently published OSS when they expressed non-monolithic and advantageous cultural beliefs; practiced more and more varied public engagement through bi-directional communication, events, and electronic tools; had structures with less centralization, more formalization, more differentiation, and more coordination; and were located in the "middle" of organizations with fewer hierarchical layers. Additionally, some units expressed both cautionary and advantageous cultural beliefs suggesting beliefs alone are not enough to allow units to publish OSS. This study contributes to policy, public administration, and organization theory literatures. It enhances scholarship by examining a new phenomenon and aids practitioners by providing implications for consideration when implementing policy.
Doctor of Philosophy
Publishing software and its associated source code for public use is a new phenomenon for U.S. federal government agencies. In August 2016, the White House issued the Federal Source Code Policy: Achieving Efficiency, Transparency, and Innovation through Reusable and Open Source Software (FSCP). The FSCP mandated executive-level agencies to publish at least 20% of their custom developed code as open source software (OSS). OSS is software that can be shared within a community of developers through accompanying licenses hosted in online code sharing platforms. The federal government has the responsibility to account for public spending, including spending for IT. The publication of OSS is one way the public can know about government spending. OSS additionally benefits the public by providing access to code, thus, making it the "People's Code." From 2016 to 2019, the progress of executive branch agencies in implementing the FSCP was mixed. This study examines whether and how organizational factors – cultural beliefs, public engagement, structural dimensions, and organizational location – affect agency policy implementation. The study uses the publication of OSS as an indicator of effective policy implementation, and it identifies the factors that hinder or aid publishing OSS. To arrive at a general understanding of agency efforts at policy implementation, I collected data from GitHub's application programming interface (API) and created a list of 23 of 24 executive-level agencies that published OSS both before and after the FSCP was issued. From these agencies, 25 participants from 20 agencies agreed to participate in the study. These participants were from software development units that minimally, moderately, or frequently published OSS. The sample consisted of participants from units mostly located outside a Chief Information Officer (CIO) office that focused on software development and data science activities. Grounded theory provided an approach for data collection with interviews and document collection, leading to continuous analysis for generating a theory of policy implementation for OSS publication. Units more frequently published OSS when they expressed views complementary to those of their parent organization and held advantageous cultural beliefs; practiced more and more varied public engagement through two-way communication, events, and electronic tools; had structures with less centralization, more formalization, more differentiation, and more coordination; and were located in the "middle" of an organization with fewer hierarchical layers. Additionally, some units expressed both cautionary and advantageous cultural beliefs suggesting beliefs alone are not enough to allow units to publish OSS. This study contributes to policy, public administration, and organization theory literatures. It enhances scholarship by examining a new phenomenon and aids practitioners by providing implications for consideration when implementing policy.
Style APA, Harvard, Vancouver, ISO itp.
20

Soltner, Eugene F. "The factors of a voluntary school uniform policy". Diss., This resource online, 1997. http://scholar.lib.vt.edu/theses/available/etd-10022007-144802/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Burbidge, Anne Leslie. "Breaking the code, the 1995 immigration policy of the Reform Party of Canada". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0010/MQ30204.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Allen, Kara C. "Breaking the "At Risk" Code| Deconstructing the Myth and the Label". Thesis, Loyola Marymount University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3641922.

Pełny tekst źródła
Streszczenie:

The term “at risk” is a label that is used to describe students who encompass a host of prominent socially and politically constructed titles that are intended to simplify student understanding and awareness and allow for clear reporting. The purpose of this study was to demythologize the concept of “at risk” by creating the conditions for student voice and critical dialogue to emerge, through the use of narrative inquiry. This research hoped to provide an outlet for young people to find and use their own voices, while finding their own place within their lived histories. The research also aimed to raise awareness of the reality of the contemporary U.S. educational system: we often create policies and programs without considering the perspectives of the young people whom these services are designed to serve. Through critical narrative inquiry, six former student's engaged in unstructured interviews and a focus group. Through analysis of the data set, five themes emerged and include 1) relationships with bicultural adults who understand, 2) instrumentalizing pedagogy, 3) the impact of money-driven policy, 4) the awareness of limitations of opportunities, and 5) the overall theme of the transparency of hegemony. This research hoped to problematize the label in an effort to move toward an emancipatory understanding of how we speak about young people and make sense of the circumstances these young people must navigate through their education and their world.

Style APA, Harvard, Vancouver, ISO itp.
23

Vile, Matthew. "Gun Control Policy Preference in Context: A Contextually Sensitive Model of Gun Control Policy Preferences". ScholarWorks@UNO, 2006. http://scholarworks.uno.edu/td/332.

Pełny tekst źródła
Streszczenie:
Using data from the 2000 American National Election Study and the Uniform Crime Reports, this research studies the impact of core values and contextual effects on gun control policy preferences. The research seeks to produce a contextually sensitive model of gun control policy preferences that accounts for the nature of the elite message war regarding the issue of gun control and for both long and short-term contextual factors that might sway individual opinions at the point of stimulus (e.g., the survey question). While the analysis does find conditioning effects, the effects do not conform to the theoretical expectations, and they are generally weaker than expected. In contrast, the research demonstrates the strong connections that formed in the public’s mind between ideological, partisan and gender-based core values and gun control policy preferences. These results are consistent with research that found the effects of political messages often vary in counterintuitive ways due to variance in the strength of the message and political awareness (Zaller 1992). Replicating this research across various time periods permits the investigation of the decay rate of impacts on individual policy preferences created by substantial, one-time contextual effects. It may be that contextual effects have a substantial impact in the short-term, but these short-term impacts are mitigated over the longterm by continual reinforcement of the basic themes employed by elites in the message war surrounding the issue.
Style APA, Harvard, Vancouver, ISO itp.
24

Margherita, Michelangelo. "Southern cone economic liberalization policies and the credibility constraint". Thesis, McGill University, 1995. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=23723.

Pełny tekst źródła
Streszczenie:
Considering the specific experiences of Chile and Argentina, this study undertakes the analysis of economic liberalization policies from a "credibility constraint" perspective. Building on the assumption that, in a context interdependence, one of the essential conditions for economic development is the attraction of foreign capital, it suggests that confidence-seeking is a major concern constraining the rest of the government's activities. From these premises, the thesis addresses the socio-political consequences of this quest for credibility and provides an analysis of these criteria's compatibility with democratic and authoritarian rule. In this endeavor, the project relies on a comparative observation of four case studies to establish that notwithstanding regime type, the success of economic liberalization depends primarily on the satisfaction of the socio-political requirements for credibility. The results are clear: both types of regimes are in a position to fulfill these requirements although this may have considerable consequences on the economic well-being of substantial sections of the population.
Style APA, Harvard, Vancouver, ISO itp.
25

Nalbant, Serkan. "An Evaluation Of The Reinspection Decision Policies For Software Code Inspections". Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/12605827/index.pdf.

Pełny tekst źródła
Streszczenie:
This study evaluates a number of software reinspection decision policies for software code inspections with the aim of revealing their effects regarding cost, schedule and quality related objectives of a software project. Software inspection is an effective defect removal technique for software projects. After the initial inspection, a reinspection may be performed for decreasing the number of remaining defects further. Although, various reinspection decision methods are proposed in the literature, no study provides information on the results of employing different methods. In order to obtain insight about this unaddressed issue, this study compares the reinspection decision policies by finding out and analyzing their performance with respect to designated measures and preference profiles for cost, schedule, and quality perspectives in the context of a typical Software Capability Maturity Model Level 3 software organization. For this purpose, a Monte Carlo simulation model, which represents the process comprising initial code inspection, reinspection, testing and field use activities, is employed in the study together with the experiment designed in order to consider different circumstances under which the mentioned process operates. The study recommends concluding the reinspection decision by comparing inspection effectiveness measure for major defects with respect to a moderately high threshold value (i.e. 75%). The study also reveals that applying default decisions of &lsquo
Never Reinspect&rsquo
and &lsquo
Always Reinspect&rsquo
do not exhibit the most appropriate outcomes regarding cost, schedule, and quality. Additionally, the study presents suggestions for further improving the cost, schedule, and quality of the software based on the analysis of the experiment factors.
Style APA, Harvard, Vancouver, ISO itp.
26

Gaffney, Francis John Paul. "The New Jersey common policy on marriage preparation in light of the 1983 Code". Theological Research Exchange Network (TREN), 1989. http://www.tren.com.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Leucht, Brigitte. "Transatlantic policy networks and the formation of core Europe". Thesis, University of Portsmouth, 2008. https://researchportal.port.ac.uk/portal/en/theses/transatlantic-policy-networks-and-the-formation-of-core-europe(c7bc66fb-334c-4bef-99c2-155eb4df6d73).html.

Pełny tekst źródła
Streszczenie:
This is an original study assessing the role of transatlantic policy networks in the formation of core Europe at the Schuman Plan conference. Based on extensive archival research in governmental records and private papers in twelve archives in five countries and informed by the innovative combination of the methodological tools of the network and cultural transfer concepts, the thesis sheds new light on how the process of European integration was triggered in 1950-51. The thesis reconceptualizes the negotiations on the treaty establishing the European Coal and Steel Community in along-term historical perspective as the outcome of the co-operation of transatlantic policy networks reflecting the interaction of American and European thought and politico-legal concepts. It therefore advances the history of early European integration and post-World War II transatlantic relations. Against the backdrop of Franco-German rapprochement and the emerging Cold War, transatlantic policy networks of a variety of academic and other experts, civil servants and state and non-state actors, assumed a vital function in determining the negotiation tactics of various stakeholders at the Schuman Plan conference. Mediating between American and European thought and politico-legal concepts, these transatlantic policy networks crucially contributed to shaping the first supranational European institutional framework and anti-trust law. The institutions that transatlantic policy networks helped to establish in 1950-51 can be regarded as the precursors of the institutions of the contemporary European Union. The anti-trust provisions, in turn, provided one important model for the competition rules of the European Economic Community, which ultimately came to playa crucial role in the European integration process and in the construction of a common market. It is demonstrated therefore that transatlantic policy networks thus helped to create important path dependencies for the process of European integration.
Style APA, Harvard, Vancouver, ISO itp.
28

Krentz, Caroline D. "A theoretical-integrative model of core curriculum policy-making". Thesis, University of Ottawa (Canada), 1989. http://hdl.handle.net/10393/20769.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Serri, Seyed Hamidreza. "The World of the United States Foreign Policy Elite: A Case Study of the U.S. Foreign Policy Think Tanks' Debates in the General Elections of 2004, 2008, and 2012". FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2224.

Pełny tekst źródła
Streszczenie:
American foreign policy think tanks are an important part of the American foreign policy elite. By gathering data, publishing research, and reaching out to the public and government, think tanks help set the public debate agenda. The question I asked was whether these American foreign policy think tanks exhibited a shared worldview during the past three election cycles. I analyzed 7,000 documents (half a million verbs) published by the seven American foreign policy think tanks active in the three general elections of 2004, 2008, and 2012: the American Enterprise Institute, the Brookings Institution, the Carnegie Endowment for International Peace, the Cato Institute, the Council on Foreign Relations, the Heritage Foundation, and the RAND Corporation. To measure the collective and individual worldviews of these seven think tanks, I used the Profiler Plus software, which answered Alexander George’s operational code questions based on the transitive verbs for the Self and the Other. My research showed that the collectivity of the seven think tanks had three separate worlds of action with three different worldviews. It also showed that the worldview of the American collective Self was very stable across time. Another empirical finding was that from the perspective of the seven think tanks, the United States’ actions were the most similar to the actions of other great powers: Europe, China, and Russia. It was also shown that from the perspective of the seven think tanks, China was the most cooperative nation and Terrorists were the most conflictual actors in the world.
Style APA, Harvard, Vancouver, ISO itp.
30

George, William. "Explaining State Crisis Behavior Using the Operational Code". Master's thesis, University of Central Florida, 2014. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/6283.

Pełny tekst źródła
Streszczenie:
Does the operational code of a state's leadership have an effect on its behavior during foreign policy crises? Specifically, do states with more conflictual operational codes opt for a more conflictual response to crises, or do systemic and structural variables intervene to limit their significance? While the study of individual level psychology in international relations has been gaining momentum, the causal links between beliefs and behavior have yet to be solidified. This study used ordered logistic regression across three models to determine the effect of the operational code on state crisis behavior while controlling for key domestic and crisis dimension variables. Predicted probabilities were also used to better demonstrate the variables' substantive effects. The 50 cases used in this research are drawn from the International Crisis Behavior Dataset composed by Brecher and Wilkenfeld, and they focus on the United States as the major crisis actor. Operational code data were derived from computer-based content analysis using the Verbs In Context System (Walker, Schafer, and Young 1998). The theoretical goal of this paper was to explain variance in state crisis behavior through variations in the operational codes of US Presidents. The results demonstrate that the operational codes of leaders do affect state crisis behavior. Specifically, the operational code indices P1 and I1 show that a leader with a more conflictual view of the nature of the political universe and a conflictual direction of strategy is more likely to employ escalatory crisis behavior.
M.A.
Masters
Political Science
Sciences
Political Science; International Studies Track
Style APA, Harvard, Vancouver, ISO itp.
31

Aktas, Arzu. "L'acquisition et la perte de la nationalité française : 1804-1927". Phd thesis, Université Paris-Est, 2011. http://tel.archives-ouvertes.fr/tel-00762429.

Pełny tekst źródła
Streszczenie:
Notre thèse porte sur l'acquisition et la perte de la nationalité française entre 1804 et 1927.Pendant cette période, aussi bien l'acquisition que la perte de la nationalité française ont subi l'influence des impératifs politiques, économiques et sociologiques de l'époque.D'une part, s'agissant de l'acquisition de la nationalité française deux critères ont été retenus par les différents auteurs pour octroyer la qualité de Français. Selon eux, seuls le jus sanguinis ou le jus soli permettait d'acquérir la nationalité française. Or, force est de constater qu'il n'en est rien. En effet, nous avons pu établir à travers l'étude des travaux préparatoires du Code civil qu'un troisième critère prenant en compte les qualités essentielles c'est-à-dire l'assimilation des moeurs, des usages, des habitudes et de la culture française, était à l'origine d'un grand nombre d'acquisition de la nationalité française.D'autre part, ces mêmes impératifs ont déterminé avec plus ou moins de sévérité les conditions de perte de la nationalité française.Dès lors, la définition de la nationalité est française est éphémère.Par conséquent, il est difficile de déterminer avec précision ce qu'est un Français.
Style APA, Harvard, Vancouver, ISO itp.
32

Mashiyi, Fidelia Nomakhaya Nobesuthu. "How South African teachers make sense of language-in-education policies in practice". Thesis, University of Pretoria, 2011. http://hdl.handle.net/2263/25180.

Pełny tekst źródła
Streszczenie:
In South Africa, the medium-of-instruction (MOI) debate has continued to demand the attention of educators and academics, particularly after the promulgation of the 1997 multilingual language-in-education (LIE) policy and the introduction of the OBE-NCS curriculum in the schools. Using a survey questionnaire, classroom observations and focused interviews, this study aims at establishing how teachers in selected urban and rural high schools in the Mthatha District understand, interpret and implement MOI policies within their practice. It also seeks to establish reasons for implementing the MOI policies in the ways they do. The study utilizes Phillipson’s English Linguistic Imperialism Theory, Brock-Utne’s Qualification Analysis, and Vygotsky’s Social Constructivism to explain the findings. The main findings of the study are that MOI policies are not implemented uniformly in urban and rural contexts or within each context. Learner linguistic profiles, mismatch between a teacher’s home language (HL) and that of his/her learners, the subject being offered, the need to promote understanding of content, teachers’ understandings, misconceptions and beliefs about the role of language in education: all these were found to be factors which may influence a teacher’s language choice during lesson delivery. Generally, teachers endorse the use of English as a language of learning and teaching (LOLT) at high school, together with the learners’ HL. Although some teachers believe that they use English mainly for teaching, indigenous languages are also used extensively, especially in rural and township schools; code-switching, code-mixing, translation, repetition, and township lingo all make the curriculum more accessible to learners. The anomaly is that assessments are conducted only in English, even in contexts in which teaching has been mainly in code-switching mode. An English-only policy was employed in the following situations: in a desegregated urban school; in a rural high school where there was a mismatch between the teacher’s HL and that of his learners; and also in a rural high school where English was offered as a subject. The most cited reasons for using English only as an LOLT were: school language policy, teachers seeing themselves as language role models, the use of English as a LOLT at tertiary level, and past teacher training experiences. The study concludes that the major factors influencing school language policies in a multilingual country such as South Africa are the school context and the teacher and learner profiles. In addition, teaching and assessing learners in languages with which they are familiar, as well as using interactive teaching strategies, would develop learner proficiency, adaptability and creative qualifications, resulting in an improved quality of education.
Thesis (PhD)--University of Pretoria, 2011.
Education Management and Policy Studies
unrestricted
Style APA, Harvard, Vancouver, ISO itp.
33

Naz, Sajida. "Police and psychological trauma : a cross-cultural, mixed methodological study of how police cope with the psychological consequences of their work". Thesis, University of Huddersfield, 2012. http://eprints.hud.ac.uk/id/eprint/17132/.

Pełny tekst źródła
Streszczenie:
The current study explores cross-cultural issues related to coping styles, stress management, resilience, and sociocultural factors that impinge upon the lives of law enforcement professionals. Although a substantive amount of literature suggests the association between trauma exposure and psychological disturbance, there is scarcity in the literature in terms of understanding how police officers involved in traumatic work experience, cope and achieve resilient emotional reactions. In order to fill this gap in the literature, this cross cultural comparative study examined traumatic experiences of police officers in the specific forces of Pakistan and Britain. Main objectives of the study were to a) understand meaning of trauma, emotional reactions and coping b) understand type of traumatic events/experiences, and c) to find out predictors to effective coping and resilience in the two countries. It was a mixed methodological study, therefore preliminary interviews (n = 10) with senior police officers were analysed to develop a comprehensive police trauma survey in both countries. In addition to the self-developed scale, Conner Davidson Resilience Scale (CSDR-10) and General Health Questionnaire (GHQ-12) were used to measure resilience and mental health. Six hundred and thirteen police officers (300 from Pakistan and 313 from the UK) responded to the survey. Quantitative findings suggested significant mean differences on CSDR-10 suggesting that although both forces had adequate level of resilience, Pakistani police officers showed comparatively less resilience level than British police officers. Moreover, the findings suggested strong association between officers who were exposed to highly traumatic incidents and psychological impact. The trauma exposure and resulting psychological disturbance appeared to be strongly associated with both resilience and mental health scores. The qualitative aspect of the present study helped in developing a model of understanding trauma experiences and coping by looking at specific socio-religious norms and practices and their psychological impact. Such a cross cultural study can enhance the understanding of how coping can be improved and existing resources can be made robust enough to cope better within a diverse policing context. The importance of incorporating personal challenges of police officers while formulating plans for improving performance culture has been suggested. The proposed “trauma metabolic process model” (TMP) was tested using path analysis and can be applicable and useful in various clinical and organisational settings.
Style APA, Harvard, Vancouver, ISO itp.
34

Calland-Jackson, Paul-Napoléon. "La politique sociale napoléonienne : De la charité chrétienne à une politique sociale d’état : L’organisation du salut public sous le Consulat et l’Empire : 1785 – 1815". Thesis, Versailles-St Quentin en Yvelines, 2015. http://www.theses.fr/2015VERS017S/document.

Pełny tekst źródła
Streszczenie:
Les révolutionnaires de l’époque 1789 – 1799 ont supprimé les corps intermédiaires entre l’Etat et le Peuple. Selon la Déclaration des Droits de l’Homme, nul corps, nul individu ne devait s’insérer entre le pouvoir et la plèbe. Ainsi, les lois Chapelier (entre autres) ont supprimé les corps de métier et les gouvernements successifs ont tenté d’éradiquer les contre-pouvoirs des régions et des « féodalités » locales. Or, lorsque Napoléon Bonaparte prend la tête de l’Etat en novembre 1799, le pays est en quête de nouveaux repères. Le chef du nouveau gouvernement instauré en février 1800 entend mettre en place des « masses de granit », c’est-à-dire des institutions stables.La création de la Banque de France, des Préfets, des Lycées, du Baccalauréat, de la Légion d’Honneur, sont des exemples connus parmi tant d’autres. En revanche, le sujet de cette thèse est moins connu, excepté peut-être des étudiants et enseignants juristes. Car au cœur du nouveau Code Civil des Français se trouve « l’esprit de fraternité » exprimé dans le texte de la Déclaration des Droits de l’Homme et du Citoyen, et dans la Constitution du 5 fructidor. L’Eglise catholique n’étant plus – depuis le Concordat – la religion officielle de l’Etat, mais la religion majoritaire, l’Etat remplace le devoir de charité par une fraternité civile. Le Premier Consul (bientôt Empereur) ajoute une clause du Code Civil stipulant que les parents doivent pourvoir aux besoins de leurs enfants majeurs, lorsque ces derniers en sont incapables (et inversement).A travers l’époque du Consulat et du Premier Empire, cette thèse vise à démontrer le développement des structures de solidarité sociale, notamment dans la législation mais aussi en ce qui concerne les institutions et les politiques de l’Etat pendant cette période. Nous étudierons (entre autres) le Code Civil en son contexte, les Maisons d’Education de la Légion d’Honneur, la législation du travail (dont notamment celui des enfants), les sociétés de secours mutuels (prédécesseurs de nos mutuelles et syndicats d’aujourd’hui) et les administrations de bienfaisance. Nous jetterons également un regard – en conclusion – sur les projets inachevés développés sous des régimes postérieurs. Cela afin de mieux placer cette époque dans son contexte par rapport au XXIe siècle.La période du Consulat et de l’Empire a été une grande période de création de caisses de retraite, et l’Empereur Napoléon en a même précisé les principes qui devaient régir ce « droit » qu’il voulait étendre à tous les métiers. Notre thèse suit donc les traces de la création de ces institutions et de l’encadrement de la vie quotidienne selon les principes napoléoniens, synthèse de l’Ancien Régime et des idéaux de 1789
The revolutionaries of the period spanning 1789 – 1799 abolished the corps intermédiaires between the State and the People. According to the Declaration of the Rights of Man, no organisation or individual must step between the power and the plebeians. Thus, the Le Chapelier laws (among others) abolished the guilds, and successive governments attempted to eradicate the opposing forces of the regions and local « feudalisms ». However, when Napoleon Bonaparte took charge of the ship of State in November 1799, the country was in search of new references. The chief of the new government installed in February 1800 aimed to lay « masses of granite », that is to say stable institutions, on the soil of France.The creation of the Bank of France, of the Prefects, of the Lycées, Baccalaureate and Legion of Honour are well-known examples among many others. But the subject of this thesis is less famous, except perhaps for students and teachers of law. For in the heart of the new Civil Code of the French, there is the « spirit of fraternity » expressed in the Declaration of the Rights of Man and of the Citizen, and in the Constitution of the 5th of Fructidor. The Catholic Church no longer being – since the Concordat – the official State religion, but the religion of the majority of Frenchmen, the State replaced the duty of charity with civil fraternity. The First Consul (who was soon to be Emperor) added a clause to the Civil Code stipulating that parents must provide for their children, even as adults, if the latter are unable to do so (and vice versa).Throughout the era of the Consulate and First Empire, this thesis aims to show the development of structures of social solidarity, particularly via legislation, but also in relation to the institutions and policies of the State during this period. We will study (among others) the Civil Code in its context, the Maisons d’Education de la Légion d’Honneur, legislation on labour (particularly in relation to child labour), mutual aid societies (predecessors of the mutual insurance companies and trades unions of our times) and the welfare administrations. We will also cast an eye, in conclusion, over the unfinished projects developed under later regimes. In order to better situate this era in its context in relation to the 21st Century.The period of the Consulate and Empire was a great period for the creation of retirement pension funds, and the Emperor Napoleon even set down the principles which were to regulate this « right » that he wanted to extend to all trades. Our thesis therefore follows in the trail of the creation of these institutions and of the framework of daily life according to Napoleonic principles, a synthesis of the Old Regime and the ideals of 1789
Style APA, Harvard, Vancouver, ISO itp.
35

Limon, Jesus Jr. "Impact of Parental Incarceration on Family Reunification| California Welfare and Institution Code 361.5| A Policy Analysis". Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10262385.

Pełny tekst źródła
Streszczenie:

The purpose of this policy analysis was to examine Article 10: Dependent Children-Judgments and Orders, Welfare and Institutions Code (WIC) 361.5, which describes the criteria for offering or denying visitation and reunification services to incarcerated parents or guardians with their children in out-of-home care. This analysis begins with a historical overview of the incarceration explosion in the past decades, and its relation to children in out-of-home care. The policy analysis identifies systemic challenges faced by incarcerated parents as they make efforts to reunify and preserve their child-parent relationships. The analysis is based on Gil’s (1992) original nationally recognized framework and updated by Jimenez, Pasztor, Chambers, and Fujii, (2015). Limitations and alternative policy recommendations that could best meet these objectives are provided.

Style APA, Harvard, Vancouver, ISO itp.
36

Dominic, P. A. "Language practices and identities of multilingual students in a Western Cape tertiary institution : implications for teaching and learning". University of the Western Cape, 2012. http://hdl.handle.net/11394/5193.

Pełny tekst źródła
Streszczenie:
Magister Educationis - MEd
In South Africa, there has been little research into the language practices of multilingual students in tertiary institutions or into how such students negotiate identities in these globalising contexts where the dominance of English remains an important factor. This research was aimed at exploring the appropriateness of 1997 Language-In-Education policy for schools and the national Language Policy for Higher Education (2002) for equipping students for tertiary teaching and learning. It therefore investigated the relationship between the language practices and construction of identities of a group of multilingual first year students in the Education Faculty at a Western Cape university. In this integrated institution, in spite of the current political and socio-economic transformation that has been at the centre of new policies, the medium of instruction is still predominantly monolingual. The premise of the research was that in a multilingual country such as South Africa with 11 official languages, tertiary institutions ought to more vigorously engage with their current language policies in order to value and extend the language practices of multilingual students for academic learning. Here multilingual repertoires are understood as resources rather than problems. The research draws extensively on Bourdieu's notion of 'linguistic capital' quantifying language itself as a form of capital with a market value. Through thematic analysis of themes drawn from questionnaires, interviews, focus group discussions, and participant observation in both tutorials and lectures, the investigation concluded that a monolingual medium of instruction to non-native speakers should be practised alongside other languages as means to support in their academic attainment. Finally the research emphasised the importance of code switching as a strategy that facilitates learning and promotes understanding of the role language resources play in social and academic interaction.
Style APA, Harvard, Vancouver, ISO itp.
37

Marttala, Amanda, i Nicolina Ahlstedt. ""Kungens pojkar" : En kvalitativ studie om hur poliser kan legitimera kollegors anmälningsbara gärningar". Thesis, Linnéuniversitetet, Institutionen för samhällsstudier (SS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-61478.

Pełny tekst źródła
Streszczenie:
This study aims to explain the demarcations regarding which crimes that are seen as “acceptable” to commit as an police officer, and those who categorizes as “not acceptable”. The study is based on a qualitative, narrative method of semi-structured interviews. Antecedent research shows the strong subculture in the police force and the approach of seeing the police profession as a lifestyle. This study uses Erving Goffmans dramaturgic perspective on society by applying “Team”, “Front Stage and “Back Stage” to explain why the demarcations is the way it is. By studying “Front Stage” as police officers in front of the public and “Back Stage” as a closed space for the police officers, the essay intends to see how police officers, seen as a team, deal with wrongful acts made by an police officer. By using an constructed sorting model the study separated the data from ten interviewed police officers by categorizing into ways of legitimizing crimes commited by an police officer. The study aims to show understanding in why unethic and unlegal deeds by police officers are not reported, and therefore legitimized by the subculture. The conclusion of this essay is that there are two ways to legitimize wrongful acts of police officers. These two ways are by the norms “Us versus them” and the silence code. We created two concepts in combination with the use of the theories of Goffman. This paper will show how the two concepts, ”team offset” and ”team censoring”, can legitimize crimes as a part of the subculture. To be able to legitimize a wrongful act, the police officer needs to use his team. If the team can not legitimize the crime, it categorizes as “not acceptable”.
Style APA, Harvard, Vancouver, ISO itp.
38

Trani, Brett. "Crises, consensus, and conviction : the core executive and the institutionalisation of British efficiency reforms". Thesis, University of Aberdeen, 2014. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225335.

Pełny tekst źródła
Streszczenie:
In the aftermath of the 2008 economic recession, governments across the globe were forced to confront a difficult reality: growth and spending would need to be revised dramatically downward while central government systems would have to be made more efficient. In the United Kingdom specifically, the 2010 general election became a referendum on how quickly and severely to implement austerity policies the likes of which had not been seen for generations. Why did the Conservative-Liberal Democrat coalition choose austerity when other alternatives, such as a public sector stimulus package, were also available? To answer this question this research seeks to understand how and why political actors in the United Kingdom respond to economic and political crises through the implementation of specific efficiency reforms. This is accomplished through two specific steps: the establishment of an analytical framework to better understand the dynamics of efficiency reforms and an in-depth study of the historical development of efficiency reforms from the early twentieth century through the present. A historical institutionalist theoretical foundation is employed in order to understand the evolution of ideas throughout this time span. A thorough understanding of institutional effects, including aspects of lock-in effects and process tracing, are essential components of understanding why powerful political actors choose certain efficiency reforms over others. Ultimately, this research is meant as a first step towards a greater understanding of efficiency in government. Previous research has examined specific reforms in relative isolation without the benefit of historical context. By systematically tracing the evolution of efficiency reforms across different eras a more complete understanding of policies and political actors is established. Further research, including comparative studies across political systems and the incorporation of quantitative date, is discussed in the conclusion.
Style APA, Harvard, Vancouver, ISO itp.
39

Höckerman, Kasper. "Aktörskoalitioner i svensk säkerhetspolitik : En analys av riksdagspartiernas inställning till Natomedlemskap". Thesis, Luleå tekniska universitet, Institutionen för ekonomi, teknik och samhälle, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74503.

Pełny tekst źródła
Streszczenie:
Studien avser att förklara riksdagspartiernas inställning mot Natomedlemskap över tid. Därför utförs en policyanalys inom ramen för ''The Advocacy Coalition Framework'’. Detta genomförs genom att kategorisera riksdagspartierna till relevanta advocacy coalitions utifrån deras beliefs. Studien använder sig av utrikespolitiska debatter för att avgöra respektive riksdagspartis beliefs. Genom att undersöka riksdagspartiernas normative och empirical policy core beliefs över tid kan studien finna likheter och skillnader mellan advocacy coalitions. Vad studien kommer fram till är hur riksdagspartierna tar en annan ställning inom säkerhetspolitiken och hur gemensamma beliefs kan förekomma mellan advocacy coalitions. Med åren går det även att se hur riksdagspartier börjar värna mer om militära medel för svensk säkerhet. Studien erbjuder också ett teoretiskt intressant inlägg genom att lyfta upp hur empirical policy core beliefs binder också advocacy coalitions varifrån tidigare forskning visar hur oftast normative policy core beliefs avgör strukturen i advocacy coalitions. Riksdagspartiers ställningstagande antingen för Natomedlemskap eller mot Natomedlemskap blev relevant för vilken advocacy coalition riksdagspartierna blev kategoriserade inom.
Style APA, Harvard, Vancouver, ISO itp.
40

Ray, Donald James. "A Quantified Model of Security Policies, with an Application for Injection-Attack Prevention". Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6133.

Pełny tekst źródła
Streszczenie:
This dissertation generalizes traditional models of security policies, from specifications of whether programs are secure, to specifications of how secure programs are. This is a generalization from qualitative, black-and-white policies to quantitative, gray policies. Included are generalizations from traditional definitions of safety and liveness policies to definitions of gray-safety and gray-liveness policies. These generalizations preserve key properties of safety and liveness, including that the intersection of safety and liveness is a unique allow-all policy and that every policy can be written as the conjunction of a single safety and a single liveness policy. It is argued that the generalization provides several benefits, including that it serves as a unifying framework for disparate approaches to security metrics, and that it separates—in a practically useful way—specifications of how secure systems are from specifications of how secure users require their systems to be. To demonstrate the usefulness of the new model, policies for mitigating injection attacks (including both code- and noncode-injection attacks) are explored. These policies are based on novel techniques for detecting injection attacks that avoid many of the problems associated with existing mechanisms for preventing injection attacks.
Style APA, Harvard, Vancouver, ISO itp.
41

Keeler, Rebecca L. "Analysis of Proposed Revisions to Ethics Code of American Society for Public Administration". Digital Commons @ East Tennessee State University, 2012. https://dc.etsu.edu/etsu-works/653.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Liu, Chun. "China's telecommunications accomplishments, problems and the shape of the future to come /". online access from Digital Dissertation Consortium, 2006. http://libweb.cityu.edu.hk/cgi-bin/er/db/ddcdiss.pl?3248361.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

Hatch, Walter. "Rearguard regionalization : protecting core networks in Japan's political economy /". Thesis, Connect to this title online; UW restricted, 2000. http://hdl.handle.net/1773/10327.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Foley, Virginia P. "What Parents Should Know about Common Core". Digital Commons @ East Tennessee State University, 2013. https://dc.etsu.edu/etsu-works/5983.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Gray, Stacie J. "Achieving compliance with the World Anti-Doping Code : learning from the implementation of three selected international agreements". Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/35464.

Pełny tekst źródła
Streszczenie:
The scale of the compliance problem that the World Anti-Doping Agency (WADA) faces was recently highlighted by the exposure of state-sponsored doping in Russia and the series of doping scandals within athletics. This study aims to analyse the problems of achieving compliance with the World Anti-Doping Code. Specifically, the study explores the techniques for, and problems of, achieving compliance in three similar international agreements: the UN Convention on the Rights of the Child, the UN Convention on the Rights of Persons with Disabilities and the UN Convention Against Transnational Organised Crime. The Conventions were analysed to identify the range of strategies used to achieve (or at least enhance) the level of compliance with the international conventions, to evaluate their effectiveness as a way of generating ideas for improving compliance with the WADA Code and to assess the comparative success of the WADA. To evaluate compliance, three inter-related bodies of theory were used: regime theory, implementation theory and Mitchell and Chayes (1995) compliance system. Qualitative document analysis was used to analyse documents published by relevant organisations. Semi-structured interviews were also conducted with senior staff members responsible for monitoring compliance at the international and UK domestic level. The results identified a range of strategies used to achieve compliance, including a global annual index of compliance, independent monitoring institutions, whistleblowing and domestic lobbying. It is concluded that the identified strategies have had modest and variable success in improving compliance, yet have the potential to address the problems of achieving compliance with the WADA Code.
Style APA, Harvard, Vancouver, ISO itp.
46

Bonacina, Florence Marguerite. "Conversation analytic approach to practiced language policies : the example of an induction classroom for newly-arrived immigrant children in France". Thesis, University of Edinburgh, 2011. http://hdl.handle.net/1842/5268.

Pełny tekst źródła
Streszczenie:
Traditionally, language policy (LP) has been conceptualised as a notion separate from that of practice. That is, language practices have usually been studied with a view to evaluate the extent to which a LP is (or is not) implemented (e.g. Martin, 2005; Johnson, 2009). Recently, however, Spolsky (2004, 2007, 2008a) has argued that policy and practice need not be seen as distinct and that, in fact, there is policy in language practices themselves (I use the term ‘practiced language policy’). Therefore, Spolsky’s claim represents a decisive development in the field of LP research. However, this proposal remains essentially programmatic since Spolsky does not indicate how practiced language policies can be investigated. The aim of this thesis is to address this methodological gap. The main claim of the thesis is that Conversation Analysis (CA) – a method specifically developed to describe conversational practices – can be used to investigate practiced language policies. In order to support this claim, a case study has been conducted on the language practices of an induction classroom for newly-arrived immigrant children in France. In the thesis, a broad view of CA is adopted, incorporating both sequential and categorisation analysis (Membership Categorisation Analysis). More specifically, I have used the conversation analytic approach to code-switching (as developed over the last few years by researchers such as Auer, 1984; Li Wei, 2002; Gafaranga, 2009; Bonacina and Gafaranga, 2010) and investigated a corpus of audio-recorded classroom interactions I collected in the above mentioned setting. Observation of these interactions revealed a number of “norms of interaction” (Hymes, 1972) the classroom participants orient to in order to go about the routine business of talking in an orderly fashion. For example, it was observed that each of the languages available can potentially be adopted as the “medium of classroom interaction” (Bonacina and Gafaranga, 2010) depending on who is doing being the language teacher. When no one is doing being the language teacher, it was observed, a key determinant of language choice is participants’ language preference. Finally, in the absence of any shared preferred language, French was adopted. The practiced language policy of this induction classroom consists of the set of such interactional norms. It is because CA can be used to discover and describe such interactional norms that this thesis claims it can be used to investigate practiced language policies in this induction classroom and in other settings as well. In summary, this thesis is primarily a contribution to the field of LP research. It starts from recent proposals in the field, especially by Spolsky (2004, 2007, 2008a), that there is policy in practices and shows how this programmatically formulated proposal can be implemented. More specifically the thesis shows that and how CA can be used to discover a practiced language policy. The research reported here has adopted a case study methodology, investigating language choice practices in a multilingual educational setting. It therefore contributes to the study of bilingual classroom talk, albeit indirectly. This is particularly the case as there has been very few, if any, studies of bilingual classroom talk which combine both sequential and categorisation analysis.
Style APA, Harvard, Vancouver, ISO itp.
47

Ben, Hadj Fredj Abir. "Computations for the multiple access in wireless networks". Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLT030.

Pełny tekst źródła
Streszczenie:
Les futures générations de réseaux sans fil posent beaucoup de défis pour la communauté de recherche. Notamment, ces réseaux doivent être en mesure de répondre, avec une certaine qualité de service, aux demandes d'un nombre important de personnes et d'objets connectés. Ce qui se traduit par des exigences assez importantes en termes de capacité. C'est dans ce cadre que les méthodes d'accès multiple non orthogonaux (NOMA) ont été introduit. Dans cette thèse, nous avons étudié et proposé une méthodes d'accès multiple basé sur la technique compute and forawrd et sur les réseaux de point (Lattice codes) tout en considérant différentes constructions de lattice. Nous avons également proposé des amélioration de l'algorithme de décodage de la méthode SCMA (Sparse code multiple access) basé sur les réseaux de points. Afin de simplifier les décodeurs multi-niveaux utilisés, nous avons proposé des expressions simplifiées de LLRs ainsi que des approximations. Finalement, nous avons étudié la construction D des lattices en utilisant les codes polaires. Cette thèse était en collaboration avec le centre de recherche de Huawei France
Future generations of wireless networks pose many challenges for the research community. In particular, these networks must be able to respond, with a certain quality of service, to the demands of a large number of connected people and objects. This drives us into quite important requirements in terms of capacity. It is within this framework that non-orthogonal multiple access methods (NOMA) have been introduced. In this thesis, we have studied and proposed a multiple access method based on the compute and forward technique and on Lattice codes while considering different lattice constructions. We have also proposed improvements to the algorithm for decoding the Sparse code multiple access (SCMA) method based on Lattice codes. In order to simplify the multi-stage decoders used in here, we have proposed simplified expressions of LLRs as well as approximations. Finally, we studied the construction D of lattices using polar codes. This thesis was in collaboration with the research center of Huawei France
Style APA, Harvard, Vancouver, ISO itp.
48

Chaulet, Julia. "Etude de cryptosystèmes à clé publique basés sur les codes MDPC quasi-cycliques". Thesis, Paris 6, 2017. http://www.theses.fr/2017PA066064/document.

Pełny tekst źródła
Streszczenie:
L’utilisation des codes MDPC (Moderate Density Parity Check) quasi-cycliques dans le cryptosystème de McEliece offre un schéma de chiffrement post-quantique dont les clés ont une taille raisonnable et dont le chiffrement et le déchiffrement n’utilisent que des opérations binaires. C’est donc un bon candidat pour l’implémentation embarquée ou à bas coût.Dans ce contexte, certaines informations peuvent être exploitées pour construire des attaques par canaux cachés.Ici, le déchiffrement consiste principalement à décoder un mot de code bruité. Le décodeur utilisé est itératif et probabiliste : le nombre d’itérations de l'algorithme varie en fonction des instances et certains décodages peuvent échouer. Ces comportements ne sont pas souhaitables car ils peuvent permettre d’extraire des informations sur le secret.Une contremesure possible est de limiter le nombre d’instances de chiffrement avec les mêmes clés. Une autre façon serait de recourir à un décodage à temps constant dont la probabilité d’échec au décodage est négligeable. L’enjeu principal de cette thèse est de fournir de nouveaux outils pour analyser du comportement du décodeur pour la cryptographie.Dans un second temps, nous expliquons pourquoi l'utilisation des codes polaires n'est pas sûre pour le cryptosystème de McEliece. Pour ce faire, nous utilisons de nouvelles techniques afin de résoudre une équivalence de codes. Nous exhibons de nombreux liens entre les codes polaires et les codes de Reed-Muller et ainsi d'introduire une nouvelle famille de codes : les codes monomiaux décroissants. Ces résultats sont donc aussi d'un intérêt indépendant pour la théorie des codes
Considering the McEliece cryptosystem using quasi-cylcic MDPC (Moderate Density Parity Check matrix) codes allows us to build a post-quantum encryption scheme with nice features. Namely, it has reasonable key sizes and both encryption and decryption are performed using binary operations. Thus, this scheme seems to be a good candidate for embedded and lightweight implementations. In this case, any information obtained through side channels can lead to an attack. In the McEliece cryptosystem, the decryption process essentially consists in decoding. As we consider the use of an iterative and probabilistic algorithm, the number of iterations needed to decode depends on the instance considered and some of it may fail to be decoded. These behaviors are not suitable because they may be used to extract information about the secrets. One countermeasure could be to bound the number of encryptions using the same key. Another solution could be to employ a constant time decoder with a negligible decoding failure probability, that is to say which is about the expected security level of the cryptosystem. The main goal of this thesis is to present new methods to analyse decoder behavior in a cryptographic context.Second, we explain why a McEliece encryption scheme based on polar code does not ensure the expected level of security. To do so, we apply new techniques to resolve the code equivalence problem. This allows us to highlight several common properties shared by Reed-Muller codes and polar codes. We introduce a new family of codes, named decreasing monomial codes, containing both Reed-Muller and polar codes. These results are also of independent interest for coding theory
Style APA, Harvard, Vancouver, ISO itp.
49

Welch, Ian Shawn. "Using a loadtime metaobject protocol to enforce access control policies upon user-level compiled code". Thesis, University of Newcastle Upon Tyne, 2005. http://hdl.handle.net/10443/2106.

Pełny tekst źródła
Streszczenie:
This thesis evaluates the use of a loadtime metaobject protocol as a practical mechanism for enforcing access control policies upon applications distributed as user-level compiled code. Enforcing access control policies upon user-level compiled code is necessary because there are many situations where users are vulnerable to security breaches because they download and run potentially untrustworthy applications provided in the form of user-level compiled code. These applications might be distributed applications so access control for both local and distributed resources is required. Examples of potentially untrustworthy applications are Browser plug-ins, software patches, new applications, or Internet computing applications such as SETI@home. Even applications from trusted sources might be malicious or simply contain bugs that can be exploited by attackers so access control policies must be imposed to prevent the misuse of resources. Additionally, system administrators might wish to enforce access control policies upon these applications to ensure that users use them in accordance with local security requirements. Unfortunately, applications developed externally may not include the necessary enforcement code to allow the specification of organisation-specific access control policies. Operating system security mechanisms are too coarse-grained to enforce security policies on applications implemented as user-level code. Mechanisms that control access to both user-level and operating system-level resources are required for access control policies but operating system mechanisms only focus on controlling access to system-level objects. Conventional object-oriented software engineering can be used to use existing security architectures to enforce access control on user-level resources as well as system-resources. Common techniques are to insert enforcement within libraries or applications, use inheritance and proxies. However, these all provide a poor separation of concerns and cannot be used with compiled code. In-lined reference monitors provide a good separation of concerns and meet criteria for good security engineering. They use object code rewriting to control access to both userlevel and system-level objects by in-lining reference monitor code into user-level compiled code. However, their focus is upon replacing existing security architectures and current implementations do not address distributed access control policies. Another approach that does provide a good separation of concerns and allows reuse of existing security architectures are metaobject protocols. These allow constrained changes to be made to the semantics of code and therefore can be used to implement access control policies for both local and distributed resources. Loadtime metaobject protocols allow metaobject protocols to be used with compiled code because they rewrite base level classes and insert meta-level interceptions. However, these have not been demonstrated to meet requirements for good security engineering such as complete mediation. Also current implementations do not provide distributed access control. This thesis implements a loadtime metaobject protocol for the Java programming language. The design of the metaobject protocol specifically addresses separation of concerns, least privilege, complete mediation and economy of mechanism. The implementation of the metaobject protocol, called Kava, has been evaluated by implementing diverse security policies in two case studies involving third-party standalone and distributed applications. These case studies are used as the basis of inferences about general suitability of using loadtime reflection for enforcing access control policies upon user-level compiled code.
Style APA, Harvard, Vancouver, ISO itp.
50

Cole, LaQuitta D. "California welfare and institutions code § 369.5 authorization of psychotropic medication to California's dependent children A policy analysis". Thesis, California State University, Long Beach, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1527687.

Pełny tekst źródła
Streszczenie:

The purpose of this policy analysis is to critically review the Welfare and Institutions Code§ 369.5, which regulates the authorization of psychotropic medication to treat mental disorders among California's dependent children. While these medications have been proven effective forms of treatment, there is a growing concern about their life threatening side effects.

Research has concluded that children exposed to chronic child abuse and neglect often present with behaviors indicative of trauma. The Diagnostic and Statistical Manual of Mental Disorders 5th Edition has included criteria for Post-Traumatic Stress Disorder (P.T.S.D.) in children. However, the Welfare and Institutions Code§ 369.5 does not mandate psychiatrists and pediatricians to first rule out trauma prior to diagnosing foster children with one or more behavior, mood, or psychotic disorders.

Results support amending child welfare legislation and policies to reflect a shift toward trauma-focused services, thereby reducing the reliance on potentially dangerous pharmaceutical drugs.

Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii