data basis
Recently Published Documents


TOTAL DOCUMENTS

90
(FIVE YEARS 31)

H-INDEX

9
(FIVE YEARS 1)

2021 ◽  
Vol 31 (2) ◽  
Author(s):  
Nils Böckler ◽  
Mirko Allwinn ◽  
Carim Metwaly ◽  
Beatrice Wypych ◽  
Jens Hoffmann

Using a German sample of convicted perpetrators (N = 76), the authors compare the biographical characteristics and preoffence warning behaviours of non-violent Islamist activists (n = 60) with those of Islamist assassins (n = 16). While the biographical characteristics focus on the socio-structural, familial and social stressors of the convicted in addition to age and education, the exploration of warning behaviour focuses on potentially observable patterns of action associated with radicalisation processes or serious targeted acts of violence. The data basis is formed by indictments and verdicts in corresponding criminal proceedings. A standardised instrument for quantitative file analysis in the context of murder and manslaughter offences was used to identify biographical characteristics and previous social burdens (Göbel et al., 2016). The Screener Islamism (Böckler et al., 2017) was used to examine early behaviour-based radicalisation indicators and the Warning Behaviour Typology (Meloy et al., 2012) was used to identify violence-associated behaviour patterns. While all Islamist offenders committed their crimes in early adulthood and had various social backgrounds in their biographies, Islamist activists and violent offenders differed significantly in the warning behaviour they displayed before committing an offence. In particular, acts of planning and preparation (pathway to violence), new forms of aggression (novel aggression), and patterns of action that indicate that the person feels he or she is at a biographical dead end (last resort) were able to differentiate between attackers and non-attackers. The results are particularly relevant from a preventive perspective, as they can be the basis for improving behaviour-based early detection of violence associated radicalisation processes in social institutions.


TEM Journal ◽  
2021 ◽  
pp. 1092-1098
Author(s):  
Henning Bundtzen ◽  
Gerriet Hinrichs

This paper shows arrestingly how a corporate culture can be analyzed and visualised in a three-dimensional sphere using a repertory grid-based software. A theory that builds personal assessment criteria of individuals is leveraged through IT application to consolidate results of numerous employees and leaders. The software in this case study processed 21.114 unique graded construct-elementratings creating a comprehensive data basis which allows the visualization of an entity’s corporate culture.


2021 ◽  
Vol 45 (2) ◽  
pp. 119
Author(s):  
Derya Gür-Şeker

<p>The article examines how right-wing discourse communities are linguistically and visually constituted in social media in the context of flight, migration and Islam. The PEGIDA Facebook Corpus covering user comments (2014–2015), the PolRrA Corpus containing right-wing populist speeches (2016–2017) and the Instagram Corpus of the hashtag #identitäre (2019–2020) with postings and user comments are the data basis. Thus the corpus consists of different language-based and multimodal entities. The aim is to show how right-wing discourse communities in Germany are constituted by <em>us</em>-<em>you</em> relations, naming practices and visual patterns across time, platform and organization.</p><p> </p>


2021 ◽  
Vol 11 (2) ◽  
pp. 68-90
Author(s):  
Stein Rafoss ◽  
Hilde Witsø

This article is about the importance of collaboration in the development of teacher professionalism, and we have asked the research question: How can group collaboration between vocational education and training (VET) students contribute to the development of their teacher professionalism? The data basis is interviews with ten VET students in practical pedagogical education for vocational teachers that we conducted in the winter of 2020. In addition, we studied all internship documents that the ten students produced during the internship period. The students are in practical training at their own school with their own students and collaborate with each other to strengthen their own teacher role. We have applied Dale’s (1989, 1993, 2001) theory of teacher professionalism. To analyse collaboration, we used the theories of Hegel (1999), Honneth (2008, 2009), Barth (1994) and De Hei et al. (2018). We found that this internship made it possible for students to talk and reflect on didactic questions related to Dale’s three areas of expertise.


2021 ◽  
Vol 7 (2) ◽  
pp. 133
Author(s):  
Firstyani Imannisa Rahma ◽  
Tinuk Agustin ◽  
Ronaldus Morgan James ◽  
Ema Utami

Komponen penting yang dibutuhkan dalam sistem informasi atau perangkat lunak adalah basis data. Basis data membantu perangkat lunak dalam mengolah data yang datang dari input yang masuk ke dalam sistem. Untuk menjaga integritas dan keamanan data, programmer wajib memberikan fitur validasi data pada input. Validasi data dapat dilakukan dengan membuat batasan di tingkat aplikasi maupun di tingkat basis data. Sangat penting melakukan validasi data tingkat basis data tidak hanya pada tingkat pemrograman saja. LaundryPOS adalah aplikasi karis berbasis mobile yang diperuntukkan untuk usaha laundry. Penelitian ini akan melakukan analisis keuntungan dari CHECK constraint di database pada aplikasi LaundryPOS dalam aspek kebenaran data. Pengujian dilakukan dengan menggunakan query dan kendala. Hasil dari pengujian ini membuktikan bahwa constraint CHECK mampu menjaga aspek kebenaran pada basis data aplikasi LaundryPOS dengan menyaring data input yang tidak sesuai dengan format yang ditentukan.Kata Kunci—CHECK constraint, integritas data, validasi data, aspek kebenaran data, MySQLAn importantcomponents in the information system or software is database. The database helps the software process data that comes from the input that enters the system. To maintain data integrity and security, programmers must provide data validation features on the input. Data validation can be done by creating constraints at the application level or at the database level. It is very important to do database level data validation not only at the programming level. LaundryPOS is a mobile-based cashier application intended for laundry businesses. This study will analyze the benefits of CHECK constraints in the database on the LaundryPOS in terms of data correctness. Tests carried out using the query and constraints. The results of this test demonstrate that CHECK constraint is able to maintain the Correctness Aspects of the LaundryPOS database by filtering input data that does not match the specified format.Keywords—CHECK constraints, data integrity, data validation, aspek kebenaran data, MySQL


2021 ◽  
Vol 45 (1) ◽  
pp. 113
Author(s):  
Hilke Elsen

<p>This article first traces current research on new words. Then some problems are addressed. Neologism research on the German language is characterized by lexicographic dominance and inadequate linguistic analysis. Furthermore, lexicographic projects use newspapers and magazines as a data basis and equate this with ”the German language”. Lexicographic research only covers a subset of the questions on the topic of new words, and methods are influenced by underlying theory, questions and goals, so that linguistic and lexicographic opinions and procedures differ. The aim of linguistic work is to understand and not just to describe. Additionally, language varieties are considered. This leads to greater diversity of neologisms than dictionaries suggest.</p><p> </p>


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 523
Author(s):  
Kristin Majetta ◽  
Christoph Clauß ◽  
Christoph Nytsch-Geusen

This paper describes a way to generate a great amount of data and to use it to find a relation between a room controller and a certain room. Therefore, simulation scenarios are defined and developed that contain different room, location, usage and controller models. With parameter variation and optimization of the corresponding controller parameters a data basis is created with about 5300 entries. On the basis of this data, machine learning algorithms like artificial neural networks can be used to investigate the relation between rooms and their best suited controllers.


2021 ◽  
Vol 18 (2) ◽  
pp. 60-73
Author(s):  
Sandra Scherbarth ◽  
Stefan Behringer

Whistleblowing systems as internal company instruments for prevention and detection of compliance violations are increasingly recommended both in academic and practical literature. In the European Union, the discussion is currently activated by the EU legislation for better protection of whistleblowers, which needs to be transferred in national law by the member states end of 2021. This literature review examines the literature for the design specifications developed for whistleblowing systems under consideration of the risk for organizational insiders to blow the whistle. The purpose is to review the design specifications developed in scientific studies, the data basis on which they are built whether and, if so, how the risk for organizational insiders to blow the whistle is taken into account. A comprehensive database of literature has been examined. The result is systematic categorization of the specifications for the design of whistleblowing systems. Moreover, we conclude, that there is a lack of data basis for clear specifications. The research shows that in the design of whistleblowing-systems there is a lack of discussion of the risks for whistleblowers to suffer social and professional disadvantages


Author(s):  

Objectives: To determine the existence of a pattern of women most frequently victims of physical violence in Brazil over a period of 10 years. Methods: Data from the DATASUS platform were collected on the records of domestic, sexual and other violence, registered by physical violence against female persons between 2009 and 2018. Data from the Violence and Accident Surveillance System on characteristics of the violent act against women were also collected. The Brazilian Institute of Geography and Statistics was also used to collect data from the National Household Sample Survey (PNAD). For bibliographic reference, the descriptors “Domestic and Sexual Violence against Women”, “Domestic Violence” and “Domestic Violence” were searched on virtual data basis and Brazilian articles that were published within the period of the present study were included. Results: There is a continuous and rapid increase in the first half of the study period, with a slight deceleration between 2014 and 2016, followed by a new jump in records from 2017. As for race, the largest numbers are white women, 348428, and browns, 308902. Black women represent 68.25% of the total records of domestic, sexual and other violence, with 8.3% of the total records of physical violence. Conclusion: It is possible to estimate that black women are not making complaints or possibly are not being seen with due care to make them. As it is data that depends on denunciation, which is often not carried out, the results need consideration regarding assertiveness and reflection of reality.


Sign in / Sign up

Export Citation Format

Share Document