Spelling suggestions: "subject:"honest"" "subject:"commonest""
1 |
Faculty Response to Academic Dishonesty in the Classroom at a Four-Year Public InstitutionSmith, Laura Trahan 05 1900 (has links)
Academic dishonesty is prevalent in institutions of higher education. Faculty are at the forefront of this issue as they are in the classroom with the students. However, faculty may be hesitant to address academic dishonesty for a myriad of reasons. The purpose of this qualitative exploratory case study was to explore how faculty members viewed their roles in addressing academic dishonesty. Study participants were 11 full-time faculty from a Southern University who had taught for at least two years and had experienced academic dishonesty in the classroom. Artifacts were also gathered from three documentary sources. Four major themes emerged from the data: (a) faculty investment in academic integrity, (b) faculty-student relationship impact on interaction, (c) personal values guiding faculty response, and (d) deterrents preventing faculty action. Several implications included the need for: (i) ongoing professional development opportunities for faculty, (ii) the creation of shared ownership and governance of academic integrity between faculty and university leadership; (iii) consistent prevention and enforcement of academic dishonesty according to university guidelines, and (iv) the creation of a partnership between the conduct office and the various faculty departments.
|
2 |
Enhancing dynamic recommender selection using multiple rules for trust and reputation models in MANETsShabut, Antesar R.M., Dahal, Keshav P., Awan, Irfan U. January 2013 (has links)
No
|
3 |
Recommendation based trust model with an effective defence scheme for MANETsShabut, Antesar R.M., Dahal, Keshav P., Bista, Sanat K., Awan, Irfan U. January 2015 (has links)
Yes / The reliability of delivering packets through multi-hop intermediate nodes is a significant issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes establish connections to form the MANET, which may include selfish and misbehaving nodes. Recommendation based trust management has been proposed in the literature as a mechanism to filter out the misbehaving nodes while searching for a packet delivery route. However, building a trust model that relies on the recommendations from other nodes in the network is vulnerable to the possible dishonest behaviour, such as bad-mouthing, ballot-stuffing, and collusion, of the recommending nodes. . This paper investigates the problems of attacks posed by misbehaving nodes while propagating recommendations in the existing trust models. We propose a recommendation based trust model with a defence scheme that utilises clustering technique to dynamically filter attacks related to dishonest recommendations within certain time based on number of interactions, compatibility of information and node closeness. The model is empirically tested in several mobile and disconnected topologies in which nodes experience changes in their neighbourhoods and consequently face frequent route changes. The empirical analysis demonstrates robustness and accuracy of the trust model in a dynamic MANET environment.
|
4 |
Postoje žáků ke školnímu podvádění. / Attitudes of pupils to school cheating.Vodrážková, Jana January 2018 (has links)
The diploma thesis is focused on the research of school cheating in pupils of the second level of elementary schools. Based on a self-reporting questionnaire survey, the aim of the thesis is to find out what motivates the pupils to cheat and what attitude they take to possibly punish detected fraud. Another goal is to find out the frequency of individual types of school cheating, the influence of gender and the learning benefit of school cheating. It has been found that pupils are relatively often used in cheating on the internet at the primary school. Also, there was greater tolerance for cheating when pupils do not attach the importance of punishment for an exposed fraud, rather they would not punish their exposed classmates. Key words: dishonest behavior, unusual cheating, electronic cheating, elementary school pupils, motivation to cheat
|
5 |
Trust computational models for mobile ad hoc networks : recommendation based trustworthiness evaluation using multidimensional metrics to secure routing protocol in mobile ad hoc networksShabut, Antesar Ramadan M. January 2015 (has links)
Distributed systems like e-commerce and e-market places, peer-to-peer networks, social networks, and mobile ad hoc networks require cooperation among the participating entities to guarantee the formation and sustained existence of network services. The reliability of interactions among anonymous entities is a significant issue in such environments. The distributed entities establish connections to interact with others, which may include selfish and misbehaving entities and result in bad experiences. Therefore, trustworthiness evaluation using trust management techniques has become a significant issue in securing these environments to allow entities decide on the reliability and trustworthiness of other entities, besides it helps coping with defection problems and stimulating entities to cooperate. Recent models on evaluating trustworthiness in distributed systems have heavily focused on assessing trustworthiness of entities and isolate misbehaviours based on single trust metrics. Less effort has been put on the investigation of the subjective nature and differences in the way trustworthiness is perceived to produce a composite multidimensional trust metrics to overcome the limitation of considering single trust metric. In the light of this context, this thesis concerns the evaluation of entities’ trustworthiness by the design and investigation of trust metrics that are computed using multiple properties of trust and considering environment. Based on the concept of probabilistic theory of trust management technique, this thesis models trust systems and designs cooperation techniques to evaluate trustworthiness in mobile ad hoc networks (MANETs). A recommendation based trust model with multi-parameters filtering algorithm, and multidimensional metric based on social and QoS trust model are proposed to secure MANETs. Effectiveness of each of these models in evaluating trustworthiness and discovering misbehaving nodes prior to interactions, as well as their influence on the network performance has been investigated. The results of investigating both the trustworthiness evaluation and the network performance are promising.
|
6 |
Trust Computational Models for Mobile Ad Hoc Networks. Recommendation Based Trustworthiness Evaluation using Multidimensional Metrics to Secure Routing Protocol in Mobile Ad Hoc Networks.Shabut, Antesar R.M. January 2015 (has links)
Distributed systems like e-commerce and e-market places, peer-to-peer networks, social networks, and mobile ad hoc networks require cooperation among the participating entities to guarantee the formation and sustained existence of network services. The reliability of interactions among anonymous entities is a significant issue in such environments. The distributed entities establish connections to interact with others, which may include selfish and misbehaving entities and result in bad experiences. Therefore, trustworthiness evaluation using trust management techniques has become a significant issue in securing these environments to allow entities decide on the reliability and trustworthiness of other entities, besides it helps coping with defection problems and stimulating entities to cooperate. Recent models on evaluating trustworthiness in distributed systems have heavily focused on assessing trustworthiness of entities and isolate misbehaviours based on single trust metrics. Less effort has been put on the investigation of the subjective nature and differences in the way trustworthiness is perceived to produce a composite multidimensional trust metrics to overcome the limitation of considering single trust metric. In the light of this context, this thesis concerns the evaluation of entities’ trustworthiness by the design and investigation of trust metrics that are computed using multiple properties of trust and considering environment.
Based on the concept of probabilistic theory of trust management technique, this thesis models trust systems and designs cooperation techniques to evaluate trustworthiness in mobile ad hoc networks (MANETs). A recommendation based trust model with multi-parameters filtering algorithm, and multidimensional metric based on social and QoS trust model are proposed to secure MANETs. Effectiveness of each of these models in evaluating trustworthiness and discovering misbehaving nodes prior to interactions, as well as their influence on the network performance has been investigated. The results of investigating both the trustworthiness evaluation and the network performance are promising. / Ministry of Higher Education in Libya and the Libyan Cultural Attaché bureau in London
|
7 |
L'Église catholique et les pouvoirs dans le diocèse de Saint-Denis de la Réunion de 1911 à 1981 / The Catholic Church and the political Powers in Saint-Denis diocese in Reunion Island from 1911 to 1981Turpin, Éric Bernard 29 November 2010 (has links)
Le décret du 6 février 1911 applique dans les colonies de la Martinique, de la Guadeloupe et de La Réunion la loi de Séparation des Églises et de l'État du 9 décembre 1905. Cette séparation, franche, donne à l'institution religieuse sa liberté, puisqu'elle ne se trouve plus sous la dépendance financière et juridique de l'autorité publique. Si la question des retraites et des inventaires des biens se déroule assez rapidement et sans drame majeur, sauf à Saint-Gilles-les-Hauts, l'attribution des biens mobiliers et immobiliers ayant appartenu aux établissements ecclésiastiques ne sera résolue que sous le régime de Vichy et dans les premières années de la IVème République. Après le temps de la passion liée à l'application de la loi, vient le temps de l'Entente cordiale après la Grande Guerre sous l'épiscopat de Monseigneur de Beaumont. Celle qui devait être l'Absente redevient fortement présente dans la société coloniale puis postcoloniale, dans le cadre d'un respect mutuel. L'Église connaît, durant cette période, un acte audacieux (lutte contre la fraude lors des élections d'avril 1936), un soutien allant jusqu'à la compromission avec le régime de Vichy, et la lutte contre le communisme, surtout après la Seconde Guerre mondiale. Les années soixante et soixante-dix sont le temps de l'Affirmation (combat contre la fraude électorale, lutte pour la régulation naturelle des naissances, critique du projet et du modèle de développement économique et social mais aussi propositions alternatives) et de l'Émancipation qui passe par des déchirures internes, souvent parallèles à la société, et par la mise en échec de toutes les manipulations, qu'elles soient anciennes (la Droite) ou nouvelles (le Parti Communiste Réunionnais). Dans les années soixante-dix, Monseigneur Gilbert Aubry, l'actuel évêque, achève l'émancipation de l'institution commencée dans la décennie précédente. De 1911 à 1981, l'Église catholique à La Réunion passe de la Séparation d'avec l'État à l'Émancipation. / The decree of February 6th 1911 applies the law of December 9th 1905 to separate the Church and the State in the French colonies of Martinique, Guadeloupe and Reunion. This complete separation gives to the religious institution its freedom since it is not under the financial and juridic dependence of public authority anymore. Even if the issues of retirement and inventory of goods take place quite quickly and without any major incident, except in Saint-Gilles-les-Hauts, the retribution of personal properties and real estates belonging to the ecclesiastical establishments will only be solved during the Vichy Administration and in the beginning of the 4th Republic.After the time of passion linked to the application of the law will come the time of cordial Agreement right after the World War 1 during the episcopate of his Lordship de Beaumont. The Church, which was supposed to be the Absente would then be present in the colonial on to the postcolonial society, on a mutual respect basis. During this period, the Church made a bold act (the fight against fraud for the elections of April 1936), a support going to the dishonest compromise with the Vichy Administration, and the struggle against Communism, especially after World War 2. The sixties and the seventies would be the time of Assertion (the fight against electoral fraud, the struggle for natural birth regulation, criticism of the economic and social project and model but also alternative propositions) and also a time of Emancipation not without any domestic tearing, often linked to Society, and finally a time for the check of all sorts of manipulations, whether old ones (the right wing) or new ones (the Communist Party of Reunion).In the 70s, his Lordship Gilbert Aubry, the actual bishop, finishes off the process of emancipation of the Church that had started ten years before. From 1911 to 1981 the Catholic Church in Reunion Island would go from the Separation with the State to Emancipation.
|
8 |
論營業秘密法之不可避免揭露原則 / Inevitable Disclosure Doctrine in Trade Secret Law陳詩帆, Chen, Shih Fan Unknown Date (has links)
近年來頻傳科技業高階主管跳槽到競爭對手,而我國於二〇一三年增訂營業秘密的刑事責任,營業秘密的保護與人才流動兩者之間的關係,越來越受到關注,特別是台積電與梁孟松案,智慧財產法院於二〇一二年三月台積電訴梁孟松案假處分裁定採納不可避免揭露原則,在後續的判決中亦論及不可避免揭露原則,使此一原則開始受到國內智慧財產權法實務及學術界之相當關注。
不可避免揭露原則係源自美國法上之司法實踐,本文首先介紹美國法上不可避免揭露原則的理論基礎,透過五個重要判決(Allis-Chalmers v. Continental案、PepsiCo v. Redmond案、Bimbo v. Botticella案、Whyte v. Schlage案和EarthWeb v. Schlack案)介紹不可避免揭露原則的發展,分析不可避免揭露原則的要素,包括兩間公司的競爭程度、營業秘密之認定、員工職務的近似程度、違反誠信的行為和與保密協議、競業禁止條款的關係,並且整理出四種不同的適用類型即完全適用、擴張適用、限縮適用和拒絕適用,繼而以之分析美國各州的適用情形。最後,回歸到我國台積電訴梁孟松案,分析該案是否適合導入或參考美國法之不可避免揭露原則之各項考量因素,並評析法院對於不可避免揭露原則的見解包括採納不可避免揭露原則的適用類型,輔以我國目前實務發展,探討不可避免揭露原則是否應該引入我國,包括是否違反我國法律規定、與美國法制的差異是否影響不可避免揭露原則的適用和價值衡平與政策考量。 / In recent years, hi-tech companies in Taiwan occasionally need to cope with crisis where their executives decide to join competitors’ firms. Along with the 2013 amendment in Trade Secrets Law, which crminizlized trade secrets infringemenet, the relationship between the trade secret protection and job mobility has drew wide attention from IP practitioers and academia. In the case of TSMC v. Liang, the Intellectual Property Court first applied the inevitable disclosure doctrine in an injunction relief. Since the inevitable disclosure doctrine originates from the judicial development of the United States (U.S) trade secret law, the thesis first introduces the basic idea of the inevitable disclosure doctrine in the U.S., and then through five representative cases, including Allis-Calmers v. Continental, PepsiCo v. Redmond, Bimbo v. Botticella, Whyte v. Schlage, and EarthWeb v. Schlack. It then investigates the overall development of the inevitable disclosure doctrine in the U.S.. Based on the case-law development, the thesis further analyzes the essential factors of the inevitable disclosure doctrine incluing the competition between rivals, indentification of trade secrets, job similarity, dishonest act and the relationship with non-disclosure agreement and covenant not to compete. It also catalgorizes four types of judicial application of the inevitable disclosure doctrine, including the original, extended, limited and rejected type. Furthermore, the thesis analyzes the type of application of the inevitable disclosure doctrine in each state in the U.S.. Last but not least, back to TSMC v. Liang, the thesis analyzes if the above-mentioned factors of the inevitable disclosure doctrine fit in the case, and reviews the court ruling about the inevitable disclosure doctrine. In conclusion, based on the current development of judicial practice, the thesis assesses the application of inevitable disclosure doctrine in Trade Secrets Law in Taiwan with the polict goal to balance various interests.
|
9 |
FauxtopiaKampf, Raymond William 01 January 2004 (has links)
To all who come to this fictitious place:Welcome.Fauxtopia is your land. Here, age relives distorted memories of the past, and here, youth may savor the challenge of trying to understand the present. Fauxtopia is made up of the ideals, the dreams and the fuzzy facts which have re-created reality... with the hope that it will be a source of edutainment for all the world.Ray KampfFauxtopia DedicationApril 1st, 2004
|
Page generated in 0.0613 seconds