Results for 'Theft detection and deterrence'

970 found
Order:
  1.  34
    A Family Affair: A Case of Altruism or Aggrandizement? [REVIEW]David P. Boyd, Jay A. Halfond, Peder C. Johnson & Timm L. Kainen - 2013 - Journal of Business Ethics 113 (1):157-161.
    The case recounts an incident of theft at a CEOs home during a company party. The rogue may well be an employee, and the CEO considers his options: should he let the matter pass and preserve the good will generated by the party, or should he stand on principle and engage the issue frontally? Three commentators provide perspective on an optimal response. They consider whether the CEOs true intent is to show appreciation or showcase opulence. In addition, the aberrant (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  31
    Plagiarism, Beyond CrossCheck, Figure and Conceptual Theft.Viroj Wiwanitkit - 2014 - Science and Engineering Ethics 20 (2):613-614.
    Sir, The recent report by Zhang et al. (2013) is very interesting. For sure, using CrossCheck might help identify some plagiarisms, especially for those with verbatim copy. However, the plagiarism can be seen in other forms including to figure and conceptual plagiarism (Wiwanitkit 2008, 2011). The figure plagiarism is a challenging thing for the journal since it is more difficult to detect than textual plagiarism (Wiwanitkit 2011). In addition, there are also more difficult cases of figure plagiarisms to be discussed. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  12
    Social Mechanisms in Norm-relevant Situations: Explanations for Theft by Finding in High-cost, and Low-cost Situation.Stefanie Eifier - 2016 - Analyse & Kritik 38 (1):91-120.
    At the centre of this study is the theoretical and empirical analysis of action-formation mechanisms in norm-relevant, situations. Basically two mechanisms are employed, namely action according to a) moral principles and b) the principle of deterrence. Conflicting assumptions concerning the way these mechanisms work are deduced from two theoretical perspectives, the high-cost/low-cost. hypothesis and Situational Action Theory (SAT). While the high-cost/low-cost. hypothesis leads to the assumption that, criminal action is explained by the principle of deterrence in high-cost, situations (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  24
    “I’m not an investigator and I’m not a police officer" - a faculty’s view on academic integrity in an undergraduate nursing degree.Lucie M. Ramjan, Paul Glew, Yenna Salamonson & Joan Lynch - 2021 - International Journal for Educational Integrity 17 (1).
    In nursing, expectations of honesty and integrity are clearly stipulated throughout professional standards and codes of conduct, thus the concept of academic integrity has even more impetus in preparing students for graduate practice. However, a disparity between policy and practice misses the opportunity to instil the principles of academic integrity, and at its core honesty, a pivotal trait in the nursing profession. This study draws upon the experience of the nursing faculty to explore how academic integrity policy of deterrence (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  21
    Canadian securities regulation and foreign blocking legislation.Andrew Gray & Graeme Hamilton - 2010 - International Journal of Business Governance and Ethics 5 (1/2):87.
    Knowing who benefits financially from a securities trade is necessary for the detection, prosecution and deterrence of illegal securities trading. Foreign jurisdictions with banking or securities secrecy laws are frequently used as a platform for illegal activity to frustrate law enforcement. This paper considers the extent to which Canadian law gives effect to so-called foreign blocking legislation. We conclude that while Canadian law does not generally give effect to foreign blocking legislation, it imposes only limited requirements on market (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  34
    The Biological Roots of Music and Dance.Edward H. Hagen - 2022 - Human Nature 33 (3):261-279.
    After they diverged from panins, hominins evolved an increasingly committed terrestrial lifestyle in open habitats that exposed them to increased predation pressure from Africa’s formidable predator guild. In the Pleistocene, _Homo_ transitioned to a more carnivorous lifestyle that would have further increased predation pressure. An effective defense against predators would have required a high degree of cooperation by the smaller and slower hominins. It is in the interest of predator and potential prey to avoid encounters that will be costly for (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7. First impressions count: serious detections arising from criminal justice samples.Michael Townsley, Chloe Smith & Ken Pease - 2006 - Genomics, Society and Policy 2 (1):28-40.
    DNA samples on the England and Wales national database matching those found at scenes of serious violent or sexual crimes were identified. The earlier offence leading the sample to appear on the database was noted. The bulk involved theft, drug or other offending. The result, indicating offender versatility, is consistent with most research on criminal careers. Its importance for operational police lies in identifying the contribution made by DNA samples taken after less serious offences in clearing subsequent serious crime, (...)
     
    Export citation  
     
    Bookmark  
  8.  21
    A machine learning approach to detecting fraudulent job types.Marcel Naudé, Kolawole John Adebayo & Rohan Nanda - 2023 - AI and Society 38 (2):1013-1024.
    Job seekers find themselves increasingly duped and misled by fraudulent job advertisements, posing a threat to their privacy, security and well-being. There is a clear need for solutions that can protect innocent job seekers. Existing approaches to detecting fraudulent jobs do not scale well, function like a black-box, and lack interpretability, which is essential to guide applicants’ decision-making. Moreover, commonly used lexical features may be insufficient as the representation does not capture contextual semantics of the underlying document. Hence, this paper (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9. Moore and Wittgenstein on certainty.Avrum Stroll - 1994 - New York: Oxford University Press.
    In the year 2060, sophisticated investigative tools can help catch a killer. But there are some questions even the most advanced technologies cannot answer... Harlan Coben says, “J.D. Robb’s In Death novels are can’t-miss pleasures.” Her latest is no exception, as the priest at a Catholic funeral mass brings the chalice to his lips—and falls over dead... When Detective Lieutenant Eve Dallas confirms that the consecrated wine contained potassium cyanide, she’s determined to solve the murder of Father Miguel Flores, despite (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   43 citations  
  10.  13
    Assessing the Factors Associated With the Detection of Juvenile Hacking Behaviors.Jin Ree Lee & Thomas J. Holt - 2020 - Frontiers in Psychology 11.
    Research on delinquency reduction often highlights the importance of identifying and sanctioning antisocial and illegal activities so as to reduce the likelihood of future offending. The rise of digital technology complicates the process of detecting cybercrimes and technology enabled offenses, as individuals can use devices from anywhere to engage in various harmful activities that may appear benign to an observer. Despite the growth of cybercrime research, limited studies have examined the extent to which technology enabled offenses are detected, or the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  33
    Preparation for professional self-regulation.John M. Braxton & Leonard L. Baird - 2001 - Science and Engineering Ethics 7 (4):593-610.
    This article asserts that graduate study should include preparation for participation in the process of self-regulation to assure the responsible conduct of research in the scientific community. This article outlines the various ways in which doctoral study can incorporate such preparation. These suggested ways include the inculcation of general attitudes and values about professional self-regulation, various ways doctoral study can be configured so that future scientists are prepared to participate in the deterrence, detection and sanctioning of scientific wrongdoing. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  12.  24
    Euthanasia and palliative care in pulmonology.Е.В Яковлева & Е.А Бородулина - 2022 - Bioethics 15 (1):58-62.
    Currently, euthanasia is officially allowed only in a number of countries, in most countries, as well as in the Russian Federation, it is prohibited by law. However, in clinical practice, there are a large number of incurable patients who experience intractable pain, so the problem of euthanasia is relevant. Aim: to analyze the current state of the problem of euthanasia and palliative care in pulmonology. Material and methods: review of domestic and foreign literature on the problem of euthanasia over the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  70
    The two sides of warfare: An extended model of altruistic behavior in ancestral human intergroup conflict.Hannes Rusch - 2014 - Human Nature 25 (3):359-377.
    Building on and partially refining previous theoretical work, this paper presents an extended simulation model of ancestral warfare. This model (1) disentangles attack and defense, (2) tries to differentiate more strictly between selfish and altruistic efforts during war, (3) incorporates risk aversion and deterrence, and (4) pays special attention to the role of brutality. Modeling refinements and simulation results yield a differentiated picture of possible evolutionary dynamics. The main observations are: (i) Altruism in this model is more likely to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  14.  8
    Students’ perceptions of plagiarism and relevant policies in Cyprus.Melpo Iakovidou, Catherine Demoliou & Angelika I. Kokkinaki - 2015 - International Journal for Educational Integrity 11 (1).
    BackgroundEffective plagiarism deterrence in the Republic of Cyprus, requires the identification of any gaps, best practices and case studies relating to plagiarism across the Higher Educational Institutions in the country. This paper discusses the findings of the first research conducted among university students and faculty in Cyprus and focuses on students’ awareness of and perceptions towards academic plagiarism.MethodologyThe research instrument for students was initially designed based on experts’ feedback, as part of the IPPHEAE project. It was translated into the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  15. Cognitive systems for revenge and forgiveness.Michael E. McCullough, Robert Kurzban & Benjamin A. Tabak - 2013 - Behavioral and Brain Sciences 36 (1):1-15.
    Minimizing the costs that others impose upon oneself and upon those in whom one has a fitness stake, such as kin and allies, is a key adaptive problem for many organisms. Our ancestors regularly faced such adaptive problems (including homicide, bodily harm, theft, mate poaching, cuckoldry, reputational damage, sexual aggression, and the infliction of these costs on one's offspring, mates, coalition partners, or friends). One solution to this problem is to impose retaliatory costs on an aggressor so that the (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   36 citations  
  16.  39
    A structured review and theme analysis of financial frauds in the banking industry.Pallavi Sood & Puneet Bhushan - 2020 - Asian Journal of Business Ethics 9 (2):305-321.
    Organizations of all types are vulnerable to frauds. Banks contribute to a significant extent in a country’s economic development by generating a large part of revenue in the service sector. Deterrence of fraud is impossible without understanding it. The present study attempts to extract themes by highlighting the major areas of the bank fraud literature within a specific time frame of 2000–2019 and finding the research gaps citing the future scope for research. Post the review of existing literature, using (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  17.  25
    Independence and Deterrence. Britain and Atomic Energy 1945-1952. Volume I: Policy MakingMargaret Gowing Lorna Arnold.Lawrence Badash - 1978 - Isis 69 (2):314-315.
  18.  19
    Flood Detection and Susceptibility Mapping Using Sentinel-1 Time Series, Alternating Decision Trees, and Bag-ADTree Models.Ayub Mohammadi, Khalil Valizadeh Kamran, Sadra Karimzadeh, Himan Shahabi & Nadhir Al-Ansari - 2020 - Complexity 2020:1-21.
    Flooding is one of the most damaging natural hazards globally. During the past three years, floods have claimed hundreds of lives and millions of dollars of damage in Iran. In this study, we detected flood locations and mapped areas susceptible to floods using time series satellite data analysis as well as a new model of bagging ensemble-based alternating decision trees, namely, bag-ADTree. We used Sentinel-1 data for flood detection and time series analysis. We employed twelve conditioning parameters of elevation, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  35
    Conflict detection and social perception: bringing meta-reasoning and social cognition together.André Mata - 2019 - Thinking and Reasoning 26 (1):140-149.
    Research on implicit conflict detection suggests that people are sensitive to violations of logical principles. When they make reasoning errors, their epistemic radar presumably detects an anomaly....
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  20.  17
    Detecting and Visualizing the Communities of Innovation in Beijing-Tianjin-Hebei Urban Agglomeration Based on the Patent Cooperation Network.Fang Zhou & Bo Zhang - 2021 - Complexity 2021:1-14.
    For a deep understanding of Beijing-Tianjin-Hebei collaborative innovation, we detected and visualized the communities of innovation in BTH Urban Agglomeration based on the patent cooperation network. China Patent Database was connected with Business Registration Database and the Tianyan Check to achieve the geographical information of organizational innovators. Spinglass algorithm was applied and ultimately 12 communities of innovation were detected. Based on the different structure characteristics, we further clustered the 12 communities into four typical structures that are hierarchical, single-center, polycentric, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  25
    Detection and nudge-intervention on sensitive information in social networks.J. Alemany, V. Botti-Cebriá, E. Del Val & A. García-Fornes - 2022 - Logic Journal of the IGPL 30 (6):942-953.
    Detecting sensitive information considering privacy is a relevant issue on Online Social Networks (OSNs). It is often difficult for users to manage the privacy associated with their posts on social networks taking into account all the possible consequences. The aim of this work is to provide information about the sensitivity of the content of a publication when a user is going to share it in OSN. For this purpose, we developed a privacy-assistant agent that detects sensitive information. Based on this (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22.  16
    Theft, Law and Society.Jerome Hall - 1937 - International Journal of Ethics 47 (3):390-393.
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  23.  18
    Detection and Adaptive Video Processing of Hyperopia Scene in Sports Video.Qingjie Chen & Minkai Dong - 2021 - Complexity 2021:1-13.
    In the research of motion video, the existing target detection methods are susceptible to changes in the motion video scene and cannot accurately detect the motion state of the target. Moving target detection technology is an important branch of computer vision technology. Its function is to implement real-time monitoring, real-time video capture, and detection of objects in the target area and store information that users are interested in as an important basis for exercise. This article focuses on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  8
    Detection and Recognition of Asynchronous Auditory/Visual Speech: Effects of Age, Hearing Loss, and Talker Accent.Sandra Gordon-Salant, Maya S. Schwartz, Kelsey A. Oppler & Grace H. Yeni-Komshian - 2022 - Frontiers in Psychology 12.
    This investigation examined age-related differences in auditory-visual integration as reflected on perceptual judgments of temporally misaligned AV English sentences spoken by native English and native Spanish talkers. In the detection task, it was expected that slowed auditory temporal processing of older participants, relative to younger participants, would be manifest as a shift in the range over which participants would judge asynchronous stimuli as synchronous. The older participants were also expected to exhibit greater declines in speech recognition for asynchronous AV (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  24
    Signal detection and threshold modeling of confidence-rating ROCs: A critical test with minimal assumptions.David Kellen & Karl Christoph Klauer - 2015 - Psychological Review 122 (3):542-557.
  26.  26
    Detection and recognition.David M. Green & Theodore G. Birdsall - 1978 - Psychological Review 85 (3):192-206.
  27.  2
    Anomaly detection and facilitation AI to empower decentralized autonomous organizations for secure crypto-asset transactions.Yuichi Ikeda, Rafik Hadfi, Takayuki Ito & Akihiro Fujihara - forthcoming - AI and Society:1-12.
    This proposal introduces a novel decision-making framework to advance safe economic activities in cyberspace. We focus on identifying anomalies within crypto-asset trading, recognized as potential sources of criminal activity, severely undermining the credibility of such assets. Detecting and mitigating such anomalies holds significant societal implications, particularly in fostering trust within blockchain networks. We aim to bolster the “social trust” inherent to blockchain technology by facilitating informed economic activities in cyberspace. To achieve this, we propose integrating two artificial intelligence (AI) systems (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28.  18
    Visual detection and recognition of targets with various dependency contrasts in microstructure.E. Rae Harcum - 1967 - Journal of Experimental Psychology 73 (1):155.
  29.  20
    Theft, Law and Society. Jerome Hall.Malcolm Sharp - 1937 - International Journal of Ethics 47 (3):390-393.
  30.  31
    Stress Detection and Reduction Based on Simultaneous Measurement of EEG and fNIRS Signals.Fares Al-Shargie - 2019 - Frontiers in Human Neuroscience 13.
  31.  76
    Depiction, Detection, and the Epistemic Value of Photography.Laura Perini - 2012 - Journal of Aesthetics and Art Criticism 70 (1):151-160.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  32. Novelty detection and in‐line learning of novel concepts according to a case‐based reasoning process schema for high‐content image analysis in system biology and medicine.Petra Perner - 2009 - In L. Magnani (ed.), computational intelligence. pp. 25--3.
     
    Export citation  
     
    Bookmark  
  33.  11
    Detecting and Preventing Defensive Reactions Toward Persuasive Information on Fruit and Vegetable Consumption Using Induced Eye Movements.Arie Dijkstra & Sarah P. Elbert - 2021 - Frontiers in Psychology 11.
    Objective: Persuasive messages regarding fruit and vegetable consumption often meet defensive reactions from recipients, which may lower message effectiveness. Individual differences in emotion regulation and gender are expected to predict these reactions. In the working memory account of persuasion, inducing voluntary eye movements during the processing of the auditory persuasive information might prevent defensiveness and thereby increase message effectiveness.Methods: Participants in two independently recruited samples from the general population listened to a negatively framed auditory persuasive message advocating fruit and vegetable (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34. The detection and generation of sequences as a key to cerebellar function: Experiments and theory.Valentino Braitenberg, Detlef Heck & Fahad Sultan - 1997 - Behavioral and Brain Sciences 20 (2):229-245.
    Starting from macroscopic and microscopic facts of cerebellar histology, we propose a new functional interpretation that may elucidate the role of the cerebellum in movement control. The idea is that the cerebellum is a large collection of individual lines (Eccles's : Eccles et al. 1967a) that respond specifically to certain sequences of events in the input and in turn produce sequences of signals in the output. We believe that the sequence-in/sequence-out mode of operation is as typical for the cerebellar cortex (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  35. Kantianism, Consequentialism and Deterrence.Steven Sverdlik - 2018 - In Christian Seidel (ed.), Consequentialism: New Directions, New Problems. Oxford/New York: Oxford University Press. pp. 237-57.
    It is often argued that Kantian and consequentialist approaches to the philosophy of punishment differ on the question of whether using punishment to achieve deterrence is morally acceptable. I show that this is false: both theories judge it to be acceptable. Showing this requires attention to what the Formula of Humanity in Kant requires agents to do. If we use the correct interpretation of this formula we can also see that an anti-consequentialist moral principle used by Victor Tadros to (...)
     
    Export citation  
     
    Bookmark   1 citation  
  36.  14
    Retribution and Deterrence in the Moral Judgments of Common Sense.F. C. Sharp & M. C. Otto - 1909 - International Journal of Ethics 20 (4):438.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  10
    Detecting and Quantifying Mind Wandering during Simulated Driving.Carryl L. Baldwin, Daniel M. Roberts, Daniela Barragan, John D. Lee, Neil Lerner & James S. Higgins - 2017 - Frontiers in Human Neuroscience 11.
  38.  12
    Detection and Recognition of Fearful Facial Expressions During the Coronavirus Disease (COVID-19) Pandemic in an Italian Sample: An Online Experiment.Federica Scarpina - 2020 - Frontiers in Psychology 11.
  39.  10
    T-Pattern Detection and Analysis of Football Players’ Tactical and Technical Defensive Behaviour Interactions: Insights for Training and Coaching Team Coordination.Tiago Fernandes, Oleguer Camerino & Marta Castañer - 2021 - Frontiers in Psychology 12.
    This article aims to study the coordination of the defenders’ tactical and technical behaviour of successful teams to recover the ball according to contextual variables. A total of 15,369 events and 49 to 12,398 different patterns in 32 games of the 2014 FIFA World Cup’s play-offs were detected and analysed. Results evidenced a T-pattern of the first defender pressuring the ball carrier and his teammates concentrating at the same zone to cover him or space, leading to ball recovery. Field zones, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  56
    Morality and deterrence.Robert W. Tucker - 1985 - Ethics 95 (3):461-478.
  41.  15
    Editorial: Detection and Estimation of Working Memory States and Cognitive Functions Based on Neurophysiological Measures.Felix Putze, Christian Mühl, Fabien Lotte, Stephen Fairclough & Christian Herff - 2018 - Frontiers in Human Neuroscience 12:426802.
  42.  59
    True Detective and Philosophy.Tom Sparrow & Jacob Graham (eds.) - 2017 - New York: Wiley.
    Investigating the trail of philosophical leads in HBO’s chilling True Detective series, an elite team of philosophers examine far-reaching riddles including human pessimism, Rust’s anti-natalism, the problem of evil, and the ‘flat circle’.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  12
    Intensive Cold-Air Invasion Detection and Classification with Deep Learning in Complicated Meteorological Systems.Ming Yang, Hao Ma, Bomin Chen & Guangtao Dong - 2022 - Complexity 2022:1-13.
    Faster R-CNN architecture is used to solve the problems of moving path uncertainty, changeable coverage, and high complexity in cold-air induced large-scale intensive temperature-reduction detection and classification, since those problems usually lead to path identification biases as well as low accuracy and generalization ability of recognition algorithm. In this paper, an improved recognition method of national ITR path in China based on faster R-CNN in complicated meteorological systems is proposed. Firstly, quality control of the original dataset of strong cooling (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44. Theft, Law and Society. By Malcolm Sharp. [REVIEW]Jerome Hall - 1936 - International Journal of Ethics 47:390.
     
    Export citation  
     
    Bookmark  
  45.  10
    Detecting and prosecuting contract cheating with evidence – a “Doping Test” approach.Pauli Alin - 2020 - International Journal for Educational Integrity 16 (1).
    Contract cheating – outsourcing student assignments for a fee – presents a growing threat to the integrity of higher education. As contract cheating is based on students purchasing assignments that are original, traditional plagiarism detection tools remain insufficient to detect contract cheating. Part of the problem is that proving contract cheating is difficult. As a result, instructors may find it hard to prosecute students. To help address the problem, this conceptual paper builds upon extant scholarship on contract cheating and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  30
    Visual detection and visual imagery.M. J. Peterson & S. E. Graham - 1974 - Journal of Experimental Psychology 103 (3):509.
  47.  70
    The role of signal detection and amplification in the induction of emotion by music.William Forde Thompson & Max Coltheart - 2008 - Behavioral and Brain Sciences 31 (5):597-598.
    We propose that the six mechanisms identified by Juslin & Vll (J&V) fall into two categories: signal detection and amplification. Signal detection mechanisms are unmediated and induce emotion by directly detecting emotive signals in music. Amplifiers act in conjunction with signal detection mechanisms. We also draw attention to theoretical and empirical challenges associated with the proposed mechanisms.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  25
    Intentions, Uncertainty And Deterrence.Louis G. Lombardi - 1991 - International Journal of Applied Philosophy 6 (1):51-57.
  49.  74
    Methods of cheating and deterrents to classroom cheating: An international study.Richard A. Bernardi, Ania V. Baca, Kristen S. Landers & Michael B. Witek - 2008 - Ethics and Behavior 18 (4):373 – 391.
    This study examines the methods students use to cheat on class examinations and suggests ways of deterring using an international sample from Australia, China, Ireland, and the United States. We also examine the level of cheating and reasons for cheating that prior research has highlighted as a method of demonstrating that our sample is equivalent to those in prior studies. Our results confirm the results of prior research that primarily employs students from the United States. The data indicate that actions (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  50.  13
    Detection and Analysis of the Rivayah About the Prayers of Iftitah.Rıdvan Kalaç - 2023 - Tasavvur - Tekirdag Theology Journal 9 (1):387-432.
    As mentioned in the narrations, the messenger of Allah (pbuh) used to recite some prayers known as opening prayers such as Subhaneke, Wejjehtu and Allâhümme Bâid before reciting Fatiha surah while starting the obligatory and supererogatory worships (salat). In this study, it is aimed to find out the reflections of the abovementioned prayers in narrations, and to determine their authenticity and to reveal the reasons why jurisprudential sects preferred different prayers. Benefitting from literature review method, hadith inferences were made, and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 970