• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 24
  • 8
  • 7
  • 1
  • 1
  • Tagged with
  • 58
  • 15
  • 12
  • 10
  • 9
  • 9
  • 8
  • 7
  • 6
  • 6
  • 6
  • 6
  • 6
  • 6
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Missförhållanden inom äldreomsorgen : En vinjett- och fokusgruppsstudie om hur omvårdnadspersonal uppfattar missförhållanden på särskilda boenden / Elder Abuse in Nursing Homes : A vignette and focus group study on how care staffperceive elder abuse in nursing homes

Sokunbi, Anifat Olabisi, Pambu, Laurette Futi January 2023 (has links)
Bakgrund: Forskning om missförhållanden visar att äldre som bor på särskilda boenden utsätts för olika former av missförhållanden. De olika formerna av missförhållanden som sker inom äldreomsorgen kommer till uttryck på olika sätt, såsom psykisk och fysisk vanvård samt försummelse. Syfte: Syftet med studien var att undersöka hur omvårdnadspersonal uppfattar eventuella missförhållanden inom äldreomsorgen och varför de tror att missförhållanden uppstår på särskilda boenden. Syftet var även att utifrån Theory of Reasoned Action tolka omvårdnadspersonalens potentiella agerande i situationer då det uppstår missförhållanden. Metod: Studien nyttjade en kvalitativ forskningsmetod i form av en vinjettstudie medfokusgrupper. Materialet analyserades genom tematisk analys. Resultat: Resultatet visade att omvårdnadspersonalen hade olika uppfattningar kring missförhållanden. Brist i arbetsmiljö såsom tidsbrist, personalbrist och stress var troliga orsaker till missförhållanden. Genom Theory of Reasoned Action indikerades att kollegors påverkan, så kallade ”subjektiva normer” och egna attityder kan bidra till en förståelse om varför missförhållanden uppstår på särskilda boenden. / Background: Research on elder abuse shows that elderly people living in nursing homes are exposed to various forms of abuse. The various forms of abuse that occur in elderly care are expressed in different ways, such as mental and physical abuse, and neglect. Aim: The aim of the study was to investigate how nursing staff perceive possible elder abuse in elderly care and why they believe that elder abuse occurs in nursing homes. The aim was also to interpret the nursing staff's potential actions in situations where elder abuse occurs based on the Theory of Reasoned Action. Method: The study used a vignette methodology with four focus group interviews. The material was analysed through thematic analysis. Results: The results showed that nursing staff had different perceptions of elder abuse. The respondents believed that, among other things, deficiencies in the work environment such as lack of time, staff shortages and stress were likely reasons for elder abuse. The Theory of Reasoned Action indicated that colleagues' influence, also known as "subjective norms" and their own attitudes can contribute to an understanding of why elder abuse occurs in nursing home.
52

The Neglected Facsimile: An Examination and Comparative Study of Facsimile No. 3 of the Book of Abraham

Barney, Quinten Zehn 01 August 2019 (has links)
Facsimile No. 3 of the Book of Abraham contains parallels to other Egyptian throne scenes found elsewhere, which fact has led many to pass Facsimile No. 3 off as commonplace. However, the lack of a broad comparative study examining these types of scenes in their varying contexts has rendered most conclusions regarding Facsimile No. 3 superficial at best. Hugh Nibley was perhaps the first to notice this problem, arguing that "The great abundance of pictures of the Facsimile No. 3 variety calls for the widest possible comparative study. In a case like this the student's first obligation is to compare, as widely and as carefully as possible." This thesis takes a critical step in solving this problem by looking at both the textual and iconographic elements found in Facsimile No.3 and comparing them with the larger corpus of Egyptian texts, temples, tombs, and stelae. Significantly, this study compares Facsimile No. 3 with the throne scenes from every other publicly known copy of the Book of Breathings, the ancient Egyptian document on which Facsimile No. 3 was found.In this thesis, I argue that Facsimile No. 3 is not as commonplace as some scholars have argued in the past. I begin this thesis with an introduction which presents some of the main issues surrounding Facsimile No. 3, including some of the likely reasons as to why it has remained the least studied of the three Facsimiles of the Book of Abraham. The first chapter contains a literature review of the published writings and theories that deal with Facsimile No. 3. Chapter Two gives a closer look at the hieroglyphs of Facsimile No. 3 and discusses some of the challenges relating to the translations that have been offered for them. The iconography of Facsimile No. 3 is discussed in the third chapter, where it is compared with the larger corpus of Book of Breathings vignettes. This discussion is especially important, as it is the first study to date which compares Facsimile No. 3 with the vignettes from all other extant copies of the Book of Breathings. In Chapter Four, this comparative study broadens, and parallels to Facsimile No. 3 are looked for in Ptolemaic copies of the Book of the Dead, Temples, Tombs, and funerary stelae.
53

Subjective Definitions of Substance Abuse Problems: Does Age Matter?

Bozzelli, Elizabeth Katherine 29 August 2008 (has links)
No description available.
54

Pictures of a Forgotten Past: The Socio-Historic Significance of Wartime Vignettes on Confederate Currency

Lengyel, Christian M. 25 March 2014 (has links)
No description available.
55

Mieux vaut prévenir et guérir : la réaction du public envers la posture de cyber-résilience des entreprises après un vol de données

Toma, Traian 08 1900 (has links)
Les recherches montrent que les clients ne prennent guère de mesures pour se protéger des crimes qui peuvent découler d’une brèche de renseignements confidentiels au sein d’une entreprise. Plutôt, ils considèrent que la firme — hébergeuse de leurs informations personnelles — a la responsabilité absolue en matière de la confidentialité continue de leurs données. Les commerces qui manquent de protéger adéquatement les informations clients risquent en contrepartie de subir des torts réputationnels ruineux. Cela dit, peu de travaux explicatifs sont effectués sur la résilience des entreprises face à la réaction négative du public après un vol de données. Ainsi, une étude expérimentale basée sur des vignettes de cas a été menée à l’aide du modèle de la victime « idéale ». Les mises en situation illustrent : (1) une entreprise victime décrite comme ayant une forte posture de cyber-résilience ; (2) une entreprise victime décrite comme ayant une faible posture de cyber-résilience. Un échantillon final de 664 participants a été aléatoirement affecté à l’une des deux conditions expérimentales principales. Les résultats révèlent que, comparativement à une faible posture de cyber-résilience, une bonne posture de cyber-résilience minimise les attitudes négatives des clients et favorise leurs intentions comportementales positives vis-à-vis la firme victime. À la lumière de ces résultats, la cyber-résilience, qui a principalement fait l’objet d’une attention conceptuelle, acquiert un fondement empirique. Par ailleurs, ce projet de recherche contribue plus généralement au développement de la victimologie des entreprises. / Research shows that customers take few measures to protect themselves from crimes that may follow data theft at a business. They rather consider that the firm—the host of their personal information—holds exclusive responsibility over the continued confidentiality of their data. Companies that fail to properly secure customer information may, in return, risk experiencing ruinous reputational harm. That said, little explanatory research is done on the resilience of businesses to negative public reaction after data theft. Consequently, a vignette-based experimental study was conducted using the “ideal” victim model. The scenarios feature: (1) a breached business described as having a strong cyber-resilience posture; (2) a breached business described as having a weak cyber-resilience posture. A final sample of 664 participants was randomly assigned to one of the two main experimental conditions. Results reveal that compared to a weak cyber-resilience posture, a good cyber-resilience posture minimizes negative customer attitudes and promotes positive customer behavioural intentions towards the company. Considering these results, cyber-resilience, which has mainly received conceptual attention, gains empirical support. Furthermore, this research project contributes more broadly to the evolution of the victimology of businesses.
56

Metoda ukotvujících vinět a její využití pro zvyšování komparability sebehodnocení vědomostí a dovedností v oblasti ICT / The Anchoring Vignette Method and its use for increasing the comparability of self-assessments of ICT knowledge and skills

Hrabák, Jan January 2020 (has links)
This dissertation deals with the use of the Anchoring Vignette Method in educational research carried out to establish the level of information and communication technology (ICT) knowledge and skills, with the focus on Czech upper-secondary school students. The theoretical part describes curricular documents that define the ICT knowledge and skills. In the Czech Republic that means mainly the Framework Educational Programmes. Attention is also paid to the international document DigComp. The Anchoring Vignette Method with the focus on nonparametric approach of this method is described in detail too. The author also provides an overview of available Czech and foreign bibliography on ICT knowledge and skills research - including the International Computer and Information Literacy (ICILS, 2013 and 2018) - and on the use of the Anchoring Vignette Method in educational research. The empirical part includes the description of the steps taken in formulating anchoring vignettes, this being an integral part of the Anchoring Vignette Method, in accordance with the curricular documents of the Czech Republic, and the steps taken while formulating anchoring vignettes on the basis of the international document DigComp. The verification of the fulfilment of the Anchoring Vignette Method assumptions (vignette...
57

Adolescents' Interpretations of Bullying

Caparanis, Lacey B. 28 April 2015 (has links)
No description available.
58

Hoodies, Rainbows, Guns, & Goodbyes: An Autoethnographic Study Exploring the Experiences that Impacted One Educator’s Decision to Leave K-12 Education

Andrews, Kenzie L. 15 July 2022 (has links)
No description available.

Page generated in 0.2656 seconds