• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 55
  • 36
  • 20
  • 6
  • 5
  • 5
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 157
  • 157
  • 39
  • 24
  • 23
  • 23
  • 21
  • 19
  • 18
  • 16
  • 16
  • 15
  • 14
  • 13
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Implementation and Evaluation of an Algorithm for User Identity and Permissions for Situational Awareness Analysis

Tolley, Joseph D. 04 1900 (has links)
The thesis analyzes the steps and actions necessary to develop an application using a user identity management system, user permissions system, message distribution system, and message response data collection and display system to deliver timely command and control of human assets and the input of intelligence in emergency response situations. The application, MinuteMan, uniquely manages messages sent between multiple users and their parent organizations. Specifically, messages are stored, managed, and displayed to managers based on the hierarch or organizational rank as well as situational allowances of the users sending and receiving messages and permissions. Using an algorithm for user identity and permissions for situational awareness analysis, messages and information is sent to multiple addressees in an organization. Responses are correlated to the rank of the responding recipients in the organization, to assist the users and the parent organizations to identify which responses to have been read. Receipt of the messages is acknowledged before the message can be fully read. Responses to the messages include a selection of a user status from a preset choice of statuses, and may include other response attributes required or offered by the sender of the message. The locations of responding and non-responding addresses can be mapped and tracked. The resulting solution provides improved situational awareness during emergency response situations. / M.S. / The thesis analyzes the steps and actions necessary to develop an application using a user identity management system, user permissions system, message distribution system, and message response data collection and display system to deliver timely command and control of human assets and the input of intelligence in emergency response situations. Using an algorithm for user identity and permissions for situational awareness analysis, messages and information are sent to multiple user addressees for individuals supporting an organization. Responses are correlated to the rank of the responding recipient in the organization, and to assist the senders of the messages to identify which responses to read by the targeted recipients. Receipt of the messages is acknowledged before the message can be fully read. Responses to the messages include a selection of a user status from a preset choice of statuses, and may include other response attributes required or offered by the sender of the message. The locations of responding and non-responding addresses can be mapped and tracked. The resulting solution provides improved situational awareness during emergency response situations.
22

Empirical Assessment of Mobile Device Users’ Information Security Behavior towards Data Breach: Leveraging Protection Motivation Theory

Giwah, Anthony Duke 01 January 2019 (has links)
User information security behavior has been an area of growing demand in information systems (IS) research. Unfortunately, most of the previous research done in user information security behavior have been in broad contexts, therefore creating a gap in the literature of similar research that focuses on specific emerging technologies and trends. With the growing reliance on mobile devices to increase the flexibility, speed and efficiency in how we work, communicate, shop, seek information and entertain ourselves, it is obvious that these devices have become data warehouses and platform for data in transit. This study was an empirical and quantitative study that gathered data leveraging a web-survey. Prior to conducting the survey for the main data collection, a Delphi study and pilot study were conducted. Convenience sampling was the category of nonprobability sampling design used to gather data. The 7-Point Likert Scale was used on all survey items. Pre-analysis data screening was conducted prior to data analysis. The Partial Least Square Structural Equation Modeling (PLS-SEM) was used to analyze the data gathered from a total of 390 responses received. The results of this study showed that perceived threat severity has a negative effect on protection motivation, while perceived threat susceptibility has a positive effect on protection motivation. Contrarily, the results from this study did not show that perceived response cost influences protection motivation. Response efficacy and mobile self-efficacy had a significant positive influence on protection motivation. Mobile device security usage showed to be significantly influenced positively by protection motivation. This study brings additional insight and theoretical implications to the existing literature. The findings reveal the PMT’s capacity to predict user behavior based on threat and coping appraisals within the context of mobile device security usage. Additionally, the extension of the PMT for the research model of this study implies that mobile devices users also can take recommended responses to protect their devices from security threats.
23

Providing Context to the Clues: Recovery and Reliability of Location Data from Android Devices

Bell, Connie 01 January 2015 (has links)
Mobile device data continues to increase in significance in both civil and criminal investigations. Location data is often of particular interest. To date, research has established that the devices are location aware, incorporate a variety of resources to obtain location information, and cache the information in various ways. However, a review of the existing research suggests varying degrees of reliability of any such recovered location data. In an effort to clarify the issue, this project offers case studies of multiple Android mobile devices utilized in controlled conditions with known settings and applications in documented locations. The study uses data recovered from test devices to corroborate previously identified accuracy trends noted in research involving live-tracked devices, and it further offers detailed analysis strategies for the recovery of location data from devices themselves. A methodology for reviewing device data for possible artifacts that may allow an examiner to evaluate location data reliability is also presented. This paper also addresses emerging trends in device security and cloud storage, which may have significant implications for future mobile device location data recovery and analysis. Discussion of recovered cloud data introduces a distinct and potentially significant resource for investigators, and the paper addresses the cloud resources' advantages and limitations.
24

Mobile Device Strategy : A management framework for securing company information assets on mobile devices

Brodin, Martin January 2016 (has links)
The problem addressed by this research is a demand for increased flexibility in access to organisational information, driven by the increasing popularity of mobile devices. Employees increasingly bring private devices to work (Bring Your Own Device, BYOD) or use work devices for private purposes (Choose Your Own Device, CYOD). This puts managers in a difficult position, since they want the benefits of mobility, without exposing organisational data to further risk. The research focuses on management (particularly information security management) issues in the design and implementation of strategies for mobile devices.  There are two objectives. The first is to identify existing information security management strategies for mobile and dual-use devices. The second is to develop a framework for analysing, evaluating and implementing a mobile device strategy. The overall research strategy is inspired by Design Science; where the mission is to develop an artefact, in this case a framework, which will help to solve a practical problem. Methods include literature review, theoretical development, and the collection and analysis of qualitative data through interviews with executives. The main result of this work is the framework, which deals with the complete process, including analysis, design and implementation of a mobile device management strategy. It helps researchers to understand necessary steps in analysing phenomenon like BYOD and gives practitioners guidance in which analyses to conduct when working on strategies for mobile devices. The framework was developed primarily through theoretical work (with inspiration from the mobile security and strategic management literature, and the ISO/IEC 27000 standard), and evaluated and refined through the empirical studies. The results include twelve management issues, a research agenda, argumentation for CYOD and, guidance for researchers and practitioners.
25

Plánování spojů ve veřejné dopravě na mobilních zařízeních / Mass transport routing

Bečka, Michal January 2010 (has links)
A journey planning tool accessible from a mobile device provides travel information on the move. This work studies various aspects of mobile journey planners, including the history and limitations of mobile devices to deal with. First we analyze the connection with phone networks and the Internet for possible choices to place the tool, while recommending the most suitable ones. Then we study the developer environment consisting of various operating systems to show how compatible an application will be while selecting a programming language. Another part covers possible parameters for the journey search, from setting of basic location and time to optimizing other journey attributes. Following is an evaluation of journey planners already available. Then we investigate the source and form of input traffic data along with their availability. Finally we illustrate the ideas how the proposed parameters can be implemented on an example search algorithm. The purpose is to provide a comprehensive overview of the subject while researching possible improvements.
26

Multiplatformní prostředí pro vývoj mobilních her / Multi-platform environment for mobile-game development

Vacula, Ivan January 2011 (has links)
Title: Multi-platform environment for mobile-game development Author: Ivan Vacula Department: Department of Software Engineering Supervisor: RNDr. David Bednárek, Ph.D. Supervisor's e-mail address: bednarek@ksi.mff.cuni.cz Abstract: Smart mobile devices are getting more and more popular these days. But there comes a problem with their expansion as well. Mobile operating systems differ from each other, as do mobile devices themselves, so development across multiple platforms is not simple. Situation is even worse when it comes to games. These need to use limited resources of a mobile device as much as possible, taking into account quick response to user actions, graphical execution et cetera. The first goal of this thesis is to compare existing solutions for multi-platform mobile game development. The second goal is to design a new system. This system must ensure targeting of multiple platforms during mobile game development. Included in this thesis is implementation of the system on two vastly different operating systems as well as implementation of a demonstration game. Keywords: multi-platform, mobile, smartphone, game, development
27

Plánování spojů ve veřejné dopravě na mobilních zařízeních / Mass transport routing

Bečka, Michal January 2011 (has links)
A journey planning tool accessible from a mobile device provides travel information on the move. This work studies various aspects of journey planners in order to develop a solution for this task. We analyze the connection with phone networks and the Internet for possible choices to place the tool. Then we study the development environment consisting of operating systems programming languages. Another part covers possible parameters for the journey search. Then we investigate the source and form of input traffic data along with possible algorithms for this problem. Based on this analysis we design an application, making decisions from the analyzed areas. The design is applied for the following implementation and the resulting program we describe and measure. The purpose of this work is to develop a working application for mobile devices capable of public transit journey search, and to show what development of such application entails.
28

Komponentový framework pro vývoj webových aplikací / Component framework for web application development

Staniševský, Jiří January 2009 (has links)
The aim of this work was to design and implement component framework for development of web applications written in PHP programming language. The design has been based on pros and cons analysis of component framework usage, existing framework solution comparison and analysis of drawbacks of these frameworks. End-user device independence is both the main requirement for this framework and also its greatest contribution to the field of web frameworks. To be able to generate different output for mobile and desktop devices and to keep the application logic at one place only, thus minimizing the amount of work required from the developer, it uses its own original implementation of Model-View-Controller architecture. The output is being generated by so called rendering objects associated with individual components. Applications based on this framework are purely event driven, thus having their code more readable and manageable. Framework tries to offer comfortable usage of web applications for mobile device users without forcing application developers to create additional versions of their applications.o tato zařízení.
29

[en] WORKFLOW COORDINATION IN ENVIRONMENTS WITH SUPPORT FOR MOBILE DEVICES / [pt] COORDENAÇÃO DE WORKFLOWS EM AMBIENTES COM SUPORTE A DISPOSITIVOS MÓVEIS

RENATO LIMA NOVAIS 21 May 2007 (has links)
[pt] A tecnologia de workflow é bastante utilizada para realização de processos dentro de empresas e instituições. É comum encontrar processos que possuem tarefas que devem ser realizadas em locais de difícil acesso, ou que não tenham disponibilidade de computadores desktop e Internet confiável, dificultando a realização dessas tarefas de forma automatizada. Entretanto, com o avanço das tecnologias móveis, a possibilidade de automatizar a realização de tais tipos de tarefas diretamente em campo tornou-se viável. O objetivo deste trabalho é investigar questões relacionadas a sistemas de gerência de workflows em ambientes com suporte à desconexão utilizando dispositivos móveis. / [en] Workflow technology is heavily used to support many processes within organizations. One frequently finds processes that need to be executed in places that are difficult to access or where desktop computers and reliable Internet are not available, which complicates the automated execution of these activities. However, the advance of mobile technologies made it possible to successfully automate such types of activities directly in the field. The purpose of this work is to investigate questions related to workflow management systems in environments with support for disconnected operation using mobile devices.
30

Protótipo de Aplicativo para dispositivo Móvel para o Acompanhamento das famílias pelo Enfermeiro na Estratégia de Saúde da família / Prototype application for mobile for the monitoring of families by the nurse in the Family Health Strategy

Capote, Yusely Sanchez 20 August 2015 (has links)
O propósito deste estudo foi elaborar um Protótipo de aplicativo para dispositivo móvel que possibilita acompanhar as famílias na Estratégia de Saúde da Família. Diante dos desafios que este profissional enfrenta na sua prática diária no cuidado ás famílias durante a visita domiciliar, observa-se que o mesmo não utiliza instrumentos para o acompanhamento e avaliação domiciliar. Hoje os instrumentos existentes são manuais dispendendo um tempo no preenchimento das informações adquiridas, o que torna mais complexa sua prática e a avaliação estrutural de cada família. A equipe envolvida nesta pesquisa foi constituída pela pesquisadora, um analista de sistema e programador. A metodologia utilizada alicerçou-se no modelo Calgary de Avaliação Familiar (MCAF). A fase de definição iniciou-se com etapa de planejamento, seguido pela análise dos requisitos necessários para a construção do Protótipo de aplicativo para dispositivo móvel. O desenvolvimento foi constituído por cinco fases: a primeira e segunda transcorreu pela definição de requisitos funcionais e não funcionais que formaram parte do Protótipo de aplicativo; logo após na terceira fase analisou-se os requisitos de automatização do sistema que caracteriza os atores e o papel que estes desempenham dentro do sistema. Sendo incluídos diagramas de uso de sistemas para cada módulo desenvolvido, a relação entre eles e seus respectivos módulos. A quarta fase constituiu-se pelo desenho da interface, tarefa relevante no desenvolvimento de um sistema. A qualidade da interface com o usuário é o fator decisivo em uma aplicação, criando interfaces simples, com estilo próprio para que os módulos a identifiquem e proporcionem uma imagem agradável e informativa. A quinta fase esta dada pela Interface do usuário mostrando detalhadamente o seu passo a passo. Com a finalidade de gerar impactos e mudanças na prática deste profissional propõem-se uma ferramenta de fácil manuseio, útil e prático para o acompanhamento de famílias durante o atendimento domiciliar pelo enfermeiro da Estratégia de Saúde da Família / The purpose of this study was to develop an application for mobile prototype that enables accompany families in the Family Health Strategy. Faced with the challenges that this professional faces in their daily practice in the care to the families during home visits, we observe that it does not use instruments for monitoring and home evaluation. Today the existing tools are manual expending time in filling out the information acquired, which makes it more complex your practice and structural evaluation of each family. The team involved in this research was made by the researcher, a system analyst and programmer. The methodology used consolidate in the Calgary Family Assessment Model (FHH). The definition phase began with the planning stage, followed by analysis of the requirements for the application of Prototype construction for mobile. The development was composed of five phases: the first and second elapsed the definition of functional and non functional requirements that formed part of the application prototype; after the third phase analyzed the system automation requirements that characterizes the actors and the role they play within the system. Being included systems using diagrams developed for each module, the link between them and respective modules. The fourth stage constituted by the interface design, relevant task in developing a system. The user interface quality is the deciding factor in an application, creating simple interfaces, stylish design for the modules to identify and provide an enjoyable and informative image. The fifth phase this given by the User Interface detail showing its step by step. In order to generate impacts and changes in the practice of professional propose to an easy handling tool, useful and practical for the monitoring of families for home care by nurses of the Family Health Strategy

Page generated in 0.0467 seconds