fileadmin/content/projekte/trilateral-graduate-school/dokumente/downloads/brewbook.pdf
translated as ‘center’ or ‘middle way’, can also be read with its religious-eth- ical connotation. In this case, ‘wasatia’ implies moderation, balance and justice. These virtues characterize the philosophy of the
fileadmin/content/portal/forschung/dokumente/gwp/20240801-statutes-on-good-research-practice.pdf
investigating body shall decide on a case- by-case basis how to deal with the informant’s breach of confidentiality. The informant must also be protected in cases where the academic misconduct remains [...] meaning of § 81 LVwG, that person shall be excluded from handling the specific case. To determine bias, before handling a specific case the members of the committee shall provide a statement in accordance with [...] the biased member only in that specific case. (4) The Investigative Committee shall elect one of its members to act as its chairperson. (5) When dealing with cases of academic misconduct, the Investigative
/en/research/research-infrastructure/research-information
/en/research/research-infrastructure
Research Infrastructure Listen On this page you will find information on EUF's Research Data Management and Research Information. Research Data Management Research Information
/en/trilateral-graduate-school/news-archive
News Archive Listen Autumn Lecture Series at the European Wasatia Graduate School for Peace and Conflict Resolution The European Wasatia Graduate School for Peace and Conflict Resolution has launched
/en/ices/dates-and-events/dfg-antragswerkstatt
/en/zimt/security/phishing/phishing-awareness-campaign/it-security-contact-person
IT-Security Team Listen Contact E-mail IT-Sicherheit -PleaseRemoveIncludingDashes- @ uni-flensburg.de
/en/zimt/security/phishing/phishing-awareness-campaign
Phishing Awareness Campaign Listen We would like to inform you about the IT security measure "Phishing Detection Training." This training aims to reduce the threat of cyberattacks at our university. W
/en/zimt/security/basis-protection
Basic protection | What is the university already doing to protect you and itself? Listen We use a variety of security measures to protect our university members and network from unwanted threats. The
/en/working-group-physics/histolab/thematical-subsections/optics/eriometer-on-the-model-of-thomas-young
reproduced. His replica was tested as part of the thesis and delivered good qualitative and, in some cases, quantitative results. further reading G.Peacock (Hrsg.), Miscellaneous Works of the Late Thomas Young