• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 127
  • 106
  • 54
  • 18
  • 16
  • 5
  • 5
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 407
  • 76
  • 74
  • 57
  • 51
  • 50
  • 46
  • 43
  • 41
  • 38
  • 37
  • 36
  • 33
  • 31
  • 30
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Adolescent Sexual Victimization: The Role of Social Support and Risky Lifestyle

Azimi, Andia M 01 December 2013 (has links)
Although about half of all rape victims are adolescents, the bulk of the research on sexual victimization is focused on college or community samples of adult women. As such, little is known about adolescent risk of sexual victimization. Adolescence is an important developmental phase in life, in which an individual undergoes major social and biological changes. These changes may make them more susceptible to environmental characteristics, such as family climate, compared to adults. Environmental factors may influence risk taking among adolescents, which may increase the risk of sexual victimization. The theory of social support can be useful in understanding why some young individuals are sexually victimized and others are not. Data for the analysis is derived from the National Longitudinal Study of Adolescent Health (Add Health). The current study uses the in-home interviews from Wave I, Wave II, and Wave IV of Add Health. The purpose of the study is to examine the relationship between social support, risky behavior, and sexual victimization. Specifically, whether risky behavior mediates the relationship between adolescent sexual victimization and social support will be examined.
12

Study on Routing Protocols for the Security of Wireless Sensor Networks

Kulkarni, Aditya 10 1900 (has links)
ITC/USA 2013 Conference Proceedings / The Forty-Ninth Annual International Telemetering Conference and Technical Exhibition / October 21-24, 2013 / Bally's Hotel & Convention Center, Las Vegas, NV / This paper describes some of the security challenges faced by Wireless Sensor Networks (WSN). A classification and analysis of prominent attacks on the routing protocols of WSN is provided, along with a review of recent developments in the field to help mitigate the impact of these attacks.
13

Residential Burglary in Guelph: Looking at the Physical and Social Predictors of Break and Enters

Apps, Joes 22 August 2012 (has links)
The rate of residential break and enters in Canada has been declining according to official statistics, but has increased according to self reports of victims. Since the 1970s, considerable attention has been given to preventing break and enters by altering the physical environment. However, studies that assess the effects of physical design have produced mixed results. The data for this study were drawn from Guelph Police Service break and enter records, and property site assessments were performed using Google Earth and Street View. Drawing from rational choice and routine activities perspectives, physical and social features of burgled and non-burgled single detached dwellings were assessed to determine which features predicted break and enter victimization. Results suggest little empirical support for place-based crime prevention strategies such as Crime Prevention Through Environmental Design.
14

Interpretation of diagnostic information given patient characteristics /

Gellerstedt, Martin, January 2006 (has links)
Diss. (sammanfattning) Göteborg : Göteborgs universitet, 2006. / Härtill 5 uppsatser.
15

Evaluating Residential Burglaries in a Small Midwestern City using Social Disorganization and Routine Activity Frameworks

Howard, Stanley James 01 January 2009 (has links)
Social disorganization and routine activity theories have been studied over the past 30 years. The subsequent research examines prior concepts that were constructed to measure these theories and recent attempts in combining these theories. It also examines how these concepts have been measured using a multitude of geographical scales. It suggests that one consistent set of geographical scales must be used and that these must be easily reproduced in order to test these concepts on a multitude of cities that have a wide variation in populations.
16

Tangled Webs: A Test of Routine Activities Theory to Explain Nonconsensual Pornography Victimization

Henriksen, Caitlin B. January 2020 (has links)
No description available.
17

Analyzing Predictors of Bullying Victimization at School

Cecen Celik, Hatice 13 December 2014 (has links)
Bullying victimization in school settings is a serious problem in many countries including the United States. Bullying victimization has been associated with serious incidents of school violence as well as detrimental physical, psychological, emotional, and social consequences for its victims. Given its consequences, it is crucial to understand who is more likely to be targeted for bullying victimization. This study examines whether a number of important factors such as gender, physical and interactionist school security measures, and involvement in extracurricular activities influence individuals’ risk of bullying victimization from social bond and routine activity perspectives. The study employs the 2011 School Crime Supplement (SCS) of the National Crime Victimization Survey (NCVS) to investigate the causes of bullying victimization. The results of this study show that gender, interactionist school security measures, and extracurricular activities impact individuals’ likelihood of bullying victimization.
18

Cyber-Crime Fear and Victimization: An Analysis of a National Survey

Al-Shalan, Abdullah 13 May 2006 (has links)
The aim of this study was to investigate cyber-crime victimization among Internet users in the United States by: 1) assessing the factors that impact computer virus victimization; 2) assessing the factors that impact cyber-crime victimization; and 3) predicting fear of cyber-crime. Two domains in criminology were applied to the study of cyber-crime phenomenon: routine activity theory, and the fear of crime literature. Three independent models were developed to predict computer virus victimization, cyber-crime victimization, and fear of cyber-crime. Measures of routine activity theory applied to cyber-crime victimization include risk exposure, and suitable targets were created. A more reliable measure of fear of cyber-crime was created, and a measure of perceived seriousness of cyber-crime was created. The 2004 National Cyber Crime Victimization Survey dataset was used in this project. Logistic Regression and OLS Regression were utilized to predict computer virus victimization, cyber-crime victimization, and fear of cyber-crime.The findings of this study indicate that routine activity theory was a powerful predictor of computer virus victimization and cyber-crime victimization. That is, risk exposure and suitable targets helped determine the victimization. The study also found that cyber-crime victimization, gender, and perceived seriousness were predictive of fear of cyber-crime. Discussion of the findings and theoretical and policy implications were offered.
19

Street Codes, Routine Activities, Neighborhood Context, and Victimization: An Examination of Alternative Models

McNeeley, Susan January 2013 (has links)
No description available.
20

Getting a Handle on Street Violence: Using Environmental Criminology to Understand and Prevent Repeat Offender Problems

Tillyer, Marie Skubak January 2008 (has links)
No description available.

Page generated in 0.0465 seconds