Spelling suggestions: "subject:"deviant behavior"" "subject:"beviant behavior""
1 |
A review of behaviour disorder and the use of the Carlson Psychological Survey (CPS) as a diagnostic screening instrument in the forensic setting /Black, Quentin, January 1993 (has links) (PDF)
Thesis (M. App. Psych.)--University of Adelaide, Dept. of Psychology, 1994? / Includes bibliographical references (leaves 85-115).
|
2 |
Deviance among professionals in dispersed organizationsCray, David, January 1975 (has links)
Thesis (M.A.)--University of Wisconsin--Madison, 1975. / eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references.
|
3 |
Deviant driving behaviour : an epidemiological studyKhoza, Vukayibambe Isaac January 2004 (has links)
A thesis submitted to the Faculty of Arts in fulfilment of the requirements for the Degree of Doctor of Philosophy in the Department of Criminal Justice at the University of Zululand, 2004. / This research is based on an epidemiological study of deviant driving behaviour. The data collection phase implemented a self-report survey to capture data on deviant driving behaviour. The study seeks to establish:
• Differences between deviant driving behaviour and respondents' demographic characteristics: gender, race, marital status, occupation, regularity of driving and type of motor vehicle usually driven.
• Relationships between deviant driving behaviour and respondents' age, education, income, duration of passing a formal driving test and the period a motor vehicle has been driven.
• Whether aggressive and anxious drivers do commit traffic offences more regularly than other drivers.
• The differential rating of selected aspects of traffic policing.
Research techniques implemented, include:
• A literature study of deviant driving behaviour, reflecting various theoretical approaches to the referent object
• A measuring instrument (questionnaire), capturing various theoretical constructs and, as such, makes provision for a checklist of deviant driving behaviour in the form of seven statistical scales.
• Non-probability sampling through which 722 respondents were selected and included in the study.
• Statistical tests of reliability of the measuring instrument and four hypotheses.
Statistical findings indicate the following:
• Sisnificant sender differences in self-reported deviant drivins behaviour. Male respondents reported the highest scores of aggression; females reported the highest scores of anxiety in driving activities.
• Deviant driving behaviour differs significantly according to respondents' race and marital status.
• Professional drivers featured predominantly in aggressive and offensive driving behaviour, document offences and the operation of defective vehicles.
• Deviant driving behaviour differs significantly according to respondents' driving experience (regularity of motor vehicle driving and type of vehicle).
• Significant relationships exist between deviant driving behaviour and respondents' age, education, income, duration of passing a formal driving test and the period a vehicle has been driven. Relationships assume both positive and negative directions. The correlation between anxiety and number of years a vehicle has been driven, is not significant
• Drivers who display signs of aggressive and anxious driving behaviour, do commit traffic offences. Positive relationships exist between aggressive-anxious approaches and informal driver training. Positive correlations exist between traffic (driving) offences, document offences and the operation of defective motor vehicles and aggressive behaviour.
• No significant correlations have been observed between deviant driving behaviour and informal driver training.
Differentiai rating of traffic policing according respondents' education, race, occupation, income, etc., is also observed.
Traffic officers' susceptibility to bribery creates a particular problem for authorities.
The following non-prescriptive recommendations are entertained:
Enhancement of formal driving tests, driver training and traffic education.
Disposal of convicted deviant drivers by criminal courts.
Pedestrian education.
Surcharge.
Periodic inspections of motor vehicles. Provision for. more traffic officer employment Prevention of corruption (bribery) in the traffic situation. Establishment of a Road Traffic Infringement Agency. Road engineering. Future research.
The study succeeded in revealing "hidden" deviant driving behaviour among respondents who reside in the jurisdiction of the uMhlathuze Qty Council and adjacent areas.
|
4 |
Relationships between deviant personality traits and clothing behavior of male adolescents attending Junction City High SchoolKiebler, Carolyn Ann January 2011 (has links)
Digitized by Kansas State University Libraries
|
5 |
Child therapy and the processing of deviant childrenKiger, Gary, 1953- January 1978 (has links)
No description available.
|
6 |
A review of behaviour disorder and the use of the Carlson Psychological Survey (CPS) as a diagnostic screening instrument in the forensic settingBlack, Quentin, 1962- January 1993 (has links) (PDF)
Bibliography : leaves 85-115
|
7 |
A deductive theory of deviance /Bader, Christopher David. January 2002 (has links)
Thesis (Ph. D.)--University of Washington, 2002. / Vita. Includes bibliographical references (leaves 326-352).
|
8 |
Information security deviant behavior: its typology, measures, and causesChu, Man-ying., 朱文英. January 2012 (has links)
Although information security is important to all organizations, little
behavioral research has been carried out in this area. Particularly lacking is research
on negative forms of behavior involved in information security. The aim of this thesis
is to fill this research gap by conducting three related studies on information security
deviant behavior (ISDB), which refers to the voluntary behavior of employees within
organizations that differs markedly from the information security norms of the
organizations and that is normally considered by other employees to be wrong.
Prior research work on this topic is insufficient, and the information security
deviance concept remains unclear. This thesis explores the topic by considering three
fundamental research questions: 1) What is ISDB? 2) How can ISDB be measured? 3)
Why do employees commit ISDB?
Study I addresses the first question—“What is ISDB?”—by identifying and
organizing ISDB using a typology. A four-step method, comprising content analysis,
multidimensional scaling, expert judgmental analysis, and empirical testing, is
proposed for the development of typologies, which can fulfill the criteria for being a
theory. The findings of this study suggest that ISDB can be organized into four ideal
types that are interrelated along two dimensions—severity and frequency. Four
constructs are identified from this typology. They are resource misuse (“high
frequency, high severity” deviance), security carelessness (“high frequency, low
severity” deviance), access control deviance (“low frequency, low severity” deviance),
and system protection deviance (“low frequency, high severity” deviance). Study I not
only develops an organized and theoretical framework for systematic research on
ISDB and constitutes a critical starting point for the development of measures of the
behavior, but also makes an important theoretical contribution by demonstrating the
development of a typology, which is a unique form of theory building for an
underdeveloped topic.
Study II focuses on the second research question—“How can ISDB be
measured?”—by developing valid and reliable scales to measure ISDB. My target is
to develop scales to measure commonly found types of ISDB using an empirical
method. Accordingly, the two “low frequency” types of deviance, access control and
system protection deviance, are omitted from consideration. A rigorous measurement
development process which includes three surveys and a number of tests is adopted. A
four-item scale of resource misuse and a three-item scale of security carelessness are
developed. The development of these two scales makes an important contribution to
future ISDB research by providing a means to measure two types of information
security deviance, thus facilitating the empirical study of ISDB.
Study III is aimed at answering the third research question—“Why do
employees commit ISDB?”—through construction of a causal model. Rather than
consider “intention” as existing behavioral research on information security
commonly does, Study III investigates actual behavior and employs resource misuse
(“high frequency, high severity” deviance) as the dependent variable. Data from a
Web-based survey are analyzed using the partial least squares approach. Considering
the dual-process approach in the theory of planned behavior, the findings suggest that
resource misuse may be both an intentional type of behavior and an unreasoned action.
Perceived behavioral control influences employees’ resource misuse actions via their
desires or intentions, whereas attitude toward resource misuse affects these actions via
employees’ desires alone. Subjective norm is found not to affect employees’ resource
misuse via either desires or intentions. In terms of the theoretical contributions, Study
III takes steps to consider information security deviance by incorporating the
dual-process approach and the theory of planned behavior. In terms of managerial
significance, the results of Study III can help managers to better understand why
employees commit resource misuse.
In conclusion, this thesis provides a number of significant insights into ISDB
and useful guidelines for further research on the topic. In addition, the findings of the
three studies can help managers to develop better company strategies and policies to
reduce internal security threats. / published_or_final_version / Business / Doctoral / Doctor of Philosophy
|
9 |
Child therapy and the processing of deviant childrenKiger, Gary, 1953- January 1978 (has links)
No description available.
|
10 |
Deviance and aspirations in adolescence : the influence of school absenteeism, drug use and mental disorder on educational and occupational aspirationsCrespo, Manuel January 1977 (has links)
No description available.
|
Page generated in 0.0642 seconds