Добірка наукової літератури з теми "Insider research"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Insider research".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Insider research":

1

Hewitt-Taylor, Jaquelina. "Inside knowledge: issues in insider research." Nursing Standard 16, no. 46 (July 31, 2002): 33–35. http://dx.doi.org/10.7748/ns.16.46.33.s5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Asselin, Marilyn E. "Insider Research." Journal for Nurses in Staff Development (JNSD) 19, no. 2 (March 2003): 99–103. http://dx.doi.org/10.1097/00124645-200303000-00008.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Locke, Rachel. "Showcasing insider research." Clinical Teacher 16, no. 3 (May 22, 2019): 175–76. http://dx.doi.org/10.1111/tct.13027.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

van Heugten, Kate. "Managing Insider Research." Qualitative Social Work: Research and Practice 3, no. 2 (June 2004): 203–19. http://dx.doi.org/10.1177/1473325004043386.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Roth, Jonas, Abraham B. (Rami) Shani, and Myleen M. Leary. "Insider action research." Action Research 5, no. 1 (March 2007): 41–60. http://dx.doi.org/10.1177/1476750307072875.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Firth, Michael, T. Y. Leung, and Oliver M. Rui. "Insider Trading in Hong Kong: Tests of Stock Returns and Trading Frequency." Review of Pacific Basin Financial Markets and Policies 14, no. 03 (September 2011): 505–33. http://dx.doi.org/10.1142/s0219091511002317.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The main purpose of this paper is to examine the legal insider trading activities by directors of companies listed on the Hong Kong Exchange over the period 1993 to 1999. One characteristic of insider trading in Hong Kong is the high frequency of transactions and the large amounts of money involved. Inside purchases appear to signal and correct undervaluation and inside sales appear to signal and correct overvaluation. In contrast to research from Britain and the United States, insider sales are more informative than purchases. On average, insiders earn HK$91,297 per trade, while outsiders who mimic insiders' transactions earn minimal returns. Many firms suffer from infrequent trading and our results are consistent with directors engaging in inside transactions so as to help create a market for the shares. In additional tests, we find that the frequency of insider trading is a function of information asymmetry.
7

Dever, Nerolie, Lisa Barnes, and Warrick Long. "Model of Mitigation: Strategies to Utilise Unique Insider Research Opportunities." International Journal of Emerging Trends in Social Sciences 10, no. 2 (August 26, 2021): 75. http://dx.doi.org/10.20448/2001.102.75.84.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Insider research has in the past challenged researchers in terms of blurred lines, objectivity, bias confidentiality and maintaining professional working relationships. The opportunities it presents however include access to information, trust in the data collection, insider and intimate knowledge, and the ability for rich inside data collection. This paper discusses these opportunities and challenges, then makes recommendations for ten strategies to assist in data collection by an insider researcher. These strategies include communication, mixed methods, reflections, debrief, distance, confidentiality, interview technique, social network, voluntary and objectivity. The research concludes with the creation of a Model of Mitigation, which posits the ten mitigation strategies along with the four opportunities to assist insider researchers to overcome obstacles when conducting insider research, as insider research has been shown to collect rich data and enable organisations to reflect on the research findings and to implement recommendations made on an individual but organisation wide basis.
8

Coghlan, David, and Rosalie Holian. "Editorial: insider action research." Action Research 5, no. 1 (March 2007): 5–10. http://dx.doi.org/10.1177/1476750307072872.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Louis, Meryl Reis, and Jean M. Bartunek. "Insider/Outsider Research Teams." Journal of Management Inquiry 1, no. 2 (June 1992): 101–10. http://dx.doi.org/10.1177/105649269212002.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Coghian, David. "Insider Action Research Projects." Management Learning 32, no. 1 (March 2001): 49–60. http://dx.doi.org/10.1177/1350507601321004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Insider research":

1

Barnett, Jane. "Efficient and effective management in Higher Education : an insider action research perspective." Thesis, Cardiff Metropolitan University, 2014. http://hdl.handle.net/10369/7944.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The purpose of this research was to examine the factors that underpin efficient and effective management of the administration services that support academic delivery in an academic school in higher education. It emanated from personal disquiet that my formal management education, with curricula delivered on a discipline basis, had not equipped me to deal with the complex and messy reality of the managerial role. There were six objectives associated with this project: (a) examine effective and efficient management through action research; (b) develop management effectiveness through action research; (c) analyse the factors that underpin, contribute to and affect the manager's efficient and effective delivery of support activities; (d) enhance and develop the researcher's managerial competencies and improve work systems; (e) examine how past managerial experiences affect current practice; and (f) examine the benefits of insider, first person, action research to support managerial activity in a university academic school. An autoethnograhic approach, using reflective narratives, was adopted. The reflective narratives, which form the data for this research, were written over a two year period between spring 2010 and spring 2012, and encompassed the daily activities, both planned and unplanned, mundane and unique of my life as a manager. The findings indicated that effective self-management was a pre-requisite of the successful management of others. Self-management and the management of others requires skills based around four themed areas of emotional management, relationship management, presentation management and the management of roles and tasks. Experience, combined judiciously with formal management education and training (hard skills), ability in the four themed areas (soft skills), and sector and organisational knowledge are required to manage successfully within a university setting. Experiential learning, achieved by structured reflective practice, was found to be an important tool for the improvement of practice through continuing professional development. Action research and reflective practice were useful approaches in the improvement of managerial effectiveness. The manager must be able to apply their professional knowledge according to the situation; this was when tacit knowledge-in-action was required. The findings suggest, therefore, the need to educate managers in the acquistion of structured reflective practice. Formal management education should teach students about the need for and the development of the soft skills pertaining to the management of emotions, relationships, self-presentation and of roles and tasks in themselves and others. This thesis has important implications for management education and for the continuing professional and personal development of practising managers.
2

Humphrey, Bryan, and edu au jillj@deakin edu au mikewood@deakin edu au kimg@deakin. "Insider Research, the Process and Practice: Issues arising from professionals conducting research within their own working environments." Deakin University. School of Education, 1995. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20040614.122119.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This thesis explores the chaotic, dynamic, ambiguous, complex and confusing world of the insider researcher. The proliferating species of insider researcher is common in public sector organisations and is particularly prevalent among post-graduate students who have combined study with work. Insider researchers range from the in-house researcher employed to conduct research to those who are conducting research in addition to their normal duties. This thesis, through five illustrative case-studies, discusses, reflects upon, explains, and clarifies the possibilities, limitations and the issues arising from a consideration of the practice of professionals conducting research in the large government education system in Victoria. The central focus of this thesis, that of exploring issues arising from professionals conducting research in their own working environments, has an importance that hitherto has had little direct recognition in the qualitative education research literature. And yet the practice of insider research is common and has a potentially large impact on the nature of the decision making process in public sector organisations. This relative invisibility in the social research literature of a discussion of issues relating to insider research demands to be made more visible. It is both useful and necessary to explore the particular possibilities, conditions and challenges of insiders conducting research in public organisations as the practice of insider research contines to grow. This thesis adds to the literature by locating insider research in a discussion of the wider soial context of ideology, culture, relationships, politics, language and meaning, and the decision-making process.
3

Young, Alison Margaret Grieg. "Re-embodying leadership through a re-examination of the sacred." Thesis, University of Exeter, 2014. http://hdl.handle.net/10871/16455.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The last couple of decades have witnessed an exponential increase of interest in religion and spirituality in the academic disciplines of leadership and organization. Some scholars argue that this interest is prone to neglect analysis of Western religion’s historical origins and therefore of what may be its repressed influences on leadership and organizational practices. Others, that this revived focus on the sacred may be limited by an over-reliance on too narrow a theology rooted within a singular (Judeo-Christian) cosmology. I seek to both speak to and expand the concerns of such previous research. I do this by introducing ecofeminism as a theoretical framework for a critical analysis of the macro level of what has already been framed as the repressed influence of mainstream religious orthodoxy within the field of leadership studies. Building upon the perspectives provided by ecofeminism and feminist spirituality I extend the aforementioned concerns by suggesting that some of the ethics within the Judeo-Christian cosmology itself bear some relationship to and responsibility in crises relating to environmental sustainability and social justice. I explore a number of related themes, arguing in particular that the demotion of nature and partnership with what might be described as the divine feminine within Western culture are not only linked but also generate profound dysfunction, in both leadership and organization. In the second section I present empirical data at a micro level, collected within a contemporary spiritual community where both nature and the divine feminine play central roles in its cosmology. The School of Movement Medicine functions as a financially successful business organization dedicated to the encouragement of spiritual fulfillment, ecological sustainability and social justice. The practices it teaches are specifically designed to assist those who engage with them to take responsibility for responding to the individual, societal and global challenges that lie before us - aiming, in other words to make leaders out of members. My hope is that these explorations may answer some of the calls of previous work to broaden representation within the leadership and spirituality field, as well as enriching its theory and practice with greater potential to generate increased levels of social justice, environmental sustainability and human fulfillment.
4

Chauhan, Vipin. "Knowledge brokering : an insider action research study in the not-for-profit sector." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/35556.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This study contributes an original, practice-based analysis of knowledge brokering in inter-organisational communities of practice in the not-for-profit sector. Defining characteristics of the not-for-profit sector include its social values, principles and practices. Existing literature understates or overlooks the significance of values and principles that are manifested in and enlivened through every day social practices and practitioner encounters. The study contributes by presenting knowledge brokering as a knowledge sharing intervention which integrates people, processes, values and principles into practice. Knowledge brokering and other practice interventions in the not-for-profit sector have to align with its social mission, if they are to be compatible and effective. This is especially so in multi-agency partnerships and inter-organisational communities of practice where collaboration and co-existence rather than assimilation are the primary objectives. This study finds that values-compatible knowledge brokering interventions, boundary bridging, co-creation, common artefacts and knowledge sharing, enable inter-organisational communities of practice to evolve without sacrificing individual autonomy. Foundational knowledge brokering literature emphasises the structural position of the knowledge broker, their knowledge superiority and the benefits they accrue by operating on the periphery of a social network. The study contributes by arguing that knowledge brokering processes and roles can be examined through an alternative practice lens with the knowledge broker as an internal co-practitioner located within a network. The study was carried out in a new, time-limited multi-agency partnership project in the not-for-profit sector. The partnership constituted an inter-organisational community of practice comprising advice, information and support agencies that had agreed to work collaboratively to improve local services. The author was employed as the project s Knowledge Management Officer and carried out the study over a two year period using an insider action research approach. As an insider practitioner-researcher, the author contributed to the project s objectives, worked collaboratively with practitioners and gathered rich data. Action and research occurred simultaneously and the iterative processes enabled the cumulative learning to inform, develop and analyse the practice. The combination of using insider action research approach, an examination of knowledge brokering as a practice intervention and a multi-agency, not-for-profit setting, makes this a unique practice-based study untapping knowledge management lessons from the not-for-profit sector.
5

Emory, Jorie Lynne. "Public Pedagogy and Relational Philanthropy: An Insider Action Research Study of Columbus SOUP." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1429204991.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Lin, Szu-Yu. "Insider Perspectives of Mate Selection in Modern Chinese Society." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7698.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
With the increased exposure to Western cultures and the transition towards modernization, Chinese society has experienced substantial social change, which has influenced marital relationships. Although recent research has documented contemporary patterns of marital interaction, less is known about what Chinese adults consider to be an ideal marital partner and what their parent' roles play in the mate selection process. What do contemporary Chinese adults value in a partner? How much parental influence is involved in choosing an ideal marital partner? These questions were addressed by conducting six focus groups in Taipei, Taiwan. The focus groups included a total of 51 participants (male = 25; female = 26) and included separate groups for middle-aged married men, middle-aged married women, younger married men, younger married women, never-married young adult men, and never-married young adult women. The results from qualitative analysis indicated three major themes in an ideal partner: family-of-origin (e.g., similar family background, good relationship with in-laws), personal qualities (e.g., financially stable, responsible), and relationship qualities (e.g., getting along, communicating well, mutual respect, gender equality). These results indicate that contemporary Chinese adults value a combination of traditional Chinese (e.g., similar family background) and Western (e.g. good communication) values. When it comes to parental approval on their marriage, most younger participants reported that they would marry a person despite their parents' disapproval, although many indicated that they would want their parents' approval because it would increase family harmony. The older participants, on the other hand, were more likely to still favor parents having significant influence on who their children marry. Overall, the young Chinese participants showed greater incorporation of Western values than the older participants. These findings suggest that modern Chinese society is being increasingly influenced by individualistic Western values.
7

Gibbs, B. T. "An insider research into the changing role of the management accountant during organisational change." Thesis, Liverpool John Moores University, 2017. http://researchonline.ljmu.ac.uk/6693/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This research explores the perceptions of management accountants and their work community within a UK university, during a departmental restructure, when new roles and responsibilities emerged. Current literature on the role of management accountants suggests a lack of understanding as to how their role has developed over the years, with research being fragmented and rarely undertaken from the perspective of the service users, or the role holders. Research has predominantly concentrated on organisational aspects of change in management accounting, there being a dearth of research on the effect that role change has on the management accountant’s perception of their role, identity and associated power within the organisation. In addition, there is lack of field-based research and of practitioner research that is undertaken by qualified management accountants working in situ. A qualitative approach was adopted, wherein the author acted as an insider researcher. As an employee and qualified management accountant, the researcher was part of the community being investigated, which enabled observing-participant techniques to be used. Formal data generation spanned a two-year period, wherein semi-structured interviews were undertaken with nineteen key actors, including the accountants and those they served. Throughout, a research diary was maintained to record observations from meetings, face-to-face encounters, and the verbal and written communications associated with the accountant’s role. Cultural Historical Activity Theory was adopted as a lens with which to explore the perceived changes in perceptions that occurred between the management accountants and their wider organisational community. A thematic analysis of the data revealed three key themes: role, identity and power relations. On further analysis, inconsistent actor reports were apparent which referred to the decentralisation process and the change element of the managing accountants’ role. The resultant tensions and contradictions were analysed in detail as activity developed and altered over time. The effectiveness of the finance business partner model was seen to be flawed. In addition, the perceptions management accountants held of their role, identity and power within the university were impacted on negatively. Overall, analysis provided a rich picture that detailed the experiences of the difficulties and ambiguities brought about by change in the management accountants’ role. In investigating professional accountant practice in situ this study makes a strong contribution to the limited research that addresses the changing perceptions and roles of management accountants in the public sector. The insights further contribute to the literature of management accounting activity, in making a theoretical contribution to knowledge in the field of change, with specific reference to power relations, resistance to change, identity and role perception. With respect to the future, as the finance business partner role has become established in recent years, there is a need for a wider understanding of the transition in the management accountants’ role, as a finance business partner and further research is recommended both in the public and private sector.
8

Doyle, Daniel James. "Insider research into Microsoft's Anytime Anywhere Learning : primary school children empowered in a constructivist classroom." Thesis, University of East Anglia, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.273541.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Gelain, Gabriela Cleveston. "Releituras, transições e dissidências da subcultura feminista Riot Grrrl no Brasil." Universidade do Vale do Rio dos Sinos, 2017. http://www.repositorio.jesuita.org.br/handle/UNISINOS/6327.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Submitted by JOSIANE SANTOS DE OLIVEIRA (josianeso) on 2017-06-06T12:13:24Z No. of bitstreams: 1 Gabriela Cleveston Gelain_.pdf: 2822869 bytes, checksum: 6a55ac10919adbbf56ac2d7ead2111a7 (MD5)
Made available in DSpace on 2017-06-06T12:13:24Z (GMT). No. of bitstreams: 1 Gabriela Cleveston Gelain_.pdf: 2822869 bytes, checksum: 6a55ac10919adbbf56ac2d7ead2111a7 (MD5) Previous issue date: 2017-03-31
UNISINOS - Universidade do Vale do Rio dos Sinos
Este trabalho tem o objetivo de entender o que os elementos subculturais e sujeitos que envolvem a subcultura Riot Grrrl dizem sobre a sua atualização no Brasil. Enquanto elementos subculturais estão os fanzines, blogs, shows, bandas e eventos como o Girls Rock Camp no país. Enquanto sujeitos, entendo as mulheres que estão em contato direto e envolvidas com a subcultura Riot Grrrl no Brasil, amostra composta por 67 entrevistadas de 11 estados brasileiros, entre 15 e 47 anos de idade. A partir de autores e autoras como David Hesmondhalgh (2005), Paula Guerra (2010), Dick Hebdige (1979), Paul Hodkinson (2011) como base, proponho discutir o porquê de tratar Riot Grrrl enquanto subcultura, e ainda as questões de invisibilidade feminina na música e nos estudos subculturais e sobre juventude. Quanto à metodologia, assumo, através de uma observação participante (online e off-line) e inspirada na etnografia virtual, a posição de pesquisadora insider (Paul HODKINSON, 2005; Adriana AMARAL, 2009). Por fim, não há um consenso sobre o que significa ser uma riot grrrl, nem sobre o que seria a subcultura hoje no Brasil, mas nesta complexidade de vozes, idades, estados e opiniões, a vontade de trazer outras mulheres para pensar os feminismos parece falar mais alto do que os diferentes estilos musicais, as dissidências ou preocupações em dar nome às inspirações que tomamos sobre as atitudes das primeiras e “originais” riot grrrls.
This work aims to understand what the subculture elements and people that involve Riot Grrrl show about their update in Brazil. As subculture elements I understand the fanzines, blogs, shows, bands and events such as Girls Rock Camp. As people are the women who are in direct contact and involved with the subculture Riot Grrrl in Brazil, a sample composed of 67 interviewees from 11 Brazilian states, between 15 and 47 years of age. From authors such as David Hesmondhalgh (2005), Paula Guerra (2010), Dick Hebdige (1979), Paul Hodkinson (2011) as a basis, I propose to discuss why to treat Riot Grrrl as a subculture, as well as invisibility issues about women in music and in subcultural studies, and also on youth studies. About methodology, I’ve assumed through a participant observation (online and offline) and inspired by the virtual ethnography, the position of an insider researcher (Paul HODKINSON, 2005; Adriana AMARAL, 2009). Finally, there is no consensus on what it means to be a riot grrrl, nor on what would be the subculture in Brazil today but in this complexity of voices, ages, states and opinions, the desire to bring other women to think feminisms seems to speak louder than the different musical styles, disagreements or concerns in naming the inspirations we take about the attitudes of the first and "original" riot grrrls.
10

Pelevin, Dmitrii. "Research of methods and algorithms of insider detection in a computer network using machine learning technologies." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21877.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Background. Security Information and Event Management (SIEM) systems today are sophisticated sets of software packages combined with hardware platforms, which can perform real-time analysis on security events and can respond to them before potential damage due to the actions of intruders. A huge number of systems rely on the continuous transmission of data through computer networks. Nowadays it is difficult to imagine a sphere of human activity that would not be affected by information technologies and would not use computer networks. Along with the means of protecting information, the technologies that are used by cybercriminals to achieve their goals are also improving. Moreover, the so-called insiders - information security perpetrators inside the protected perimeter, who can cause much more damage by their actions, as they are among the legitimate users and can have access to more confidential information - are becoming a growing threat. Objectives. To identify insider activity within an acceptable time inside the network, we need to develop a methodology to detect abnormal activity within the network using advanced data processing techniques, based on machine learning. After recreating the data processing system, we will also need to determine the most efficient algorithm that can be applied to the task of insider detection. Methods. The work analyzed research papers with similar objectives to investigate methods and technologies for securing against intruder intrusions, in conjunction with a study of machine learning techniques for detecting anomalies in the data. Experimental data were also collected containing information about network activity within the same network over two weeks. With this data, it is possible to conduct an experiment in network traffic processing using state-of-the-art technology. Results. During the study of relevant works, several effective ways to detect anomalies in the data were identified, technologies for processing large amounts of data using NoSQL were studied, and work on creating an experimental bench was performed. As a result, the experimental data obtained was sufficient to verify the effectiveness of the obtained solution. Conclusions. As a result, we analyzed existing approaches to detect insider activity within a computer system. Algorithms based on machine learning and big data processing methods were evaluated. In addition, a model for representing big data in NoSQL format was developed, which made it possible to create an architecture of a system for detecting insiders in computer networks using a graph database and machine learning methods.

Книги з теми "Insider research":

1

Klutz, Doris. Insider Intervention Research. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-28472-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Bartunek, Jean. Insider/outsider team research. Thousand Oaks: Sage Publications, 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Bainbridge, Stephen M. Research handbook on insider trading. Cheltenham, UK: Edward Elgar, 2013.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

McDermott, Jim. Insider Research: Ensuring Authenticity in Online Research. 1 Oliver’s Yard, 55 City Road, London EC1Y 1SP United Kingdom: SAGE Publications, Ltd., 2022. http://dx.doi.org/10.4135/9781529799972.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Crossley, Michael, Lore Arthur, and Elizabeth McNess. Revisiting insider-outsider research in comparative and international education. Oxford: Symposium Books, 2016.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Zimmerman, Carroll L. Insider at SAC: Operations analysis under General LeMay. Manhattan, KS: Sunflower University Press, 1988.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Tabatabai, Ahoo. We Don’t Know You: Recruiting Participants Online Without a Social Media Account in Insider Research. 1 Oliver’s Yard, 55 City Road, London EC1Y 1SP United Kingdom: SAGE Publications, Ltd., 2022. http://dx.doi.org/10.4135/9781529602081.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Canada, Canada Industry. Canada Business Corporations Act: Discussion paper : insider trading. Ottawa, Ont: Industry Canada, 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

H, Anderson Robert. Research and development initiatives focused on preventing, detecting, and responding to insider misuse of critical defense information systems: Results of a three-day workshop. Santa Monica, Calif: RAND, 1999.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Porath, Amiram. Collaborative research in management: Inside out. New Delhi: Response Books, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Insider research":

1

Klutz, Doris. "Intervention Research Circle." In Insider Intervention Research, 43–68. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-28472-5_3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Klutz, Doris. "Introduction." In Insider Intervention Research, 1–2. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-28472-5_1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Klutz, Doris. "Literature Review." In Insider Intervention Research, 3–42. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-28472-5_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Klutz, Doris. "Limitations." In Insider Intervention Research, 69–70. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-28472-5_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Klutz, Doris. "Conclusion." In Insider Intervention Research, 71–75. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-28472-5_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Catrantzos, Nick. "Groundbreaking Research and Findings." In Managing the Insider Threat, 15–36. 2nd ed. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.4324/9781003292678-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Kearney, Judith. "Becoming an adopted insider." In Doing Research within Communities, 142–50. Milton Park, Abingdon, Oxon ; New York, NY :: Routledge, 2016. http://dx.doi.org/10.4324/9781315628875-16.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Radosh-Hinder, Silke. "1.6 Positionierung der Forscherin/Insider Research." In Religion in Bewegung | Religion in Motion, 38–39. Bielefeld, Germany: transcript Verlag, 2022. http://dx.doi.org/10.14361/9783839464021-008.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Toy-Cronin, Bridgette. "Ethical Issues in Insider-Outsider Research." In The SAGE Handbook of Qualitative Research Ethics, 455–68. 1 Oliver's Yard, 55 City Road London EC1Y 1SP: SAGE Publications Ltd, 2018. http://dx.doi.org/10.4135/9781526435446.n31.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Honeywell, David. "The Research Experience from an Insider Perspective." In Issues and Innovations in Prison Health Research, 91–111. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-46401-1_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Insider research":

1

Ho, Shuyuan Mary, Hengyi Fu, Shashanka S. Timmarajus, Cheryl Booth, Jung Hoon Baeg, and Muye Liu. "Insider Threat." In SIGMIS-CPR '15: 2015 Computers and People Research Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2751957.2751978.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Kong, Ivan, and Masooda Bashir. "A Closer Look at Insider Threat Research." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002198.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Insider threats are a danger to organizations everywhere and no organization is immune to the effects of an insider incident. Organizations suffer from individuals whose actions expose the organization to risk or harm in some ways. This situation includes insiders who intentionally or unintentionally cause actions that bring harm or significantly increases risk to the organization. Insider security breaches have been identified by organizations as a pressing problem with no simple solution. This paper presents a systematic literature review of published, scholarly articles on insider threat research from 2010 to 2020. The focus of this literature review is to survey the topics, methodologies, and theories of current insider threat research. The goal of this literature review is to provide an overview of the trends in insider threat research. Fifty-two studies were identified, and about half the papers dealt with identifying potential insiders through machine learning techniques. The most popular trend was the use of learning-based algorithms, such as neural networks and support vector machines, that classified a user as an insider versus a non-insider. Aside from the popular modeling approach, the other publications included in our review focused on human factors related to insider threat and the common methodology for these papers were the use of surveys and questionnaires. Another trend identified in the literature was the use of behavioral patterns as an insider threat indicator. Lastly, researchers identified best practices for organizations to address insider threats. The outcome of this literature review identified trends, best practices, and knowledge that can be used to further develop insider threat frameworks and methodologies. Furthermore, this literature review presents implications for researchers including challenges, issues, and future research directions.
3

Mundie, David A., Sam Perl, and Carly L. Huth. "Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions." In 2013 3rd International Workshop on Socio-Technical Aspects in Security and Trust (STAST). IEEE, 2013. http://dx.doi.org/10.1109/stast.2013.14.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Sanzgiri, Ameya, and Dipankar Dasgupta. "Classification of Insider Threat Detection Techniques." In CISRC '16: 11th Annual Cyber and Information Security Research. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2897795.2897799.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Heurtefeux, Karel, Ochirkhand Erdene-ochir, Nasreen Mohsin, and Hamid Menouar. "Enhancing Rpl Resilience Against Packet Dropping Insider Attacks." In Qatar Foundation Annual Research Conference Proceedings. Hamad bin Khalifa University Press (HBKU Press), 2014. http://dx.doi.org/10.5339/qfarc.2014.itop0888.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

"WRIT 2014: Workshop on Research for Insider Threat." In 2014 IEEE Security and Privacy Workshops (SPW). IEEE, 2014. http://dx.doi.org/10.1109/spw.2014.10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Wang, Hui, Heli Xu, Bibo Lu, and Zihao Shen. "Research on Security Architecture for Defending Insider Threat." In 2009 Fifth International Conference on Information Assurance and Security. IEEE, 2009. http://dx.doi.org/10.1109/ias.2009.53.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Yoon, Wonseok, and HangBae Chang. "Insider Threat Data Expansion Research using Hyperledger Fabric." In 2022 International Conference on Platform Technology and Service (PlatCon). IEEE, 2022. http://dx.doi.org/10.1109/platcon55845.2022.9932102.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Jrad, Radhouane B. N., M. Daud Ahmed, and David Sundaram. "Insider Action Design Research a multi-methodological Information Systems research approach." In 2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS). IEEE, 2014. http://dx.doi.org/10.1109/rcis.2014.6861053.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Zaytsev, Anton, Anatoly Malyuk, and Natalia Miloslavskaya. "Critical Analysis in the Research Area of Insider Threats." In 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2017. http://dx.doi.org/10.1109/ficloud.2017.16.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Insider research":

1

Ghosh, Arijeet, Madhurima Dhanuka, Sai Bourothu, Fernando Lannes Fernandes, Niyati Singh, and Chenthil Kumar. Lost Identity: Transgender Persons Inside Indian Prisons. Commonwealth Human Rights Initiative, 2020. http://dx.doi.org/10.20933/100001185.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This report sheds light on challenges faced by Transgender persons in Indian prisons. The report analyses the international and legal frameworks in the country which provide the foundation for policy formulations with regard to confinement of LGBT+ persons, with particular reference to the Transgender community. This report also documents the responses received to right to information requests filed to prison headquarters across the country, which in addition to providing the number of Transgender prisoners in Indian prisons between 1st May 2018 to 30th April 2019, also provides relevant information on compliance within prisons with existing legal frameworks relevant to protecting the rights of Transgender persons in prisons, especially in terms of recognition of a third gender, allocation of wards, search procedures, efforts towards capacity building of prison administrators etc. The finalisation of this report has involved an intense consultative process with individuals and experts, including representatives from the community, community-based organisations as well as researcher and academicians working on this issue. This report aims to enhance the understanding of these issues among stakeholders such as prison administrators, judicial officers, lawyers, legal service providers as well as other non-state actors. It is aimed at better informed policy making, and ensuring that decisions made with respect to LGBTI+ persons in prisons recognize and are sensitive of their rights and special needs.
2

Maley, William. Research as an Outsider: Positionality, Ethics, and Risk. RESOLVE Network, December 2021. http://dx.doi.org/10.37805/rve2021.7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Outsiders—or “foreigners”—who study violent extremism in affected countries can have multiple iden- tities as students of violent extremism, as students of the countries in question, and as “foreigners” to the contexts they study. They often have long-standing personal relationships with local community members and in some cases they have spent more time living in the countries they study than in their countries of nationality. Yet they inhabit an ambiguous space, being “insiders” in the eyes of some, and “outsiders” in the eyes of others. This ambiguity gives rise to both practical and ethical challenges in undertaking fieldwork. The following reflections draw on the author’s own experiences to illustrate some of the complexities associated with positionality, ethics, and risk as well as important considerations that all researchers should take into account when undertaking fieldwork in a country other than their own.
3

McNabb, David, and David Kenke. Thesis Review: Creating Appreciation and Community Support for Mothers Caring for a Child with Anxiety Disorder by Kristi Shaw. Unitec ePress, May 2022. http://dx.doi.org/10.34074/thes.revw5412.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Kristi Shaw has completed an exceptional piece of research, providing critical analysis and originality in her dissertation Creating appreciation and community support for mothers caring for a child with anxiety disorder. She has completed a substantial dissertation that would achieve the goal of a thesis at a higher credit level. Shaw’s inside knowledge of caring for a child with anxiety disorder has been applied to this project. The research involves an ambitious application of appreciative inquiry to the task of supporting a group of mothers to take action on the needs of their children with high anxiety. She has made a strong case for addressing the problem of people globally experiencing increasing levels of anxiety and targeting the unique challenges for parents who have children living with the ‘invisible’ impairment of anxiety.
4

Barowy, Adam, Alex Klieger, Jack Regan, and Mark McKinnon. UL 9540A Installation Level Tests with Outdoor Lithium-ion Energy Storage System Mockups. UL Firefighter Safety Research Institute, April 2021. http://dx.doi.org/10.54206/102376/jemy9731.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This report covers results of experiments conducted to obtain data on the fire and deflagration hazards from thermal runaway and its propagation through energy storage systems (ESS). The UL 9540A test standard provides a systematic evaluation of thermal runaway and propagation in energy storage system at cell, module, unit, and installation levels. The data from this testing may be used to design fire and explosion protection systems needed for safe siting and installation of ESS. In addition to temperature, pressure, and gas measurement instruments installed inside of the container, fire service portable gas monitors were placed at locations inside and outside the storage container during the experiments to assess their ability to detect products of thermal runaway and inform fire service size-up decisions. Review section 2.2.3 Fire Service Size-up Equipment to learn more. This research demonstrates a clear need for responding firefighters to have early access to data from instrumentation installed within an ESS, particularly gas measurement instrumentation, available through a monitoring panel. Additionally, it highlights the importance of communication between responding firefighters and personnel responsible for management of the ESS, who can aid in complete evaluation of system data to develop a more clear picture of system status and potential hazards.
5

Baader, Franz, Silvio Ghilardi, and Carsten Lutz. LTL over Description Logic Axioms. Technische Universität Dresden, 2008. http://dx.doi.org/10.25368/2022.164.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Most of the research on temporalized Description Logics (DLs) has concentrated on the case where temporal operators can occur within DL concept descriptions. In this setting, reasoning usually becomes quite hard if rigid roles, i.e., roles whose interpretation does not change over time, are available. In this paper, we consider the case where temporal operators are allowed to occur only in front of DL axioms (i.e., ABox assertions and general concept inclusion axioms), but not inside of concepts descriptions. As the temporal component, we use linear temporal logic (LTL) and in the DL component we consider the basic DL ALC. We show that reasoning in the presence of rigid roles becomes considerably simpler in this setting.
6

Chierichetti, Maria, Armin Chierichetti, and Fatemeh Davoudi. Design of an Evaluation Plan for Senate Bill 1046. Mineta Transportation Institute, July 2022. http://dx.doi.org/10.31979/mti.2021.2209.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In an effort to understand and decrease alcohol-impaired driving as a primary collision factor In California, the research team designed an evaluation plan for California Senate Bill 1046 and its focus on ignition interlock devices as a sentence for Driving Under Influence offense. This plan will evaluate whether Senate Bill 1046 affected the Driving Under the Influence crash frequency and severity, and whether sociodemographic and geographic factors influence its effectiveness. This report lays the foundation for the evaluation that will be conducted in 2024. The research team conducted a meta-analysis of the last 12 years of literature and research on ignition interlock programs inside and outside the United States. Based on the findings of this analysis, the recommended evaluation plan of the law revolves around three research questions that focus on the changes in the frequency/severity of DUI-related crashes in California, the impact of the law on recidivism and on interlock installation rates. To respond to these questions, the research team recommends a list of data that should be collected, such as the number of injuries and deaths resulting from alcohol-related motor vehicle accidents, installation rates of ignition interlocks compared to the prior five-year period, the number of individuals who were required to have an ignition interlock device installed who were convicted of an alcohol-related violation, as well as number of lockouts while an interlock is installed. The research team proposed several statistical approaches for the analysis of this data, such as descriptive statistics, time series analysis, analysis of variance, and logistic regression.
7

Chierichetti, Maria, Armin Chierichetti, and Fatemeh Davoudi. Design of an Evaluation Plan for Senate Bill 1046. Mineta Transportation Institute, July 2022. http://dx.doi.org/10.31979/mti.2022.2209.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In an effort to understand and decrease alcohol-impaired driving as a primary collision factor In California, the research team designed an evaluation plan for California Senate Bill 1046 and its focus on ignition interlock devices as a sentence for Driving Under Influence offense. This plan will evaluate whether Senate Bill 1046 affected the Driving Under the Influence crash frequency and severity, and whether sociodemographic and geographic factors influence its effectiveness. This report lays the foundation for the evaluation that will be conducted in 2024. The research team conducted a meta-analysis of the last 12 years of literature and research on ignition interlock programs inside and outside the United States. Based on the findings of this analysis, the recommended evaluation plan of the law revolves around three research questions that focus on the changes in the frequency/severity of DUI-related crashes in California, the impact of the law on recidivism and on interlock installation rates. To respond to these questions, the research team recommends a list of data that should be collected, such as the number of injuries and deaths resulting from alcohol-related motor vehicle accidents, installation rates of ignition interlocks compared to the prior five-year period, the number of individuals who were required to have an ignition interlock device installed who were convicted of an alcohol-related violation, as well as number of lockouts while an interlock is installed. The research team proposed several statistical approaches for the analysis of this data, such as descriptive statistics, time series analysis, analysis of variance, and logistic regression.
8

Roberts, Tony, and Kevin Hernandez. Open Data for Agriculture and Nutrition: A Literature Review and Proposed Conceptual Framework. Institute of Development Studies (IDS), January 2021. http://dx.doi.org/10.19088/ids.2021.018.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper begins by locating the Global Open Data for Agriculture and Nutrition project (GODAN) in the context of wider debates in the open data movement by first reviewing the literature on open data and open data for agriculture and nutrition (ODAN). The review identifies a number of important gaps and limitations in the existing literature. There has been no independent evaluation of who most benefits or who is being left behind regarding ODAN. There has been no independent evaluation of gender or diversity in ODAN or of the development outcomes or impacts of ODAN. The existing research on ODAN is over-reliant on key open data organisations and open data insiders who produce most of the research. This creates bias in the data and analysis. The authors recommend that these gaps are addressed in future research. The paper contributes a novel conceptual ‘SCOTA’ framework for analysing the barriers to and drivers of open data adoption, which could be readily applied in other domains. Using this framework to review the existing literature highlights the fact that ODAN research and practice has been predominantly supply-side focused on the production of open data. The authors argue that if open data is to ‘leave no one behind’, greater attention now needs to be paid to understanding the demand-side of the equation and the role of intermediaries. The paper argues that there is a compelling need to improve the participation of women, people living with disabilities, and other marginalised groups in all aspects of open data for agriculture and nutrition. The authors see a need for further research and action to enhance the capabilities of marginalised people to make effective use of open data. The paper concludes with the recommendation that an independent strategic review of open data in agriculture and nutrition is overdue. Such a review should encompass the structural factors shaping the process of ODAN; include a focus on the intermediary and demand-side processes; and identify who benefits and who is being left behind.
9

Lamont, Susan J., E. Dan Heller, and Avigdor Cahaner. Prediction of Immunocompetence and Resistance to Disease by Using Molecular Markers of the Major Histocompatibility Complex. United States Department of Agriculture, September 1994. http://dx.doi.org/10.32747/1994.7568780.bard.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This project utilized two live-animal populations in an integrated research program to identify molecular markers for immune response and disease resistance. The populations each had their foundation from meat-type commercial breeder chicken lines of their respective countries. Investigations effectively used unique availability of resources in each country to study commercial-type environments in Israel and line-crosses with diverse inbred lines in the US. Two bacterial systems were investigated to cover both respiratory and gastrointestinal, and primary and secondary, infections. Individual experimental groups of animals were evaluated for combinations of vaccine antibody levels, response to pathogen challenge, growth parameters, genetic background and molecular markers. The positive association of antibody level with resistance to disease was confirmed. Effectiveness of genetic selection for vaccine antibody response level was demonstrated. Molecular markers, both inside and outside the MHC region, were associated with antibody response and resistance to disease. Markers were shown to have a generalized effect, by association with multiple traits of immune response and disease resistance. The impact of genetic background on marker effect was shown to be important. The overall results demonstrate the effectiveness of selection on vaccine antibody response and the potential of molecular marker-assisted selection to improve efficiency of production of meat-type chickens by reducing genetic susceptibility to disease.
10

Sessa, Guido, and Gregory Martin. A functional genomics approach to dissect resistance of tomato to bacterial spot disease. United States Department of Agriculture, January 2004. http://dx.doi.org/10.32747/2004.7695876.bard.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The research problem. Bacterial spot disease in tomato is of great economic importance worldwide and it is particularly severe in warm and moist areas affecting yield and quality of tomato fruits. Causal agent of spot disease is the Gram-negative bacterium Xanthomonas campestris pv. vesicatoria (Xcv), which can be a contaminant on tomato seeds, or survive in plant debris and in association with certain weeds. Despite the economic significance of spot disease, plant protection against Xcvby cultural practices and chemical control have so far proven unsuccessful. In addition, breeding for resistance to bacterial spot in tomato has been undermined by the genetic complexity of the available sources of resistance and by the multiple races of the pathogen. Genetic resistance to specific Xcvraces have been identified in tomato lines that develop a hypersensitive response and additional defense responses upon bacterial challenge. Central goals of this research were: 1. To identify plant genes involved in signaling and defense responses that result in the onset of resistance. 2. To characterize molecular properties and mode of action of bacterial proteins, which function as avirulence or virulence factors during the interaction between Xcvand resistant or susceptible tomato plants, respectively. Our main achievements during this research program are in three major areas: 1. Identification of differentially expressed genes during the resistance response of tomato to Xcvrace T3. A combination of suppression subtractive hybridization and microarray analysis identified a large set of tomato genes that are induced or repressed during the response of resistant plants to avirulent XcvT3 bacteria. These genes were grouped in clusters based on coordinate expression kinetics, and classified into over 20 functional classes. Among them we identified genes that are directly modulated by expression of the type III effector protein AvrXv3 and genes that are induced also during the tomato resistance response to Pseudomonas syringae pv. tomato. 2. Characterization of molecular and biochemical properties of the tomato LeMPK3MAP kinase. A detailed molecular and biochemical analysis was performed for LeMPK3 MAP kinase, which was among the genes induced by XcvT3 in resistant tomato plants. LeMPK3 was induced at the mRNA level by different pathogens, elicitors, and wounding, but not by defense-related plant hormones. Moreover, an induction of LeMPK3 kinase activity was observed in resistant tomato plants upon Xcvinfection. LeMPK3 was biochemically defined as a dual-specificity MAP kinase, and extensively characterized in vitro in terms of kinase activity, sites and mechanism of autophosphorylation, divalent cation preference, Kₘand Vₘₐₓ values for ATP. 3. Characteriztion of molecular properties of the Xcveffector protein AvrRxv. The avirulence gene avrRxvis involved in the genetic interaction that determines tomato resistance to Xcvrace T1. We found that AvrRxv functions inside the plant cell, localizes to the cytoplasm, and is sufficient to confer avirulence to virulent Xcvstrains. In addition, we showed that the AvrRxv cysteine protease catalytic core is essential for host recognition. Finally, insights into cellular processes activated by AvrRxv expression in resistant plants were obtained by microarray analysis of 8,600 tomato genes. Scientific and agricultural significance: The findings of these activities depict a comprehensive and detailed picture of cellular processes taking place during the onset of tomato resistance to Xcv. In this research, a large pool of genes, which may be involved in the control and execution of plant defense responses, was identified and the stage is set for the dissection of signaling pathways specifically triggered by Xcv.

До бібліографії