963 resultados para Theories of organised crime


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Jelen tanulmány a posztmodern kor fogyasztási tendenciáit és a posztmodern marketing sajátos fejlődését elemzi, elsősorban a turizmus példáján. A szerzők a hazai és a nemzetközi szakirodalom, illetve saját kutatásaik és megfigyeléseik alapján ütköztetik az ismert és elfogadott elveket, elméleteket a gyakorlattal, és felhívják a figyelmet a marketingtevékenység alkalmazkodásának hazai problémáira. A Vezetéstudomány című folyóirat 2008/9. számában rendkívül érdekes tanulmány jelent meg Mitev Ariel Zoltán és Horváth Dóra tollából „A posztmodern marketing rózsaszirmai” címmel. A tanulmány előremutató, érdekfeszítő és minden tekintetben konstruktív, újszerű. Jelen tanulmány szerzőire is nagy hatást gyakorolt a cikk, nagyrészt felsorolt erényei miatt, de egyes esetekben kiegészítést kívánva. Mindenképpen inspirálta a továbblépést, az újabb adalékok megfogalmazását, amire ezúton e tanulmány szerzői kísérletet tettek. A cikk egyben szerves gondolati folytatása a szerzőpáros korábbi közös publikációinak, elsősorban a Marketing & Menedzsment folyóiratban megjelent cikknek. _______ In this article the author will analyze consumption tendencies of post-modern age, mainly using tourism marketing examples. Their analysis has been based on results of their own researches and researches published in Hungarian and international marketing literature. In this article they try to confront different theories of post-modern marketing and they will analyze problems of applicability of these theories in Hungarian marketing problem solving. An extremely interesting article was published in Vezetéstudomány (2008/9), written by Zoltán Mitev Ariel and Dóra Horváth, and this article, by its interesting, innovative and constructive aspect has largely influenced authors of present article to continue the path proposed in the abovementioned article. The article, in the same time, is an organic continuation of the earlier common publications of the authors, e.g. the recent article in Marketing & Menedzsment journal.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Carefully reading employment applications and checking out all references and prior-employment records is vital to hotel managers and personnel directors today. Many legal suits are the result of employees who, hired quickly because of an immediate need, commit some crime in relation to guest rooms or property.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Students hold a number of personal theories about education that influence motivation and achievement in the classroom: theories about their own abilities, knowledge, and the learning process. Therefore, college instructors have a great interest in helping to develop adaptive personal theories in their students. The current studies investigated whether specific messages that instructors send in college classroom might serve as a mechanism of personal theory development. Across 2 studies, 17 college instructors and 401 students completed surveys assessing their personal theories about education at the beginning and end of college courses. Students and instructors reported hearing and sending many messages in the classroom, including instructor help messages, conciliatory messages, uncertainty in the field messages, differential ability messages and generalized positive and negative feedback. Between-class and within-class differences in message reports were associated with students’ personal theories at the end of their courses, controlling for initial personal theories. Students’ initial personal theories were also related to the messages students reported hearing. The findings demonstrate the utility of assessing non-content messages in college classrooms as potential mechanisms for changing students’ personal theories in college. Implications for research and practice are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper argues that an important part of ensuring the jurisdictional basis of the crime of aggression is to secure a partnership between the UN Security Council and the ICC. Such a partnership should be conducive towards the reality of holding to account individuals that undertake an illegal use of force. This Paper puts forward guiding principles for a model that would benefit a constructive institutional relationship between the Council and the Court. It is through the application of these five guiding principles that the inclusion of the crime of aggression in the Rome Statute can translate into a constructive relationship between the International Criminal Court and the Security Council for the betterment of international peace and security as well as international justice. I maintain that it would be damaging to both the legitimacy and operational effectiveness of the Security Council and the ICC and detrimental to the overall institutional relationship if the final outcome proves unfavourable to international action against the crime of aggression and nothing more than dead letter law. Essentially the key to a viable cooperation regime between the Court and the Council will hinge on shared objectives regarding the crime of aggression rather than opposing views, namely combating impunity by holding individuals accountable for the illegal use of force.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this work we consider several instances of the following problem: "how complicated can the isomorphism relation for countable models be?"' Using the Borel reducibility framework, we investigate this question with regard to the space of countable models of particular complete first-order theories. We also investigate to what extent this complexity is mirrored in the number of back-and-forth inequivalent models of the theory. We consider this question for two large and related classes of theories. First, we consider o-minimal theories, showing that if T is o-minimal, then the isomorphism relation is either Borel complete or Borel. Further, if it is Borel, we characterize exactly which values can occur, and when they occur. In all cases Borel completeness implies lambda-Borel completeness for all lambda. Second, we consider colored linear orders, which are (complete theories of) a linear order expanded by countably many unary predicates. We discover the same characterization as with o-minimal theories, taking the same values, with the exception that all finite values are possible except two. We characterize exactly when each possibility occurs, which is similar to the o-minimal case. Additionally, we extend Schirrman's theorem, showing that if the language is finite, then T is countably categorical or Borel complete. As before, in all cases Borel completeness implies lambda-Borel completeness for all lambda.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article explores how theories of radicalisation have placed an emphasis on the development of an indicators-based approach to identify individuals who might engage in politically motivated violence. We trace how policing agencies have juxtaposed the search for indicators as a defence against criticisms of racial profiling. However, through an analysis of Canadian counter-terrorism training programmes, we demonstrate that the search for radicalisation indicators reaffirms pre-emptive and discriminatory security practices. We insist that despite efforts to theorise radicalisation outside of the practices of the “war on terror”, current trends risk rationalising prejudicial policing that affirms social exclusion and injustice.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Aims This paper, the first of four emanating from the International Continence Society's 2011 State-of-the-Science Seminar on pelvic-floor-muscle training (PFMT) adherence, aimed to summarize the literature on theoretical models to promote PFMT adherence, as identified in the research, or suggested by the seminar's expert panel, and recommends future directions for clinical practice and research. Methods Existing literature on theories of health behavior were identified through a conventional subject search of electronic databases, reference-list checking, and input from the expert panel. A core eligibility criterion was that the study included a theoretical model to underpin adherence strategies used in an intervention to promote PFM training/exercise. Results A brief critique of 12 theoretical models/theories is provided and, were appropriate, their use in PFMT adherence strategies identified or examples of possible uses in future studies outlined. Conclusion A better theoretical-based understanding of interventions to promote PFMT adherence through changes in health behaviors is required. The results of this scoping review and expert opinions identified several promising models. Future research should explicitly map the theories behind interventions that are thought to improve adherence in various populations (e.g., perinatal women to prevent or lessen urinary incontinence). In addition, identified behavioral theories applied to PFMT require a process whereby their impact can be evaluated.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The key functional operability in the pre-Lisbon PJCCM pillar of the EU is the exchange of intelligence and information amongst the law enforcement bodies of the EU. The twin issues of data protection and data security within what was the EU’s third pillar legal framework therefore come to the fore. With the Lisbon Treaty reform of the EU, and the increased role of the Commission in PJCCM policy areas, and the integration of the PJCCM provisions with what have traditionally been the pillar I activities of Frontex, the opportunity for streamlining the data protection and data security provisions of the law enforcement bodies of the post-Lisbon EU arises. This is recognised by the Commission in their drafting of an amending regulation for Frontex , when they say that they would prefer “to return to the question of personal data in the context of the overall strategy for information exchange to be presented later this year and also taking into account the reflection to be carried out on how to further develop cooperation between agencies in the justice and home affairs field as requested by the Stockholm programme.” The focus of the literature published on this topic, has for the most part, been on the data protection provisions in Pillar I, EC. While the focus of research has recently sifted to the previously Pillar III PJCCM provisions on data protection, a more focused analysis of the interlocking issues of data protection and data security needs to be made in the context of the law enforcement bodies, particularly with regard to those which were based in the pre-Lisbon third pillar. This paper will make a contribution to that debate, arguing that a review of both the data protection and security provision post-Lisbon is required, not only in order to reinforce individual rights, but also inter-agency operability in combating cross-border EU crime. The EC’s provisions on data protection, as enshrined by Directive 95/46/EC, do not apply to the legal frameworks covering developments within the third pillar of the EU. Even Council Framework Decision 2008/977/JHA, which is supposed to cover data protection provisions within PJCCM expressly states that its provisions do not apply to “Europol, Eurojust, the Schengen Information System (SIS)” or to the Customs Information System (CIS). In addition, the post Treaty of Prüm provisions covering the sharing of DNA profiles, dactyloscopic data and vehicle registration data pursuant to Council Decision 2008/615/JHA, are not to be covered by the provisions of the 2008 Framework Decision. As stated by Hijmans and Scirocco, the regime is “best defined as a patchwork of data protection regimes”, with “no legal framework which is stable and unequivocal, like Directive 95/46/EC in the First pillar”. Data security issues are also key to the sharing of data in organised crime or counterterrorism situations. This article will critically analyse the current legal framework for data protection and security within the third pillar of the EU.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Aims This paper, the first of four emanating from the International Continence Society's 2011 State-of-the-Science Seminar on pelvic-floor-muscle training (PFMT) adherence, aimed to summarize the literature on theoretical models to promote PFMT adherence, as identified in the research, or suggested by the seminar's expert panel, and recommends future directions for clinical practice and research. Methods Existing literature on theories of health behavior were identified through a conventional subject search of electronic databases, reference-list checking, and input from the expert panel. A core eligibility criterion was that the study included a theoretical model to underpin adherence strategies used in an intervention to promote PFM training/exercise. Results A brief critique of 12 theoretical models/theories is provided and, were appropriate, their use in PFMT adherence strategies identified or examples of possible uses in future studies outlined. Conclusion A better theoretical-based understanding of interventions to promote PFMT adherence through changes in health behaviors is required. The results of this scoping review and expert opinions identified several promising models. Future research should explicitly map the theories behind interventions that are thought to improve adherence in various populations (e.g., perinatal women to prevent or lessen urinary incontinence). In addition, identified behavioral theories applied to PFMT require a process whereby their impact can be evaluated.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Teachers' failure to utilise MBL activities more widely may be due to not recognising their capacity to transform the nature of laboratory activities to be more consistent with contemporary constructivist theories of learning. This research aimed to increase understanding of how MBL activities specifically designed to be consistent with a constructivist theory of learning support or constrain student construction of understanding. The first author conducted the research with his Year 11 physics class of 29 students. Dyads completed nine tasks relating to kinematics using a Predict-Observe-Explain format. Data sources included video and audio recordings of students and teacher during four 70-minute sessions, students' display graphs and written notes, semi-structured student interviews, and the teacher's journal. The study identifies the actors and describes the patterns of interactions in the MBL. Analysis of students' discourse and actions identified many instances where students' initial understanding of kinematics were mediated in multiple ways. Students invented numerous techniques for manipulating data in the service of their emerging understanding. The findings are presented as eight assertions. Recommendations are made for developing pedagogical strategies incorporating MBL activities which will likely catalyse student construction of understanding.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Landscape beauty has long been a concern of geographers and other scholars, but relatively little work has been done on the aesthetic analysis of specific landscape features such as mountain peaks and waterfalls. In Australia, as in many other parts of the world, waterfalls are popular scenic attractions, and this paper attempts to explain the widespread appeal of these landforms by examining them in the light of theories of landscape aesthetics, from the Picturesque and Sublime to arousal and prospect-refuge. While no single theory offers a complete explanation of our experience of waterfalls, this paper suggests that by using several theoretical approaches to the subject we are more likely to gain a full understanding of the way we respond to these landscape features.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper describes an approach to introducing fraction concepts using generic software tools such as Microsoft Office's PowerPoint to create "virtual" materials for mathematics teaching and learning. This approach replicates existing concrete materials and integrates virtual materials with current non-computer methods of teaching primary students about fractions. The paper reports a case study of a 12-year-old student, Frank, who had an extremely limited understanding of fractions. Frank also lacked motivation for learning mathematics in general and interacted with his peers in a negative way during mathematics lessons. In just one classroom session involving the seamless integration of off-computer and on-computer activities, Frank acquired a basic understanding of simple common equivalent fractions. Further, he was observed as the session progressed to be an enthusiastic learner who offered to share his learning with his peers. The study's "virtual replication" approach for fractions involves the manipulation of concrete materials (folding paper regions) alongside the manipulation of their virtual equivalent (shading screen regions). As researchers have pointed out, the emergence of new technologies does not mean old technologies become redundant. Learning technologies have not replaced print and oral language or basic mathematical understanding. Instead, they are modifying, reshaping, and blending the ways in which humankind speaks, reads, writes, and works mathematically. Constructivist theories of learning and teaching argue that mathematics understanding is developed from concrete to pictorial to abstract and that, ultimately, mathematics learning and teaching is about refinement and expression of ideas and concepts. Therefore, by seamlessly integrating the use of concrete materials and virtual materials generated by computer software applications, an opportunity arises to enhance the teaching and learning value of both materials.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The intention of this paper is to further the discussion around the development of theories of public relations by introducing to the mix the concept of the Other from the field of cultural studies. The development of discipline-specific theories as part of a “scholarly body of knowledge” (Wylie, 1994, p.2) – or at least a “unique” knowledge base (Parkinson, 2001) – has been suggested as one of the defining characteristics of a true profession. In the case of public relations, this is a development that has occurred relatively recently. Since public relations first began to emerge as a distinct practice in the early part of the 20th century, there has been a tendency to appropriate theories from other areas (such as organisational and media studies) to create a relevant theory base to explore, describe and predict public relations activities. However, these theories were often rarely more than a ‘best fit’ solution, and resulting areas of discrepancy led to much confusion surrounding the form and function of public relations. It could be argued therefore that the development of dedicated public relations theory – ideas that encompass the creation, maintenance and enhancement of relationships between organisations and publics as primary motivations – only began in the latter half of the 20th century with the work of people such as Grunig and Hunt, and latterly Ledingham and Bruning among others.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

How and why visualisations support learning was the subject of this qualitative instrumental collective case study. Five computer programming languages (PHP, Visual Basic, Alice, GameMaker, and RoboLab) supporting differing degrees of visualisation were used as cases to explore the effectiveness of software visualisation to develop fundamental computer programming concepts (sequence, iteration, selection, and modularity). Cognitive theories of visual and auditory processing, cognitive load, and mental models provided a framework in which student cognitive development was tracked and measured by thirty-one 15-17 year old students drawn from a Queensland metropolitan secondary private girls’ school, as active participants in the research. Seventeen findings in three sections increase our understanding of the effects of visualisation on the learning process. The study extended the use of mental model theory to track the learning process, and demonstrated application of student research based metacognitive analysis on individual and peer cognitive development as a means to support research and as an approach to teaching. The findings also forward an explanation for failures in previous software visualisation studies, in particular the study has demonstrated that for the cases examined, where complex concepts are being developed, the mixing of auditory (or text) and visual elements can result in excessive cognitive load and impede learning. This finding provides a framework for selecting the most appropriate instructional programming language based on the cognitive complexity of the concepts under study.