1 |
Det finns en hel karta av påverkansmetoder : Gymnasieelevers påtryckningar i betygssättningsprocessenKlerkefors, Sarah January 2007 (has links)
<p>The setting of pupils' final grades in the Swedish upper secondary school system is the responsibility of their teachers and once grades are set, they are not open to appeal. This can be compared with the British system where an external, central examination board sets the final grades based on the result of externally marked examinations (A-levels). These grades are then open to appeal if it is felt that an injustice has been made.</p><p>This research paper has been an investigation into how pupils in one Swedish upper secondary school attempt to influence their teachers in the grade-setting process and how these teachers are affected by these different methods. Five teachers in total were interviewed in a qualitative case study. The study has also taken up the controversial issue of how grades, which are set individually by thousands of teachers across the country, can be deemed to be fair and equivalent.</p><p>The study revealed that pupils employ many different methods when trying to influence their teachers in the grade-setting process e.g. bribery and negotiation, threats of physical violence, psychological pressure and blackmail as well as flattery. It was established though, that out of all the interviewed teachers, not one of them claimed to have been influenced by the pupils' behaviour. However, all the teachers admitted that their emotional wellbeing was affected negatively in one way or another by the psychological strain.</p><p>Finally, whilst the study showed that the interviewed teachers set grades fairly and equivalently in that they were not influenced by the pupils' behaviour, none of them believed that the system had a chance of functioning effectively on a nationwide basis due to grading discrepancies occurring between teachers and schools.</p>
|
2 |
Det finns en hel karta av påverkansmetoder : Gymnasieelevers påtryckningar i betygssättningsprocessenKlerkefors, Sarah January 2007 (has links)
The setting of pupils' final grades in the Swedish upper secondary school system is the responsibility of their teachers and once grades are set, they are not open to appeal. This can be compared with the British system where an external, central examination board sets the final grades based on the result of externally marked examinations (A-levels). These grades are then open to appeal if it is felt that an injustice has been made. This research paper has been an investigation into how pupils in one Swedish upper secondary school attempt to influence their teachers in the grade-setting process and how these teachers are affected by these different methods. Five teachers in total were interviewed in a qualitative case study. The study has also taken up the controversial issue of how grades, which are set individually by thousands of teachers across the country, can be deemed to be fair and equivalent. The study revealed that pupils employ many different methods when trying to influence their teachers in the grade-setting process e.g. bribery and negotiation, threats of physical violence, psychological pressure and blackmail as well as flattery. It was established though, that out of all the interviewed teachers, not one of them claimed to have been influenced by the pupils' behaviour. However, all the teachers admitted that their emotional wellbeing was affected negatively in one way or another by the psychological strain. Finally, whilst the study showed that the interviewed teachers set grades fairly and equivalently in that they were not influenced by the pupils' behaviour, none of them believed that the system had a chance of functioning effectively on a nationwide basis due to grading discrepancies occurring between teachers and schools.
|
3 |
Problematika organizovaného zločinu / Issues in organized crimeFiala, Adam January 2013 (has links)
Name: Issues in organized crime Aims of the thesis: 1. To define and classify organized crime 2. To describe historical development of organized crime 3. To analyze organized crime in the states where its presence has become evident i.e. Italy, USA, Russia and Japan 4. To characterize the main activities of organized crime 5. To define the means of fighting organized crime Methods: When analyzing organized crime, it is impossible to use research methods that would comprise direct contact with a criminal environment. Indirect evidence was used to compile the thesis. Methods of research: 1. The use of information from publications 2. Analysis of documents 3. Research into selected legal means of fighting organized crime 4. Content analysis of the press 5. Statistics Results: Various views on organized crime, its features and its typology have been defined. Its causes and the conditions under which organized crime arises, as well as its beginnings, were described. Findings about organized crime in selected countries were analyzed; attention was drawn to history, the present day and occurrences and activities of the main organized groups. The main activities of organized crime were described in four groups, focusing on their description, organization and the legal issues. Eventually, possible means of...
|
4 |
The Dark Flows of Cryptocurrency : an overview of money flow behaviors in Bitcoin transactions related to online criminal activities and Bitcoin mixersOlsson, Anton, Andersson, Daniel January 2024 (has links)
The decentralized and pseudonymous nature of cryptocurrencies like Bitcoin has made it easier for criminal entities to engage in illicit activities online compared to relying on traditional currency systems. Detecting these activities is vital to preventing and combating such abuse. We employ a data collection tool based on a Depth First Search algorithm to follow the largest receivers from 10 illicit starting addresses in each abuse type; Darknet, Blackmail, Tumbler, and Ransomware. The results from our two searches showed that money tends to be concentrated to one or two receivers and that all abuse types rely heavily on so-called Two-Transaction addresses. These addresses are only used once, likely as intermediaries to obfuscate money flow, potentially within the inner layer of Bitcoin Tumblers. The results also showed behaviors within the abuse types that were both consistent with and divergent from existing research. Furthermore, similarities and unique behaviors across the abuse types were identified. Expanding the dataset with deeper searches could yield clearer patterns in money flow behavior. Additionally, increasing the number of data collection points could enhance the analysis. Finally, the starting addresses significantly impacted the trustworthiness and reliability of our results. We hope our findings, lessons, and developed tools will aid future research and the development of strategies to combat online abuse.
|
Page generated in 0.0405 seconds