UP - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 256
1.
Celotno besedilo
2.
  • Leaving the parental home i... Leaving the parental home in post‐apartheid South Africa
    Thornton, Amy Population space and place, 11/2023, Letnik: 29, Številka: 8
    Journal Article
    Recenzirano
    Odprti dostop

    Abstract The process by which young people leave home in South Africa is central for understanding the lives of the country's young adult population, as well as, their role in the structural ...
Celotno besedilo
3.
  • Trends in household formati... Trends in household formation and living alone in South Africa, 1995-2011
    Thornton, Amy Development southern Africa (Sandton, South Africa), 03/2024, Letnik: 41, Številka: 2
    Journal Article
    Recenzirano

    In South Africa, households were formed at about twice the rate that the population grew be-tween census 1996 and census 2011 and the number of single-person households ballooned by 150%. Reweighted ...
Celotno besedilo
4.
  • Interrater Reliability in S... Interrater Reliability in Systematic Review Methodology: Exploring Variation in Coder Decision-Making
    Belur, Jyoti; Tompson, Lisa; Thornton, Amy ... Sociological methods & research, 05/2021, Letnik: 50, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    A methodologically sound systematic review is characterized by transparency, replicability, and a clear inclusion criterion. However, little attention has been paid to reporting the details of ...
Celotno besedilo

PDF
5.
  • A systematic review of tagg... A systematic review of tagging as a method to reduce theft in retail environments
    Sidebottom, Aiden; Thornton, Amy; Tompson, Lisa ... Crime science, 01/2017, Letnik: 6, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Background Retailers routinely use security tags to reduce theft. Presently, however, there has been no attempt to systematically review the literature on security tags. Guided by the acronym EMMIE, ...
Celotno besedilo

PDF
6.
  • Reweighting the OHS and GHS... Reweighting the OHS and GHS to improve data quality: Representativeness, household counts, and small households
    Thornton, Amy; Wittenberg, Martin The South African Journal of economics, December 2022, Letnik: 90, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    The October Household Surveys (OHS) (1994–1999) and the General Household Surveys (GHS) (2002–present) collected by StatsSA comprise South Africa's only nationally representative time series with ...
Celotno besedilo
7.
Celotno besedilo
8.
  • The Kurdistan Worker's Part... The Kurdistan Worker's Party (PKK) in London: Countering Overseas Terrorist Financing and Support with "Nudge" and Situational Approaches
    Akartuna, Eray Arda; Thornton, Amy Elise Terrorism and political violence, 02/2023, Letnik: 35, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Overseas diasporas have long been exploited by terrorist organisations seeking funding and support from areas beyond their operation. The Kurdistan Worker's Party (PKK), active in south-eastern ...
Celotno besedilo

PDF
9.
  • Enhancing the horizon scann... Enhancing the horizon scanning utility of futures-oriented systematic and scoping reviews
    Akartuna, Eray Arda; Johnson, Shane D.; Thornton, Amy Futures : the journal of policy, planning and futures studies, April 2024, 2024-04-00, Letnik: 158
    Journal Article
    Recenzirano

    We propose modifications for scoping (and by extension systematic) review methodologies to improve their contribution to horizon scanning exercises. As a means of systematically collecting, coding ...
Celotno besedilo
10.
  • Preventing the money launde... Preventing the money laundering and terrorist financing risks of emerging technologies: An international policy Delphi study
    Akartuna, Eray Arda; Johnson, Shane D.; Thornton, Amy Technological forecasting & social change, June 2022, 2022-06-00, 20220601, Letnik: 179
    Journal Article
    Recenzirano
    Odprti dostop

    •Technology advances are creating new money laundering and terrorist financing risks•This Delphi study identifies these risks, relevant stakeholders and countermeasures•Weaknesses in current ...
Celotno besedilo
1 2 3 4 5
zadetkov: 256

Nalaganje filtrov