• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 116
  • 28
  • 12
  • 12
  • 8
  • 7
  • 4
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 230
  • 94
  • 85
  • 51
  • 51
  • 30
  • 28
  • 28
  • 22
  • 20
  • 20
  • 18
  • 17
  • 17
  • 16
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Understanding procedural violations and their implications for patient safety in community pharmacies

Jones, Christian January 2017 (has links)
Background: Violations occur when individuals choose to bypass or deviate from procedures. Although violations are often not intended to cause harm, they are nevertheless breaches of the preferred way of working. Violations have been suggested to introduce risk into the environment by eroding the margin of safety. Therefore, violations are of potential concern to healthcare professionals that are responsible for patient safety. This thesis examines how and why violations occur in community pharmacies. Method: The research adopted a mixed methods approach to explore violations in community pharmacies and three studies were undertaken. The first study was a qualitative study that explored the views of management and frontline staff with regards to the prevailing safety culture in community pharmacies. The aim was to understand the context in which violations occur and to explore the goals that staff manage in practice. The second interview study explored how procedures are perceived in practice and the types of violations that occur in this setting. The third study utilised a survey based on the COM-B model that further explored the influence of capability, opportunity and motivation on violating behaviours. Results: Overall, findings demonstrated that numerous types of violations occur in community pharmacies. Mainly they occur either to ensure that timely patient care is provided or to ensure that productivity is maintained in practice. The safety culture study suggested that frontline staff and management have a different safety culture, with frontline staff reacting to risk in the moment and head office staff managing risk through the provision of multiple detailed procedures. The interviews suggested that procedures are useful for outlining what is expected of staff in practice; however they are not always possible to follow to the letter due to the complex working environment. The social norm within each pharmacy was suggested to influence violating behaviours, as was the professional judgement of the pharmacist. Violations were shown to be necessary for maintaining care at times, especially in exceptional circumstances. However, at times violations to maintain productivity did result in an increased risk to patient safety. The questionnaire study highlighted motivation, opportunity, length of experience, staff role and gender as influences on certain types of violations. Conclusions: The mixed methods utilised as part of this thesis revealed the types of violations that occur in community pharmacies and the reasons why pharmacists and support staff choose to violate. The findings led to recommendations for policymakers to evaluate how procedures are implemented in practice, to provide additional support for staff in practice through improved workflow, to provide patient safety specific training in pharmacies, to improve communication between frontline and head office staff and to educate pharmacy students regarding the possibility that they will need to violate procedures at times to manage the complex reality of working within community pharmacies.
12

An Approach to Clone Detection in Behavioral Models

ANTONY, ELIZABETH 04 March 2014 (has links)
In this thesis, we present an approach for identifying near-miss interaction clones in reverse-engineered UML behavioural models. Our goal is to identify patterns of interaction ("conversations") that can be used to characterize and abstract the run-time behaviour of web applications and other interactive systems. In order to leverage robust near-miss code clone technology, our approach is text-based, working on the level of XMI, the standard interchange serialization for UML. Behavioural model clone detection presents several challenges - first, it is not clear how to break a continuous stream of interaction between lifelines (lifelines represent the objects or actors in the system) into meaningful conversational units. Second, unlike programming languages, the XMI text representation for UML is highly non-local, using attributes to reference information in the model file remotely. In this work we use a set of contextualizing source transformations on the XMI text representation to reveal the hidden hierarchical structure of the model and granularize behavioural interactions into conversational units. Then we adapt NiCad, a near-miss code clone detection tool, to help us identify conversational clones in reverse-engineered behavioural models. These conversational clones are then analysed to find worrisome patterns of security access violations. / Thesis (Master, Computing) -- Queen's University, 2014-03-03 19:36:25.776
13

Canadian Mining Companies, Social Disclosure and Extra-Territorial Human Rights Obligations

Luca, Ioana 27 November 2013 (has links)
The liability of companies for extra-territorial human rights violations does not solely arise from human rights statutes and traditional tort law approaches, but also from the corporate and securities law domains. Securities law requires that public companies disclose any high risk activity that the company is involved in, to the extent that it may affect the viability of the corporation, and this includes possible human rights violations. Management decisions in the field of Corporate Social Responsibility must concern the long-term viability of a company, and therefore accommodating, to the extent possible, the demands of stakeholders – be they traditional shareholders, responsible shareholders, or affected communities. This thesis will analyze the legal obligations triggering such corporate decisions, as well as the industry trends which inform them. The focus will be on Canadian public mining companies.
14

Canadian Mining Companies, Social Disclosure and Extra-Territorial Human Rights Obligations

Luca, Ioana 27 November 2013 (has links)
The liability of companies for extra-territorial human rights violations does not solely arise from human rights statutes and traditional tort law approaches, but also from the corporate and securities law domains. Securities law requires that public companies disclose any high risk activity that the company is involved in, to the extent that it may affect the viability of the corporation, and this includes possible human rights violations. Management decisions in the field of Corporate Social Responsibility must concern the long-term viability of a company, and therefore accommodating, to the extent possible, the demands of stakeholders – be they traditional shareholders, responsible shareholders, or affected communities. This thesis will analyze the legal obligations triggering such corporate decisions, as well as the industry trends which inform them. The focus will be on Canadian public mining companies.
15

A descriptive case study of handicapped parking violations in a mid-western [sic] city

Lenz, Jacqueline A. January 1999 (has links) (PDF)
Thesis--PlanB (M.S.)--University of Wisconsin--Stout, 1999. / Includes bibliographical references.
16

Indiana Criminal Code 9-30-2-2 who does it protect? /

Webber, Jason J. January 2008 (has links)
Thesis (M.A.)--Ball State University, 2008. / Title from PDF t.p. (viewed on Sept. 01, 2009). Research paper (M.A.), 3 hrs. Includes bibliographical references (p. 40).
17

An analysis of the domestic implementation of the repression of violations of international humanitarian law

Hardy, Kathleen 05 December 2012 (has links)
This dissertation analyses the domestic implementation of the repression of violations of International Humanitarian Law. Through this analysis it seeks to clarify the obligations placed on States under International Humanitarian Law to ensure an effective and workable system for the repression of violations. In assessing these obligations, this dissertation attempts to highlight the importance of an effective system that is properly implemented in a timely manner. It is shown that the obligations placed on States are not burdensome and are outweighed by the advantages of proper implementation. This dissertation demonstrates these advantages through a case study of Uganda where the consequences of the failure to implement an effective system of repressions of violations of International Humanitarian Law are documented. Practical solutions that may assist in remedying the defective system to repress violations in Uganda are provided. It is argued not only for the need to properly implement an effective system of repression of violations, as required under International Humanitarian Law, but for the need to implement a system that goes beyond that which States are legally obliged to do. / Dissertation (LLM)--University of Pretoria, 2013. / Public Law / unrestricted
18

Analysis of the spatial and temporal occurrence of deer spotlighting violations in Virginia

Kaminsky, Michael Arthur 09 November 2012 (has links)
Interviews with 20 conservation agents of the Virginia Commission of Game and Inland Fisheries provided information on 70 cases of deer spot-lighting violations in 1969 and 1970. An additional survey produced information on 41 deer spotlighting cases in in 1971, The number of spotlighting violations was observed to increase during the month of October, peak in November, and decrease in January, The average time of arrest for spotlighting was 11:37 p,m,, and the largest percentage of arrests were made on Saturday evenings. The various aspects of the violation were described including such factors as the weather; characteristics of the violator; weapon, spotlight and vehicle used; violation site; and apprehension site. Estimation of the extent of spotlighting in Virginia was made. Using two methods 6000 and 9000 violations per year were obtained, There were no significant correlations between legal deer kill or miles of road with the number of spotlighting arrests. Correspondence with several other states indicated violator and violation characteristics were similar to those found in Virginia. The sociological and criminological aspects of the violation were discussed, and a typology of the spotlighting violator was developed based on the assumption that the spotlighting violation occurred as the result of a decision made by the violator. / Master of Science
19

Efficient Detection of XML Integrity Constraints / Efficient Detection of XML Integrity Constraints

Švirec, Michal January 2011 (has links)
Title: Efficient Detection of XML Integrity Constraints Author: Michal Švirec Department: Department of Software Engineering Supervisor: RNDr. Irena Mlýnková, Ph.D. Abstract: Knowledge of integrity constraints covered in XML data is an impor- tant aspect of efficient data processing. However, although integrity constraints are defined for the given data, it is a common phenomenon that data violate the predefined set of constraints. Therefore detection of these inconsistencies and consecutive repair has emerged. This work extends and refines recent approaches to repairing XML documents violating defined set of integrity constraints, specif- ically so-called functional dependencies. The work proposes the repair algorithm incorporating the weight model and also involve a user into the process of de- tection and subsequent application of appropriate repair of inconsistent XML documents. Experimental results are part of the work. Keywords: XML, functional dependency, functional dependencies violations, vi- olations repair
20

Value source, value priming, and social norms as predictors of engaging in minor moral/legal violations

Fea, Courtney J. January 1900 (has links)
Doctor of Philosophy / Department of Psychological Sciences / Laura A. Brannon / The current dissertation examined the role value sources and social norms play in people’s likelihood to commit minor moral and/or legal violations. First, using the process of value acquisition as a general guideline, five value sources were hypothesized to influence an individual’s tendency for minor moral/legal crimes. Second, based on social norms theory and social norm interventions, it was hypothesized strategically manipulating social norms may alter a person’s willingness to partake in various immoral and/or illegal activities. Two studies were conducted to test these suppositions. Participants randomly assigned to between-subjects design experiments completed questionnaires via the web. In Experiment 1, participants mindset primed with values from multiple value sources (parental, peer, media, religion, personal) indicated how they “personally would act” if provided the opportunity to commit minor moral/legal violations. Participants primed with personal, parental, and religious values were willing to act as the value source suggested in minor moral/legal violation situations. Participants primed with media values did not necessarily follow the value source’s recommendations regarding minor moral/legal violations. In Experiment 2, participants exposed to low, actual, or high social norm (and severity perception) ratings reported how likely they were to commit the same minor moral/legal violations. Participants shown high norm ratings expressed a greater willingness to engage in minor moral/legal violations than those shown low norm ratings. Results suggested value sources and norm ratings differentially impacted participants’ willingness to be involved in minor immoral and/or unlawful behavior.

Page generated in 0.1122 seconds