• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 96
  • 34
  • 30
  • 16
  • 9
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 236
  • 64
  • 35
  • 31
  • 27
  • 26
  • 22
  • 18
  • 18
  • 17
  • 15
  • 15
  • 15
  • 14
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

An approach to alcoholism for the clergy

Cox, Christopher William. January 1989 (has links)
Thesis (S.T.M.)--Yale Divinity School, 1989. / Includes bibliographical references (leaves 90-92).
52

An approach to alcoholism for the clergy

Cox, Christopher William. January 1989 (has links)
Thesis (S.T.M.)--Yale Divinity School, 1989. / Includes bibliographical references (leaves 90-92).
53

A new members' class using the 12 steps of Alcoholics Anonymous

Chamberlain, Linwood H. January 1994 (has links)
Thesis (D. Min.)--Ashland Theological Seminary, 1994. / Abstract. Includes bibliographical references (leaves 202-210).
54

Considering the myth of the drunken Indian /

Chanteloup, Francoise January 1900 (has links)
Thesis (Ph.D.) - Carleton University, 2002. / Includes bibliographical references (p. 167-179). Also available in electronic format on the Internet.
55

A smooth transition from the "higher power" of Alcoholics Anonymous (AA) to the religious spirituality of Christianity can be achieved in the lives of the recovering Catholic patients in the detoxification unit at the Serenity Hall, Bedford, by effecting a commitment to Christ and Biblical principles and principles of Catholicism

Kannamthanam, Sebastian J. January 1992 (has links)
Thesis (D. Min.)--Ashland Theological Seminary, 1992. / Abstract. Includes bibliographical references (leaves 283-293).
56

Understanding and preaching about recovery from a twelve step perspective

Young, Sarah Marie. January 1900 (has links)
Project (D. Min.)--Iliff School of Theology, 2006. / Includes abstract. Includes bibliographical references (leaves 107-109).
57

Purpose in life, religiosity, social support, and program involvement as predictors of sobriety in Alcoholics Anonymous participants /

Rocco, Joanna. January 1900 (has links)
Thesis (M.A.)--Humboldt State University, 2007. / Includes bibliographical references (leaves 78-92). Also available via Humboldt Digital Scholar.
58

HOW DOES ALCOHOLICS ANONYMOUS AFFECT DRINKING OUTCOMES? A GROUNDED THEORY PERSPECTIVE

boyles, bryan 01 January 2017 (has links)
The mutual aid of Alcoholics Anonymous helps more people with alcohol-related problems than all forms of clinical treatment combined. Yet, efforts to understand AA’s action have been conducted, almost exclusively, from a clinical perspective. Thus far, the literature representing Alcoholics Anonymous from the perspective of its members is very limited. This study uses qualitative content analysis of the AA literature and a grounded theory approach to AA’s fellowship to provide an insider’s perspective of change processes associated with AA involvement. This understanding of the AA literature posits that Alcoholics Anonymous involvement results in life improvement, changes in spirituality, improved well-being, an acceptance of powerlessness over alcohol and a sense of fellowship. This understanding of AA’s fellowship posits that Alcoholics Anonymous involvement results in increased life meaning, reduced insecurity, loneliness, anxiety and shame.
59

Bitcoin Transaction Tracing and Purchasing Behavior Characterization of Online Anonymous Marketplaces Using Side Channels

Garcia, Eugene Lemuel R. 01 December 2017 (has links)
We investigate to which degree one could trace Bitcoin transactions and characterize purchasing behavior of online anonymous marketplaces by exploiting side channels. Using a list of addresses found by the FBI on Silk Road servers, and information on the marketplace's official guides, we infer the role played by each address in the list and classify them based on heuristics. We then attempt to trace Bitcoin transactions and show that the anonymity set size is greatly reduced using product review data and the address classification performed on the previous step. Finally, using clustering techniques based on transaction graph analysis, we assign addresses into user wallets, then group these wallets together based on spending patterns, to be able to characterize purchasing behavior.
60

Polar: proxies collaborating to achieve anonymous web browsing

Tillwick, Heiko Mark 05 July 2007 (has links)
User tracking and profiling is a growing threat to online privacy. Whilst Internet users can choose to withhold their personal information, their Internet usage can still be traced back to a unique IP address. This study considers anonymity as a strong and useful form of privacy protection. More specifically, we examine how current anonymity solutions suffer from a number of deficiencies: they are not commonly used, are vulnerable to a host of attacks or are impractical or too cumbersome for daily use. Most anonymity solutions are centralised or partially centralised and require trust in the operators. It is additionally noted how current solutions fail to promote anonymity for common Web activities such as performing online search queries and general day-to-day Web browsing. A primary objective of this research is to develop an anonymising Web browsing protocol which aims to be (1) fully distributed, (2) offer adequate levels of anonymity and (3) enable users to browse the Internet anonymously without overly complex mixing techniques. Our research has led to an anonymising protocol called Polar. Polar is a peer-to-peer network which relays Web requests amongst peers before forwarding it to a Web server, thus protecting the requester's identity. This dissertation presents the Polar model. Design choices and enhancements to the model are discussed. The author's implementation of Polar is also presented demonstrating that an implementation of Polar is feasible. / Dissertation (MSc (Computer Science))--University of Pretoria, 2007. / Computer Science / unrestricted

Page generated in 0.0512 seconds