• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 116
  • 39
  • 36
  • 25
  • 9
  • 6
  • 5
  • 5
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 282
  • 60
  • 45
  • 42
  • 42
  • 38
  • 35
  • 33
  • 32
  • 31
  • 31
  • 29
  • 28
  • 28
  • 28
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
151

Úprava programů v Javascriptu pomocí překladače / Javascript Program Obfuscation

Kuna, Matej January 2010 (has links)
In this project I deal with basic description of source code obfuscation and size reduction techniques of programming languages. The project is primary aimed on scripting language named JavaScript and involved analysis of free obfuscation tools for this language. In the final stage I have created an application is based on theoretical scope of this project and able to obfuscate JavaScript source codes on different levels.
152

The Dark Souls of Internationalization : Video Game Developers Enter the Chinese Market

Wagner, Michael January 2020 (has links)
This thesis analyzes how the institutional environment of the Chinese market affects market entry by foreign PC video game developers. The thesis utilizes a qualitative, multiple case study of five independent PC video game developers from around the world. The results of the thesis finds that despite China’s strict rules regarding video game publishing by foreign developers, culture and language are stronger influences on market entry strategies than Chinese regulations for the PC platform. This is due to the prevalent use of Steam, not only by foreign developers, but also their Chinese partners who publish the game to bypass the approval process mandated by the State Administration of Press and Publication (SAPP). The study also finds that, despite being in a leveraged market position due to regulations, Chinese publishers provide host of services for the developer partners for a revenue share deemed within industry standards. Additionally, localization strategies are discussed by each of the cases and this thesis finds that, while a basic translation can have success in the Chinese market, utilizing native Chinese speakers has a significant impact on a game's success, regardless of the professional level of the translation. Finally, despite the notoriety of piracy in China, developers expressed indifference to the practice, however, several methods have been identified to help mitigate the activity.
153

The international response to state failure : the case of Somalia

Loubser, Helge-Mari 18 June 2013 (has links)
State failure impacts international relations through the spill-over effects it has beyond the failed state. The international response to state failure: The case of Somalia attempts to answer the research question "Is the international response to the failed Somalia more concerned with security (i.e. the fight against terrorism and piracy) than with nation building/democratization or humanitarian aid (refugees, poverty)? This question is answered through descriptive-analytical research approach using the Neo-Realist theory within a globalised world. Concepts of legitimacy, authority and sovereignty in relation to the international response are explored where response takes the form of Intervention and humanitarian intervention that could be informed by the Responsibility to Protect (R2P) or go as far as nation building. Various annually published indices that examine and rank failed states are analysed which collectively and independently indicate that Somalia has been the number one failed state since 2008. Historically, the international response to Somalia prior to state collapse in 1991 forms the foundation to the response as well as accounting for the importance of complex internal clan politics. The background to how the international response has been, plays a key role in understanding where the international response‘s motives are positioned on scale of humanitarian versus security motives for intervention. The regional dynamics are explained through the Regional Security Complex (RSC). The security power political motives are seen through Anti-terror motives in a post 9/11 world and the various international responses to the different forms of attempts of interim governments and their opposition movements. Most notably, Al Shabaab, who formally merged with Al Qaeda in 2012, has been a focus point for the international response. The African Union (AU) mission in Somalia AMISOM is analysed from its humble beginnings to a force to be reckoned with. Due to the failure in Somalia for over 20 years, 14 per cent of its population form part of the influential Diaspora group. State building has emerged as one of the major international responses to state failure with the motive of avoiding nationwide humanitarian crisis. Yet the inaction of the past decade has lead to large spread famine in 2011. The security motive of regional and international players has overshadowed a pure humanitarian response in the past but the immensity of the crisis in 2011 has lead to a global humanitarian response. A new window of opportunity has presented itself with the appointment of the new president of the National Constituent Assembly (NCA) in September 2012. The international response to state failure has placed security first and has acted accordingly to limit the international economic and security effects of piracy, terrorism and refugee flows. Nation building has come second although, there have been attempts at achieving a uniform response to the failure in Somalia, neo realist real politik reigns. The ideal of a golden mean, where a balance is achieved between security and humanitarian motives, could only be achieved if Somalia starts addressing its internal issues that have caused and resulted from the failure, which is far from straightforward. / Dissertation (MA)--University of Pretoria, 2012. / Political Sciences / unrestricted
154

Design Appropriation in the Fashion Industry: The Role of Social Media as a Platform to Aid Designers

Kesic, Nina 17 June 2022 (has links)
No description available.
155

Barbary Pirates: Thomas Jefferson, William Eaton, and the Evolution of U.S. Diplomacy in the Mediterranean

Teye, Patrick N 01 August 2013 (has links) (PDF)
This study analyzes U.S. relations with the Barbary States from 1784 to 1805. After the American Revolution, the young nation found its commerce menaced in the Mediterranean by North African pirates sponsored by the rulers of Morocco, Tunis, Algiers, and Tripoli. As the U.S. sought to find a solution to end piracy and the practice of paying tributes or ransom to free Americans held captive, Thomas Jefferson proposed several solutions as a diplomat, vice president, and as president when he authorized the Tripolitan War (1801-1805). Thus, this look at U.S. relations with the Barbary States focuses on Jefferson’s evolving foreign policy proposals and argues that William Eaton’s secret mission in 1805 eventually reshaped U.S. policy in the Mediterranean and brought Jefferson’s ideas for a military solution to fruition. This change in policy would soon bring about the end of piracy against U.S. merchant vessels and the nation’s involvement in tributary treaties.
156

Student Digital Piracy In The Florida State University System:an Exploratory Study On Its Infrastructural Effects

Reiss, Jeffrey 01 January 2010 (has links)
Digital piracy is a problem that may never disappear from society. Through readily available resources such as those found in a university, students will always have access to illegal goods. While piracy is a global phenomenon, an institution's resources combined with the typical college student's lack of funds makes it more lucrative. Students use a number of methods to justify their actions ranging from previewing media to bringing justice to a corrupt company. While trying to understand the mindset of pirates is one route to deal with piracy, corporations attempted to alleviate the situation using added software encoding. These messages are not always effective, and in some cases caused further damage to consumer morale. Furthermore, students such as Joel Tenenbaum, who continued to pirate music despite warnings from his parents and the recording industry, exemplify the type of person that is unfazed by legal threats, leading to a question of ethics. Students may not feel that downloading is stealing despite numerous warnings from the Digital Millennium Copyright Act and other major media organizations. The predominant solution used by universities involves monitoring the students' network connection to detect Peer-to-Peer (P2P) connections or other connections that involve the transferring of copyrighted goods. Unfortunately, the current tools contain flaws that a crafty student may easily circumvent, undermining any attempts a university's IT department may use to deter piracy. This study explored the nature of piracy prevention tools used by IT departments in the Florida State University System in order to determine their relative effectiveness. The study also looked into the opinions of the Information Security Officer in terms of alternative piracy prevention techniques that do not involve legal action and monitoring. It was found that most institutions do not use a formal piece of software that monitors for infringing data. They also stated that while their current techniques can do its required task, it was not perfected to a point where it could run autonomously. Furthermore, institutions agreed that students lack proper ethics and concern over the matter of copyright, but were not fully convinced that other preventions methods would be effective. The study ultimately considered monitoring techniques a short-term solution and that more research should be put into finding long-term solutions. It also implied that IT departments should be better funded in order to keep up with the technological gap.
157

A Model of Low-risk Piracy

Camilo, Amil 01 January 2019 (has links)
Heterogeneous consumers make the decision to buy a durable good or to download a replica, and a monopolist chooses to price and protect their intellectual property in the form of an authentication cost. An optimal price and authentication cost is derived, and shown to be higher than the efficient outcome for a uniform distribution of consumers. The optimal selection of price and protection are shown to be commensurate with his authenticating technology, and the searching ability of consumers. As an extension, a layout for a monopolist problem where consumers have different searching abilities is shown to be indistinct from a homogeneous case when consumers are uniformly distributed.
158

When piracy meets the Internet: the diverse film consumption of China in an unorthodox globalization.

January 2008 (has links)
Wu, Xiao. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 111-124). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Table of Contents --- p.v / Chapter Chapter One: --- Chinese Film Piracy Consumption and Media Globalization --- p.1 / Introduction: The Rampant Film Piracy in China --- p.1 / Literature Review --- p.4 / Focuses in Chinese Film Piracy --- p.4 / Four Theoretical Positions in Media Globalization --- p.7 / Summary --- p.17 / Chapter Chapter Two: --- Problematics of Chinese Film Piracy Consumption --- p.19 / Two Concepts --- p.19 / Diversity --- p.19 / Filmic Gene Pool --- p.20 / Two Arguments and One Deduction --- p.23 / The Argument for the Expanding Global Capital --- p.23 / The Argument for National Protectionism --- p.25 / The Long Tail --- p.26 / The Theoretical Deduction for the Chinese Case --- p.27 / Research Questions --- p.28 / Methodological Note --- p.28 / Chapter Chapter Three: --- A Re-Examination of Chinese Film Piracy Market --- p.32 / The Myth of Market Access --- p.32 / State Censorship Overlooked --- p.34 / The First-Release Obsession --- p.35 / An Internet Take-over? --- p.38 / Summary --- p.39 / Chapter Chapter Four: --- "In Search of the “Invisible"" Audience/Viewers" --- p.42 / The “Official´ح Audience --- p.42 / Chinese Film Audiences Re-Captured --- p.45 / Sketches on the ´بInvisible´ة Viewers --- p.51 / Conclusion --- p.56 / Chapter Chapter Five: --- Structural Analysis for Chinese Film Piracy Consumption --- p.58 / Chinese Piracy Viewers: An Idle Spare of the Nexus? --- p.58 / The Film Piracy Market in China --- p.61 / Summary --- p.63 / Chapter Chapter Six: --- A Brief History of Chinese Piracy Consumption --- p.67 / Video Hall (Mid-1980s to Mid-1990s) --- p.68 / Epoch of the Videodisc (Since mid-1990s) --- p.70 / Online Movie Forums and Blogs (1998-Present) --- p.73 / Online Social Networks of Cinephiles (2004-Present) --- p.76 / The Accompanying Print Media (1999-Present) --- p.78 / Conclusion --- p.82 / Chapter Chapter Seven: --- The Chinese Public Cine-Space --- p.83 / The Publicness of Piracy Viewing --- p.83 / A Public Cine-Space --- p.84 / Cultural Public Sphere: The Concept --- p.84 / The Chinese Internet --- p.85 / The Chinese Online Film Critics --- p.87 / The Chinese Public Cine-Space --- p.89 / A Trajectory of the Online Cine-Space --- p.90 / Mechanism towards Diversity --- p.93 / The Techno-Divide --- p.98 / Chapter Chapter Eight: --- Conclusion --- p.100 / Contributions --- p.100 / Historical Account of Chinese Film Piracy Consumption --- p.100 / Inclusive Model for Diversity of Cultural Market --- p.101 / Weaknesses and Future Suggestions --- p.103 / Final Remark --- p.106 / Appendix A --- p.108 / Bibliography --- p.111
159

PR 2.0 - The New PR : A case study on the use of PR by pirates and anti-pirates. / PR 2.0 - The New PR : An explorative case study on the use of PR by pirates and anti-pirates.

Stypulkowski, David January 2009 (has links)
<p>Recent development of the internet encompasses elements such as social networks, blogs and wikis. With the help of these elements, popularly gathered under the umbrella term web 2.0, the pirates supporting file sharing have made the file sharing debate a national concern in Sweden.</p><p>This thesis studies the pirates’ and anti-pirates’ use of PR by qualitative case studies of organizations representing the two different sides in the debate. The use of PR by the different organizations is compared, the differences and similarities are considered and characteristics of the new PR are brought to attention.</p><p>The study finds that PR is taking a new direction and that these new ways to use PR are important to achieve success in influencing opinion. The two sides use PR in very different ways where the anti-pirates use more traditional ways of PR while the pirates make use of new PR methods virtually exclusively.</p>
160

PR 2.0 - The New PR : A case study on the use of PR by pirates and anti-pirates. / PR 2.0 - The New PR : An explorative case study on the use of PR by pirates and anti-pirates.

Stypulkowski, David January 2009 (has links)
Recent development of the internet encompasses elements such as social networks, blogs and wikis. With the help of these elements, popularly gathered under the umbrella term web 2.0, the pirates supporting file sharing have made the file sharing debate a national concern in Sweden. This thesis studies the pirates’ and anti-pirates’ use of PR by qualitative case studies of organizations representing the two different sides in the debate. The use of PR by the different organizations is compared, the differences and similarities are considered and characteristics of the new PR are brought to attention. The study finds that PR is taking a new direction and that these new ways to use PR are important to achieve success in influencing opinion. The two sides use PR in very different ways where the anti-pirates use more traditional ways of PR while the pirates make use of new PR methods virtually exclusively.

Page generated in 0.047 seconds