• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 409
  • 407
  • 261
  • 177
  • 144
  • 32
  • 27
  • 20
  • 17
  • 15
  • 13
  • 8
  • 8
  • 6
  • 6
  • Tagged with
  • 1649
  • 329
  • 281
  • 257
  • 241
  • 226
  • 177
  • 176
  • 143
  • 136
  • 135
  • 124
  • 110
  • 109
  • 105
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Management of operational risks related to information security in financial organizations

Mehmood, Furhan, Rafique, Rajia January 2010 (has links)
Date: 30th May 2010 Authors: Rajia Rafique, Furhan Mehmood Tutor: Dr. Michael Le Duc, Dr. Deepak Gupta Title: Management of Operational Risks related to Information Security in Financial Organizations Introduction: Information security is very significant for organizations, especially for financial organizations where customer information and their satisfaction are considered the most important assets for financial organizations. Therefore customer information must be sustained from information security breaches in order to satisfy customers. Financial organizations use their customer’s information several times a day to deal with different operations. These operations contain several types of risks. Operational risks related to information security are becoming sensational for financial organizations. Financial organizations concentrate to reduce the exposure of operational risk related to information security because these risks can affect the business to a great extent. Financial organizations need such policies and techniques which can be used to reduce the exposure of operational risk and to enhance information security. Several authors discuss about several types of operational risk related to information security, and several authors discuss about the techniques to avoid these risks in order to enhance information security. Problem: Investigate the concept of Operational Risks related to Information Security and how it is perceived in Financial Organization? Purpose: The aspiration of writing this report is to describe and analyze operational risks related to information security in financial organizations and then to present some suggestions in form of polices or techniques which can be used by financial organizations to enhance their information security. Method: Since the type of our thesis is Qualitative based, therefore exploratory research approach is used to carry out research. Authors tried to use secondary source of information as well as primary source of information in order to get maximum knowledge about the topic and to come up with maximum possible output. Target Audience The target audience in our mind for this paper consists of both, academic readers and professionals who have interest and some knowledge about information security and operational risks. Target audience for this research work includes professionals, academic readers and both investigated organizations (NCCPL and CDC). Conclusion By critically analyzing the literature written by various authors and the worthy information provided by our primary sources gave us the opportunity to develop a solution to keep the operations secure from risks and to fix the current problems related to information security. We found that there are different types of operational risks related to information security which can affect the business of financial organizations and there are various techniques which can be used by financial organizations to solve the current issue related to operational risks in order to enhance information security. It was also found that top management in financial organizations is interested in issues about information security operational risk and they showed their keen interest in adopting new effective techniques. Keywords: Information Security, Information Security Risks, Operational Risks, Operational Risk Management, Operational Risks in Financial Organizations.
12

Managing Tunnelling Construction Risks

Giel-Tucker, Kimoya Lee Unknown Date
No description available.
13

Water security, droughts and the quantification of their risks to agriculture : a global picture in light of climatic change

Gaupp, Franziska January 2017 (has links)
As a consequence of climatic change, climate variability is expected to increase and climate extremes to become more frequent. Rising water and food demand are further exacerbating the risks to global water and food security. The variability but also the spatial inter-connectedness in our globalized world make our systems more vulnerable to shocks and disasters. To sustain the global water and food security, more knowledge about risks, especially risks of simultaneous shocks is needed. This thesis maps and quantifies risks to global water and food security from a water-food-climate perspective. It starts on a global scale looking at water security in major river basins and then concentrates on major food producing regions of three important crops. The thesis explores how storage can buffer inter- and intra-regional hydrological variability. A water balance model is developed and used to find hotspots of water shortages and to identify river basins where more investment in infrastructure is needed to improve and sustain water security. Looking at food security, global wheat, maize and soybean breadbaskets are identified and used to estimate risks of simultaneous production shocks. Focusing on wheat, I apply different copula approaches to model joint risks of low yields. It is shown quantitatively that (i) it is important to include spatial dependencies in risks studies and that (ii) inter-regional risk pooling could decrease post-disaster liabilities of governments and international organizations. The last part of the thesis focuses on climate impacts on food production. Relevant climate variables for crop growth in the breadbaskets are identified and joint climate risks are estimated using regular vine copulas. It is shown that so far, only wheat has experienced an increase in simultaneous climate risks. In maize and soybean production regions, positive and negative climate risk changes are offsetting each other on a global scale. Looking at future projections, however, it is shown that under a 1.5 and 2 °C global mean warming, simultaneous climate risks increase for all three crops, especially for maize where the return periods of all five breadbaskets experiencing climate risks decrease from 16 to every second year. The findings of this thesis can inform policy makers, businesses and international organizations about risks to global water and food security resulting from climate variability and extremes. It indicates where policies and infrastructure investments are needed to maintain water security, it can assist in building inter-governmental risk pooling schemes and contribute to current climate policy discussions.
14

Identification de gènes impliqués dans l'autisme, vers un test génétique de diagnostic précoce / Identification of genes involved in autism, toward a genetic test for early diagnosis

Philippi, Anne 01 December 2009 (has links)
L’autisme est une maladie complexe, résultant de nombreux facteurs génétiques et environnementaux. Elle se manifeste par des troubles du développement : altération des interactions sociales, de la communication et ayant des comportements et répétitifs et stéréotypés. L’objectif de cette thèse est l’identification des facteurs génétiques de l’autisme avec pour but final un test génétique de diagnostic précoce. L’analyse de liaison, par cartographie directe d’IBD, dans une population de 116 familles AGRE composées de deux enfants atteints ayant un retard de langage > 36 mois, ont permis d’identifier 12 régions d’intérêts. Les études d’association et réplication (167 trios) de ces régions ont permis d’observer des associations significatives de l’autisme avec des variants génétiques des gènes : PRKCB1, PITX, NF1, MARK1, ATP2B2 et SLC6A7. L’étude des biais sur l’estimation des risques relatifs (RR) d’un SNP, associés à une maladie et en LD avec le variant causal, a montré une sous-estimation des RRs pour des risques élevés et une surestimation pour des modèles récessifs ayant des risques faibles. Le LD entre le SNP et le locus maladies induits les plus forts biais. Une méthode basée sur la probabilité rétrospective est proposé dans l’estimation des RR utilisant les haplotypes et pour de multiple locus. Cette méthode c’est montré robuste au haplotypes non-phasés et au non respect de l’équilibre d’Hardy-Weinberg dans des populations familiales. L’étude clinique du premier test de diagnostique de l’autisme a montré des valeurs AUC égales à 0.563 dans 105 cas et 91 témoins et de 0.560 dans 298 trios, ce qui ne permet pas l’utilisation d’un tel test. / Autism is a complex disease involving many genetic and environmental factors. It appears by a developmental disorder characterized by impairments in social interaction and communication associated with repetitive patterns of interest or behavior. The aim of my thesis is to study the genetics factors of autism to be able to create an early genetics diagnostic test.Linkage analysis, by direct IBD mapping, in a sample of 116 AGRE families with two affected child to involve a delay onset of speech > 36 months of age, detected 12 regions with evidence of linkage. Association and replication studies (167 trios) of these regions showed significant association between SNPs and autism located in genes: PRKCB1, PITX, NF1, MARK1, ATP2B2 and SLC6A7. The investigation of bias in estimates relative risk (RR) for SNP, associate to a disease and in LD with the causal variant, showed an overestimation of RR for larges risks and an underestimation for recessive model with small risks. The LD value between SNP and disease locus inferred the largest bias. A method based on retrospectives probabilities was proposed for estimate RR of haplotype for multi-loci. This method showed itself robust for non-phased haplotype and when Hardy-Weinberg equilibrium was not respected in family samples. Clinical studies of first early diagnostic test for autism show AUC values equal to 0.563 in 105 cases and 91 controls and 0.560 in 298 trios, it’s not possible the use of such test.
15

Risk and Protective Factors for Depression and Anxiety in PCOS

Armstrong, Baylee, Phillips, Taylor, Wilson, Natalie, Braun, Kelsey, Williams, Stacey, Ph.D 07 April 2022 (has links)
Polycystic Ovary Syndrome, PCOS, is an endocrine condition among individuals born with ovaries. Though the condition name refers to the underdeveloped follicles as multiple cysts on the ovary, individuals living with PCOS frequently encounter menstrual irregularity, hirsutism (male-patterned body/facial hair), acne, and obesity. Prior research has noted that PCOS also is associated with psychological outcomes, most notably increased risk for depression and anxiety. However, relative to large amount of medical research on PCOS, few studies have examined these psychological outcomes and their etiology. Work is needed that uncovers the connection between the risks (e. g., stigma, weight bias, and quality of life), the protective (e.g., self-compassion, social support) factors that explain these psychological outcomes (e.g., depression, anxiety). The present study examined potential risks and protective factors that might explain the increased risk for depressive and anxiety symptoms in individuals living with PCOS. Specifically, we examined risk and protective factors reported by a gender (48% cisgender women, 52% gender diverse) and ethnically diverse (46% white non-Hispanic, 54% ethnically diverse) sample of individuals living with PCOS. Ages ranged from 19-46, with an average age of 29 (SD = 6.49). Individuals initially completed a qualitative interview by phone and were subsequently invited to participate in an online survey. Of the original 50 individuals living with PCOS, 46 completed the online survey through Redcap, answering questions about risk (perceived stigma, body image) and protective (self-compassion, social support) factors, and mental health (depression and anxiety). Results of bivariate correlations revealed that perceived stigma (r = .37, p = .02; r = .34, p = .03) and body image (r = .53, p = .00; r = .38, p = .02) were significantly related to more depressive and anxiety symptoms, respectively. In addition, self-compassion (r = -.72, p = .00; r = -.61, p = .00) and social support (r = -.42, p = .01; r = -.37, p = .02) were significantly related to fewer depressive and anxiety symptoms. Thus, this study found evidence that the more perceived stigma and negative body image, the more depressive and anxiety symptoms, whereas the more self-compassion and social support, the less depressive and anxiety symptoms in individuals living with PCOS. Importantly, the study had a small sample size, and the design was a self-report cross-sectional study. Thus, future research is needed that is longitudinal in design with large samples of diverse individuals with PCOS. Still, the present study is among the small literature attempting to understand the psychosocial risk and protective factors that may explain depressive and anxiety symptoms in this vulnerable population.
16

An analysis of the return-risk tradeoffs associated with tomato production in northwestern Ohio /

Schurle, Bryan Wilfred January 1977 (has links)
No description available.
17

SUPPLY CHAIN RISKS ASSOCIATED WITH RELOCATING A PRODUCTION SYSTEM IN A FOREIGN MARKET

Gultie, Elizabeth January 2013 (has links)
No description available.
18

Risk Control in ERP Implementations: The flow-on effect of prior decision making in the control of risks for Project Managers

Vanderklei, Mark Wynyard January 2013 (has links)
Enterprise Resource Planning (ERP) systems have been in existence for over 2 decades yet businesses are still losing billions of dollars annually in the implementation of software designed to reduce costs and increase profitability. The inability to manage risks is an area that contributes to these losses, specifically due to uncertain outcomes when dealing with an interconnected construct such as risk, and a research gap at the tactical and operational levels between risks and controls. A comparative case study approach, encompassing 12 different organisations was adopted to explore emerging patterns at the project implementation level, and from this three contributions emerged. After observing risks behaving in a hierarchical fashion with predictable results, Hierarchy of Risk models representing different implementation stages were constructed. Although these models are still in their formative stages, it may prove useful in furthering our understanding of the close inter-relationship between different risks, where they occur in ERP implementations and the implications of managerial choice when determining risk prioritisation. A second finding is that no direct linear relationship appears to exist between risks and controls. Rather, this counter-intuitive finding suggests that it is additional factors including risk categories, implementation stages, prior control decision making and the hierarchical flow-on effect of impacts as a consequence of identified risks. Finally, by combining the Hierarchy of Risk models and the risk-to-impact-to-control relationship, a method of reverse engineering portfolios of control was discovered. This potentially offers an explanation as to how portfolios of control can be constructed, and why they are essential in ERP implementations.
19

Youth and Technology: The risks youth take when using modern Technology

Krueger, Britt 15 December 2009 (has links)
Faculty of Criminology, Justice and Policy Studies
20

Cloud computing : security risk analysis and recommendations / Security risk analysis and recommendations

Sachdeva, Kapil 08 February 2012 (has links)
Cloud computing is here to stay and is the natural progression in the evolution of our computing and collaboration needs. The easy availability of computing infrastructures is motivating a new breed of entrepreneurs to realize their ideas and deliver innovations to masses. These innovations, however, have some serious security weaknesses. If not taken into account, these weaknesses could prove fatal for an organization’s reputation and existence. This thesis explains the potential risks associated with various types of cloud computing technologies and recommends methods to mitigate them. / text

Page generated in 0.047 seconds