• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 435
  • 260
  • 58
  • 53
  • 10
  • 10
  • 10
  • 10
  • 10
  • 10
  • 8
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 1074
  • 1050
  • 1046
  • 366
  • 354
  • 353
  • 353
  • 353
  • 353
  • 153
  • 139
  • 99
  • 69
  • 64
  • 61
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
551

Obsessive-Compulsive Personality Traits in Law Enforcement

Holtgrave, Vanessa M. 07 February 2015 (has links)
<p> This research provides original data on the study of obsessive-compulsive personality traits in law enforcement. The study explored prevalence of obsessive-compulsive personality traits (OCPT) in law enforcement (compared to the general population) in association with the occupational need for such characteristics in that profession (orderliness, organized, attentive to detail, display restricted affect, adhere to laws and regulations, and assume leadership roles). While many studies seek to explain police personality, no literature could be found regarding prevalence of OCPT in sworn peace officers. Degree of OCPT was measured by the total mean score on the Five Factor Obsessive-Compulsive Inventory (FFOCI) and compared using a one-tailed independent samples t-test. Differences between two groups across 12 subscales were analyzed retroactively using a MANOVA for qualitative descriptions of each group. Research revealed, with statistically significant results (p&lt;.01), that prevalence of OCPT is significantly higher overall in law enforcement peace officers when compared to non-law enforcement participants. Results from this study contribute meaningfully to police psychology within the field of forensic psychology. Results have the potential to influence supplemental assessment for peace officer candidacy screening.</p>
552

Addressing the cybersecurity Malicious Insider threat

Schluderberg, Larry E. 01 January 2015 (has links)
<p> Malicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's critical information and have intentionally misused that access in a manner that compromised the organization. Although incidents initiated by malicious insiders are fewer in number than those initiated by external threats, insider incidents are more costly on average because the threat is already trusted by the organization and often has privileged access to the organization's most sensitive information. In spite of the damage they cause there are indications that the seriousness of insider incidents are underappreciated as threats by management. The purpose of this research was to investigate who constitutes MI threats, why and how they initiate attacks, the extent to which MI activity can be modeled or predicted, and to suggest some risk mitigation strategies. The results reveal that addressing the Malicious Insider threat is much more than just a technical issue. Dealing effectively with the threat involves managing the dynamic interaction between employees, their work environment and work associates, the systems with which they interact, and organizational policies and procedures. Techniques for detecting and mitigating the threat are available and can be effectively applied. Some of the procedural and technical methods include definition of, follow through, and consistent application of corporate, and dealing with adverse events indigenous to the business environment. Other methods include conduct of a comprehensive Malicious Insider risk assessment, selective monitoring of employees in response to behavioral precursors, minimizing unknown access paths, control of the organization's production software baseline, and effective use of peer reporting.</p><p> Keywords: Cybersecurity, Professor Paul Pantani, CERT, insider, threat, IDS, SIEMS. FIM, RBAC, ABAC, behavioral, peer, precursors, access, authentication, predictive, analytics, system, dynamics, demographics.</p>
553

Statutory Response to Court Security Concerns

Weller, Charles E. 26 February 2014 (has links)
<p> This paper proposes that legislation should be used to reduce the occurrence of courthouse violence. It begins with a review of what is known about the nature and costs of court targeted and non-targeted violence, drawing on published materials of the U.S. Marshals Service, the U.S. Secret Service, the Center for Judicial and Executive Security, and others. Previously unpublished materials are also reported. Court security efforts made in response to the violence are described. In the absence of empirical studies of the effectiveness of court security laws, the paper suggests that theories of criminology be used as guides for assessing the effectiveness of existing legislation and formulating new legislation. Criminological theories, including classical theory, rational choice theory, strain theory, and routine activity theory are discussed as models appropriate for use in evaluating court security legislation. Existing state and federal laws on paper terrorism, including false liens and U.C.C. filings; address confidentiality programs; and enhanced punishments for crimes against those involved in the judicial process are described, catalogued, and analyzed.</p>
554

The treatment of women who kill their violent male partners within the Australian criminal justice system

Bradfield, RJ Unknown Date (has links) (PDF)
My thesis examines the treatment of women who kill their violent male partners within the Australian criminal justice system. The primary aim of my study is to examine the circumstances in which women kill their violent partners and to explore the ability of the criminal law to have proper regard to these circumstances. The interaction between the criminal law and battered women who kill their violent partners is a topical issue that has generated substantial interest and debate in many western countries. My thesis provides an empirical study detailing the legal outcome and circumstances of the killing in the 76 cases identified where women have killed their male partner. In the context of these findings, I examine reliance on the various defences to murder (diminished responsibility, provocation, lack of the requisite intent for murder, self-defence, insanity and automatism). The argument advanced is that the current approach of the Australian criminal justice system to battered women who kill reveals sympathy for their situation, but a failure to adequately consider whether these circumstances provide the basis for self-defence. I examine the procedural rules that interact with the substantive law of self-defence to constrain a battered woman's ability to convey the reality of her experience of violence to the fact-finder. In facilitating reliance on self-defence, I propose a shift in the current evidentiary approach to battered women who kill from the 'battered woman syndrome' framework to the reception of social framework evidence in its own right. My thesis also includes a consideration of the judicial approach in sentencing women who kill their violent partners. My analysis suggests that there is sympathy for the woman's situation, however there is not an adequate recognition of the mitigatory impact of a history of violence. The dominant judicial approach to mitigation appears to be premised according to principles of 'mercy' and 'sympathy' for women who can position themselves as the 'appropriate victim'. Although focusing on the Australian criminal justice system, my thesis has potential application beyond this context.
555

The validity of the MMPI-A in the assessment of substance abuse/dependence in adolescents; and a comparative study of the psychological functioning of substance abusing/dependent adolescents and incarcerated juvenile delinquents /

Radella, Karen. Unknown Date (has links)
Thesis (Ph.D.)--Pacific Graduate School of Psychology, 1994. / Source: Dissertation Abstracts International, Volume: 55-05, Section: B, page: 2015. Chair: Frances Campbell-LaVoie.
556

Multigenerational transmission of incest and the role of the mother /

Brison, Nancy Lynn. Unknown Date (has links)
Thesis (Ph.D.)--Pacific Graduate School of Psychology, 1994. / Source: Dissertation Abstracts International, Volume: 56-01, Section: B, page: 0517. Chair: Nancy Bliwise.
557

Degree of lateralization in juvenile delinquents /

Heller, Lawrence D. Unknown Date (has links)
Thesis (Ph.D.)--Pacific Graduate School of Psychology, 1997. / Source: Dissertation Abstracts International, Volume: 58-02, Section: B, page: 0998.
558

A Rorschach investigation of incarcerated female psychopaths /

Cunliffe, Edward (Ted) Bruce. Unknown Date (has links)
Thesis (Ph.D.)--Pacific Graduate School of Psychology, 2002. / Source: Dissertation Abstracts International, Volume: 63-02, Section: B, page: 1058. Chair: Stephen Hibbard.
559

Relationships between ethnic identity, trauma symptoms, and juvenile delinquency /

Bruce, Elizabeth J. Unknown Date (has links)
Thesis (Ph.D.)--Pacific Graduate School of Psychology, 2005. / Source: Dissertation Abstracts International, Volume: 66-06, Section: B, page: 3398. Adviser: Lynn C. Waelde.
560

Judgment days: On domestic violence, battered women and children, and a liberal court.

Schulz, Anke Therese. Unknown Date (has links)
Thesis (Ph.D.)--University of California, San Francisco, 2005. / Source: Dissertation Abstracts International, Volume: 66-12, Section: A, page: 4537. Adviser: Charlene Harrington.

Page generated in 0.0474 seconds