• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 97
  • 34
  • 30
  • 16
  • 9
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 237
  • 64
  • 35
  • 31
  • 27
  • 26
  • 22
  • 18
  • 18
  • 17
  • 15
  • 15
  • 15
  • 14
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
211

Institucionální řešení problematiky nechtěných dětí / Institutional solution of the issue of unwanted children

Burešová, Adéla January 2011 (has links)
This thesis deals with the problem of unwanted children in Czech Republic and looks for answers to solve it. Unwanted children are those children whose parents, for whatever reason, do not want to take care of them. Institutional solution is the solution decided by court. In the text there are presented options of these children and options of their parents. The paper therefore deals with a description of surrogate children care and its forms - surrogate family care and institutional care. Besides it brings also a description of forms system of legal anonymous abandonment of a newborn child. Characterizes children, reasons why parents abandon them and the parents themselves. Mentions causes of placing children into institutions and briefly describes also these institutions, including number of children placed in them. For better orientation it also outlines a gradual historical development of care of unwanted children.
212

Webová vizualizace a demonstrátor anonymních pověření / Web visualization and demonstrator of anonymous credentials

Chwastková, Šárka January 2021 (has links)
This thesis deals with the topic of attribute based credentials with revocable anonymous credentials. The main focus of this work is the implementation of this scheme through a web application. The web application serves primarily as a visualization, which shows the functionality of this scheme through animations, and also as a practical demonstrator. Data and cryptographic calculations for individual system protocols are provided by the given cryptographic C application that communicates with the created application. The web application is also able to communicate with the connected smart card reader and the MultOS smart card and thus create the transmission of APDU commands and responses between the smart card and provided C application.
213

Zabezpečení datové komunikace s ochranou soukromí / Secure and privacy-preserving data communication

Bernát, Michal January 2015 (has links)
This thesis discusses the possibility of ensuring the safety, integrity and authenticity of data communication with respect to user privacy. This thesis describes the fundamentals of smart grid networks with capabilities of existing forms of security to communications that have been chosen as a target for application deployment of group signatures to ensure the security, integrity and authenticity of data communications. It describes the concept of a zero-knowledge and cryptography primitives. Further, the basic principles are presented, the history of development, and various schemes are compared based on the construction and performance. The second part is given to the deployment and optimization of group signatures for computationally limited devices. Within the draft report were to be implemented in the Java language chosen scheme HLCCN, DP and BBS. They were then tested under various platforms which were measured and evaluated performance parameters of the schemes. The optimization of the work is focused on the times of signatures, which are critical to a smart grid system. Under the platforms are deployed pre-processed pairing optimization methods and other methods resulting from the deployment platform as JPBWrappera and native libraries to deliver more efficient times of sgnaiture. At the end of the thesis are evaluated achievements of optimization methods and the appropriateness of the deployment of smart grids.
214

Digital Contention: Collective Action Dynamics in Social Movements for Internet Freedom

Jared M Wright (9164600) 24 July 2020 (has links)
<p>How does collective action operate in digital space, particularly for those social movements at the cutting edge of technologically innovative contentious politics? This dissertation analyzes activist (and hacktivist) groups engaged in what I call <i>digital contention</i> with state and corporate institutions over the future of Internet policy and governance, or what they see as “the freedom of the Internet.” Based on case studies of the Digital Rights movement and the Anonymous hacktivist collective, I use a combination of computational and qualitative analyses of online texts, along with participant-observation at meetings and protest events, to explore how certain collective action dynamics are changing in digital space. Specifically, these include how movements internally perceive political opportunities and threats, as well as how they construct frames to communicate to external audiences. I find that: 1) Political opportunity is less important than threat for activists in digital contention, which is likely due to the lower costs of collective action; and 2) The digital divide and technological knowledge gap create a barrier to frame resonance which digital activists address either through “strategic inclusiveness” or “communities of anonymity,” both of which encourage diversity among participants while also reifying other inequalities in different ways. These findings have significance for the study of social movements, communication and technology studies, and Internet policy. I argue that they portend changing dynamics that may ultimately affect all forms of collective action, and indeed the balance of power in whole societies, in the future as digital technology continues to spread into every facet of our lives.</p>
215

E-GOVERNMENT A E-DEMOCRACY NEBOLI OPEN SOURCE VLÁDNUTÍ / XXX

Fejfar, Jindřich January 2013 (has links)
The diploma thesis Public sphere in networked society concerns about the relation of public sphere and cyberspace. Cyberspace is defined as new social institution, which is not embodied Habermasian normative ideal of critical public sphere, but in contrary it constitute new forms of inequalities and new forms of fragmentarization and commercialization. Explored are therefore also theories which critically deal with concept of public sphere and better describe the reality of cyberspace. The expansion of Cyberspace and horizontal communication network also relate with transformation of contentious politics. The thesis provides an overview of historical development of new action repertoire of contention - virtual sit-in. As an embodiment of all these societal shifts, which are seen as an elements of change in power balance, is presented Operation Payback orchestrated by hacktivist group Anonymous. Keywords Cyberspace, public sphere, hacktivism, action repertoires, repertoires of contention, virtual sit-in, electronic civil disobedience, Anonymous, Operation Payback
216

Den mellanmänskliga betydelsen - i brukarstyrda självhjälpsmöten

Björk, Terése, Lundgren, Pernilla January 2019 (has links)
Studiens syfte var att avtäcka de element som upplevs betydelsefulla för den enskilda individen i en återhämtningsprocess från beroende, i relation till deltagandet av NA-möten. Som bakgrund till studien presenteras en redogörelse för olika definitioner av beroendeproblematiken samt återhämtning, tillfrisknande, tolvstegsprogrammet och Anonyma Narkomaner. Datainsamlingsmetoden som har används är av kvalitativ art med semistrukturerade intervjuer med fyra informanter. Bearbetning av data har skett genom tematisering som har resulterat i tre olika teman, som visar korrelation mellan det informanterna uttryckt. Temana sammanfattar fynden av verksamma mekanismer i deltagandet av NA-möten för en återhämtningsprocess mot tillfrisknande. Resultatet har analyserats utifrån ovan nämnd bakgrund, tidigare forskning samt två teoribildningar som ämnat att komplettera varandra. Studien visar att verksamma mekanismer i en återhämtningsprocess från beroende mot tillfrisknande är “gemenskap”, “unik förståelse” och “självutveckling” som kan återfinnas i deltagandet av NA-möten. / The aim of the study was to uncover the elements that are perceived as important for the individual in a recovery process from addiction, in relation to the participation of NA meetings. An introduction to the study is presented including a summary of various definitions of the addiction problem as well as recovery, the twelve-step program and Narcotics Anonymous. The data collection method used in the study was qualitative, through semi-structured interviews with four informants. Data processing was done through theme classification, which resulted in the identification of three themes based on common perceptions between the four informants. These themes summarize the findings of effective mechanisms in the participation in NA meetings for a recovery process. The result were analyzed on the basis of the aforementioned introduction, previous research and two theories that are intended to complement each other. The study shows that effective mechanisms in a recovery process from addiction are "community", "unique understanding" and "self-development" that can be found in the participation of NA meetings.
217

Revelations in the Green Chapel: The Gawain-poet as Monastic Author

Sheridan, Patricia T. 01 June 2020 (has links)
No description available.
218

A Place to Be: The Relationship Between Setting and Character in Short Stories

Dannemiller, Alexander S. 12 June 2013 (has links)
No description available.
219

De-Anonymization Attack Anatomy and Analysis of Ohio Nursing Workforce Data Anonymization

Miracle, Jacob M. January 2016 (has links)
No description available.
220

Out of the classroom closet: why only some gay and lesbian teachers are out

Lecky, Duane Joseph 19 August 2009 (has links)
Canada and British Columbia have legislation in place to protect gays and lesbians from discrimination based on their sexual orientation. A growing number of BC school districts have policy protecting gays and lesbians. However, some gay and lesbian teachers still hide their sexual orientation. Organizational theory recognizes that formal rules do not define the organization. In-depth interviews with 13 gay and lesbian teachers indicate that they would rather not maintain their classroom closets; but that they needed to know that they would be safe coming out. The methodology followed the tradition of narrative inquiry by collecting stories. Initial recruitment was through email, print, and word-of-mouth advertising. An on-line form was used to filter prospective participants to include urban, rural, Muslim, Catholic, closeted, and politically active participants. The great silence with respect to gays and lesbians in the workforce, paired with a history of negative messages needs to be offset by the frequent and ubiquitous dissemination of positive messages.

Page generated in 0.0385 seconds