• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 31797
  • 8646
  • 6248
  • 2720
  • 1510
  • 976
  • 454
  • 437
  • 431
  • 382
  • 226
  • 226
  • 226
  • 226
  • 226
  • Tagged with
  • 65472
  • 14044
  • 10987
  • 9382
  • 7510
  • 6494
  • 6457
  • 5955
  • 5689
  • 5575
  • 5266
  • 5200
  • 4947
  • 4787
  • 3806
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
211

Improvements to the UMASS S-Band FM-CW Vertical Wind Profiling Radar: System Performance and Data Analysis.

Waldinger, Joseph 12 July 2018 (has links)
Upgrades to the University of Massachusetts S-Band FMCW boundary layer vertical wind profiling radar for use in the VORTEX-Southeast campaign are discussed. During the experiment, the radar characterizes velocity and reflectivity in clear-air and light to moderate precipitation conditions. Data is presented from the experiment which illustrates system performance and typical environmental results. This thesis begins with relevant background information on FM-CW radar operation, scattering mechanisms, and other calculations relevant to results discussed. The system hardware is described, along with improvements and modifications made prior to and during the experiment. Collected data is used to demonstrate system capabilities, improvements made, and remaining challenges. Various environmental features in the case of clear-air and precipitation are identified in the dataset. Several examples of Drop Size Distribution (DSD) estimates are presented, and the possibility of separating vertical wind speed biases from rain data is explored. Finally, the validity of results of DSD estimates are discussed.
212

Towards a mobile application to aid law enforcement in diagnosing and preventing mobile bully-victim behaviour in Eastern Free State High Schools of South Africa

Radebe, Fani 15 September 2021 (has links)
Mobile bully-victim behaviour is one cyber aggression that is escalating worldwide. Bully-victims are people who bully others but are also victimised by peers. The behaviour of bully-victims therefore swings between that of pure bullies and pure victims, making it difficult to identify and prevent. Prevention measures require the involvement of a number of stakeholders, including communities. However, there has been a lack of whole-community participation in the fight against cyberbullying and the roles of stakeholders are often unclear. We expect the law enforcement in particular, the police, to play a key role in curbing all forms of bullying. This is a challenging task in South Africa as these law enforcement agents often lack the skills and appropriate legislation to address particularly cyber-related bullying. Literature shows that law enforcement agents need to advance their technological skills and also be equipped with digital interventions if they are to diagnose and prevent mobile bully-victim behaviour effectively. This is particularly important in South Africa, where the rate of crime remains one of the highest in the world. The aim of this study was to develop a mobile application that can aid law enforcement in diagnosing and preventing mobile bully-victim behaviour in high schools. As part of requirements to the application development, it identified the impediments to the law enforcement effectiveness in combating mobile bully-victim behaviour. Extensive literature review on the factors influencing mobile bullying and mobile bully-victim behaviour was conducted and an integrative framework for understanding this behaviour and its prevention was developed. In so doing, the dominant behavioural theories were consulted, including the social-ecological theory, social learning theory, social information processing theories, and the theory of planned behaviour, as well as the general strain theory, and the role theory. The conceptual framework developed in this study extended and tailored the “Cyberbullying Continuum of Harm”, enabling inclusive and moderated diagnosis of bullying categories and severity assessment. That is, instead of focusing on mobile bully-victims only, bullies, victims, and those uninvolved were also identified. Also the physical moderation of the identification process by the police helped to minimise dishonest reporting. This framework informed the design, development and evaluation of a mobile application for the law enforcement agents. The Design Science Research (DSR) methodology within pragmatic paradigm and literature guided the development of the mobile application named mobile bullyvictims response system (M-BRS) and its evaluation for utility. The M-BRS features included functions to enable anonymous reporting and confidential assessments of mobile bully-victims effects in school classrooms. Findings from this study confirmed the utility of the M-BRS to identify learners' involvement in mobile bully-victims behaviour through peer nomination and self-nomination. This study also showed that use of the M-BRS has enabled empowerment of marginalised learners, and mitigation of learners' fear to report, providing them with control over mobile bully-victim reporting. In addition, learners using the M-BRS were inclined to report perpetrators through a safe (anonymous and confidential) reporting platform. With the M-BRS, it was much easier to identify categories of bullies, i.e. mobile bully-victims, bullies, victims, and uninvolved. The practical contributions of this study were skills enhancements in reducing the mobile bully-victims behaviour. These included improvement of the police's technical skills to safely identify mobile bully-victims and their characterisation as propagators and retaliators that enabled targeted interventions. This was particularly helpful in response to courts' reluctance to prosecute teenagers for cyberbullying and the South African lack of legislation thereon so that the police are enabled to restoratively address this behaviour in schools. Also, the identification information was helpful to strengthen evidence for reported cases, which was remarkable because sometimes perpetrators cannot be found due to their concealed online identities. Furthermore, this study made possible the surveillance of mobile bully-victims through the M-BRS, which provided the police some control to reducing the mobile bully-victim behaviour. This study provided a practical way for implementing targeted prevention and interventions programmes using relevant resources towards a most efficient solution for mobile bully-victims problem. Since there are not many mobile-based interventions for mobile bully-victim behaviour, this study provided a way in which artefacts' development could be informed by theory, as a new, innovative and practical contribution in research. In so doing, this study contributed to technology applications' ability to modify desired behaviour.
213

Investigating Factors that Influence Compliance of Digital Financial Service Agents to Legislation and Standards in Kenya

Njuguna, Rebecca Wanjiku 15 September 2021 (has links)
This study investigated the factors that influence compliance with existing legislation and standards among digital financial services (DFS) agents in Kenya. DFS in Kenya serve 60% of the adult population with at least 16 million subscribers. Much of these are attributable to the mobile money service Mpesa which accounts for the largest DFS market share. The number of DFS agents serving the market has grown to over five times the number of bank branches and ATMs in the country. With this growth in DFS, there have been many operational challenges among agents and the legislation has been at nascent. The aim of the study was to understand agent operational factors and how they influence compliance. Therefore, the main research question that guided the study was “How do operational factors affect compliance of DFS agents with agency banking legislation and standards in Kenya?” Additionally, the study investigated the compliance status among agents and identifiable groupings by compliance behaviour. Previous studies on DFS agents have identified persistent operational challenges but there has been no inquiry on how existing legislation addresses these challenges and whether their persistence is due to non-compliance. To investigate compliance, first, Configuration Theory (CT) was used to conceptualise DFS agents as organisations, classifying their operations under CT's principles of structure, strategy and environment. Subsequently, a conceptual model was developed with structure, strategy and environment as independent variables and compliance as the dependent variable. The first three propositions derived stated that structure, strategy and environment have an influence on compliance. The fourth proposition posed was that strategy has a greater influence on compliance than structure and environment. Quantitative paper-based questionnaires were used to collect cross-sectional data from 450 DFS agents in Kenya. A Partial Least Squares approach to Structural Equation Modelling (PLS-SEM) was applied to analyse the data on Smart PLS3. All four propositions were confirmed. Structure, strategy and environment had highly significant effects on compliance and strategy had the strongest effect on compliance. The findings suggest that Strategy, which was measured using training and technology utilization questionnaire items plays the biggest role in an agent's operations and compliance. Training equips agents with skills to manage liquidity, offer quality customer service, perform Know-Your-Customer (KYC), CustomerDue-Diligence (CDD) and suspicious transaction reporting (STR) procedures to assist with fraud detection and anti-money-laundering (AML) by identifying counterfeit customer identification documents, cash, and suspicious behaviour. Technologies such as CCTV cameras, counterfeit cash detectors and cash counting machines not only enhance efficiency but support the enforcement of the fraud and AML procedures. A two-step cluster analysis was performed to classify agents by compliance behaviour. Two distinct clusters emerged. The cluster where majority of agents fell exhibited better training and awareness of existing legislation, higher education levels and financial resources and was compliant with most of the questionnaire items measured. The second cluster with fewer agents was uncompliant on most questionnaire items measured and was characterised by lower education levels, financial resources and training levels. There were commonalities in both clusters which were relatively low scores on legislation awareness, and low compliance scores on liquidity and possession of DFS agent operational manuals. These findings suggest that an agent with a good alignment of financial and human resources (structure), good training and technology (strategy) and well informed about existing legislation (environment) would be compliant and is likely to experience less operational challenges. The findings also provide insights on what areas agents can take initiative for their own development, the most important being liquidity management, technology optimization and educating themselves on what legislations apply to them, and their compliance roles and responsibilities. Lastly, the study provides regulators with exploratory findings on the state of compliance among DFS agents in Kenya, indicating which areas agents are having most difficulty with. Banks and MNOs must recognize the crucial role of training and tailor programs to be responsive to all agent's operational and legislative areas.
214

Investigating the Relationship between Learning Styles and Delivery Methods in Information Security Awareness Programs

Ntwali, Blaise 15 September 2021 (has links)
Information security threats are continually growing as new technologies emerge. Literature confirms that the human factor is an important issue, as cyber threats and exploitation of vulnerabilities continue to proliferate due to human error. There are significant risks associated with this, such as the organisation's reputational damage and associated costs, to name a few. Information Security Awareness (ISA) programs have proven to be one of the best methods to reduce human linked security vulnerabilities and misbehaviour, which also reduces risks. The purpose of this research is twofold. First, it is to identify and explain the value of aligning ISA programs with user-preferred learning styles and delivery methods. Second, to indicate how aligning ISA programs with preferred learning styles and delivery methods influences security posture. Using the Knowledge, Attitude, and Behaviour (KAB) model as a theoretical lens, the study depicts how information security posture can be improved through the betterment of security knowledge, attitude, and behaviour. Additionally, the aligned learning styles and delivery methods' construct was added to the KAB model to investigate the research questions. The Human Aspect of Information Systems Questionnaire (HAIS-Q) was used to measure ISA levels of organisational employees in South Africa. The chosen parts of these HAIS-Q focused on password management, email and internet use. The ISA scores are essential for this research as they indicate the current ISA levels. This result can be used to improve information security posture. The Visual, Aural, Read/Write, and Kinaesthetic (VARK) inventory model was used to better understand the provided and preferred learning styles. Additionally, ISA programs focused on text-based, video-based, and game-based delivery methods commonly used and applied in prior academic research. Using a survey methodology, the study recruited 322 South African organisational employees to complete an online questionnaire. The questionnaire contained a subset of HAIS-Q, the VARK inventory model, delivery methods, and demographic questions. Bivariate Pearson correlation tests in conjunction with the ISA scores indicated that userpreferred learning styles achieve greater ISA. The results also showed that video-based delivery methods are the most preferred but does not yield the highest ISA scores. The highest ISA scores are achieved from a mixture of delivery methods. The study proposes user aligned learning styles and preferred delivery methods to positively influence the knowledge, attitude, and behaviour leading to improved cybersecurity resilience. As a result, this leads to self-reported and risk-averse behaviour, as end-users' self-efficacy has improved.
215

"Harness Shakedown" Flight Bus Harness Testing Using the CKT Machine

Goodall, Shane 01 July 2012 (has links)
At the Boeing Satellite Development Center, all programs must follow the same test flow through the factory. First the units are built, tested, and delivered for sub system level integration. There are units built for the bus module and units built for the payload module. Both sub systems are built in different locations and have their own core teams. Once the sub systems are properly integrated, they will then travel to the next test phase of the factory which is known as Integrated Vehicle Testing (IVT). During IVT, both the bus and payload modules are integrated to make one system. This system will travel through the factory and will be tested to make sure that all requirements are met. Once all requirements are validated and verified, the spacecraft is now ready for launch and delivery to the customer. There are hundreds of tests that need to take place throughout the spacecrafts life in the factory. The purpose of these tests is to make sure that a requirement from the customer is met one way or another. Thousands of man hours are budgeted for testing the satellite during its journey through the factory. At an average engineering cost of $200 per hour, this total dollar value for requirements validation and verification can get very expensive. One of the tests in particular is called "Harness Shakedown." This test is conducted to make sure that all the harness wiring in the bus module is wired correctly per the released wire list. These wires can be used for telemetry and control, power to units, signal wires, etc. The way that the test is currently conducted is all done manually using break out boxes, break out cables, digital volt meters, and power supplies. This is an inefficient way of doing the test. This test can be leaned out using systems engineering practices and finding better ways for doing this test to bring value to the customer. The most expensive cost to a program is engineering labor. Systems engineering can help in this test by using the systems engineering process milstd- 499B. This will be used to ensure that the requirements are good and can be fulfilled through the new way of testing. Lean systems engineering will play a large role in finding waste in the test and how to eliminate this non-value added waste. Understanding risk that can occur and ways to manage that risk, is key when fulfilling these requirements. Performing trade studies on how to do this test will help in making the proper engineering decision for the best way of doing the test while again, focusing on added value to the program.
216

A paradox of the second order digital divide in higher education institutions of developing countries: case of Zimbabwe

Dube, Sibusisiwe 04 August 2021 (has links)
Although this is not a new research phenomenon, the literature has often associated the digital divide (second order or otherwise) with sociodemographic, sociocultural and socioeconomical factors as reasons for the digital divide. However, there is little presence in the literature into the underlying structures (physical or abstract arrangement) leading to the divide. This means that the underlying structures leading to this problem have so far been ignored and require scholarly attention. This study, therefore, identifies and explains the structures leading to the second order digital divide, a problem relating to the unequal use of information and communication technologies (ICTs) which is more prevalent in the higher education institutions (HEIs) of developing countries. Before the structures that lead to the second order digital divide could be explained the interlocking dynamics of ICT adoption needed to be identified. Structuration Theory was employed as a sensitising tool for collecting, analysing, and interpreting qualitative data for this interpretivist research. Novel qualitative data were collected from a purposive sample drawn from a single HEI of Zimbabwe, a developing country of high literacy. Directed content analysis generated insightful explanations of the structures leading to the second order digital divide at the HEI case. Preliminary analysis based on a deductive logic approach identified signification, domination, and legitimation as some of the structures leading to the second order digital divide at the HEI case. Further analysis based on an inductive logic approach revealed additional belief, institutional and governance structures which manifested from the interlocking dynamics of ICT adoption, involving resources, leadership, adoption behaviours and empowerment. These findings contributed to practice by explaining the underlying structures of the second order digital divide, for the benefit of ICT4D researchers, and by suggesting interventions to HEI policy-makers for reducing the second order digital divide. The results also make an iv explanatory contribution to theory by presenting a model of the interlocking dynamics of ICT adoption for theorising about the complex second order digital divide.
217

Bring Your Own Device (BYOD) adoption in South African SMEs

Akin-Adetoro, Adedolapo January 2016 (has links)
The advancement in technological development is now altering the conventional order in the diffusion of IT innovation from a top-down approach (organisation to employees) to a bottom-up approach (employees to organisation). This change is more notable in developed economies and has led to the Bring Your Own Device (BYOD) phenomenon which promises increased productivity for employees and their organisations. There have been several studies on the corporate adoption of BYOD but few have investigated the phenomenon from a small and medium enterprise (SME) perspective and from developing countries specifically. This study investigated the BYOD phenomenon in South African SMEs. The goal was to identify contextual factors influencing BYOD adoption with the purpose of understanding how these factors shaped and reshaped by SME actions. The Perceived EReadiness Model (PERM) was adopted to unearth contextual BYOD adoption factors, while the Structuration Theory was adopted as the theoretical lens from which the social construction of the BYOD phenomenon was understood. The study adopted an interpretive stance and was qualitative in nature. Data was collected from SMEs using semi-structured interviews, and analysed using a thematic analysis approach. The findings show that for BYOD to be adopted and institutionalized in an SME there needs to be organisational readiness in terms of awareness, management support, business resources, human resources, employees' pressure, formal governance, and technological readiness. Specifically, business resources, management support and technological readiness were perceived to be of the outmost importance to the success of BYOD. Environmental factors of market forces, support from industry, government readiness and the sociocultural factor are identified. Findings from the structuration analysis reports the presence of rules and resources (structures) which SMEs draw upon in their BYOD actions and interactions. It provides understanding on the guiding structures such as "no training" and "no formal governance" within which BYOD meanings are formed, and actions such as allowing employees to use their devices to access organisational resources without the fear of security breaches and data theft, are enacted. While it is true that the successive adoption of ICTs in organisation depends on the availability of a conducive formal policy, findings in the study show that SMEs used their business resources and management support as guiding structures of domination which were legitimized by internal informal verbal rules, lack of an institutional BYOD specific policy, minimal industry support; and the presences of social pressure.
218

Power relations among stakeholders in the implementation of national ICT policy: case of Malawi

Makoza, Frank January 2017 (has links)
Purpose: Recent years have seen a growing number of low-income countries formulating and implementing national Information and Communication Technology (ICT) policies with the aim of supporting their socio-economic development agendas. For the majority of these countries, this exercise has been fraught with numerous challenges such as lack of resources; limited support for legal and regulatory frameworks; over-dependence on donors; lack of expertise; lack of implementation strategies; lack of policy championship; and limited participation of stakeholders. Consequently, the intended policy outcomes have not been adequately realised. To mitigate some of the challenges, there have been calls for promotion of more inclusive stakeholders participation in the formulation and implementation of national ICT policies. However, stakeholder participation may not be a silver-bullet to addressing policy implementation challenges since participation itself may be beset with power relations due to differences in beliefs, norms and values of the stakeholders themselves. The study analyses how power relations among stakeholders affect implementation of the national ICT policy. Using the case of Malawi, this study focuses on the implementation of national ICT policy in the context of a developing country. Research methodology: The study was premised in a critical research paradigm and used Critical Social Theory to analyse the interactions and practices of policy stakeholders in the execution of activities for the national ICT policy. The study analyses policy documents and interviews to highlight issues of domination, exclusion and assumptions in the national ICT policy implementation. Key findings: Power relations affected the recruitment and the implementation of the ICT policy. The government controlled the recruitment of stakeholders in the national ICT policy, however, other stakeholders demanded their inclusion in the policy implementation network. The recruitment process resulted in the membership in policy implementation network was elitist. The stakeholders had different interests in the policy and some performed multiple roles in policy implementation activities. The stakeholders mobilised and used different forms of resources to advance their interests in policy implementation activities. The differences in access to resources and capacity to mobilise these resources (legal, financial, information, human capacity) among the stakeholders led to power relations challenges. However, the exercise of power led to the circulation of power among the stakeholders and affected the policy implementation activities such as institutional settings, collaborations among stakeholders, coordination of policy and oversight of the policy. Power relations, to some extent, supported the dominant discourses that shaped the policy implementation to focus on demand perspective of ICTs, including ICT infrastructure initiatives, legal and regulatory frameworks. Value of the study: The study contributions are twofold: First, the study suggests theoretical propositions for explaining power relations among stakeholders in the implementation of national ICT policy; and second, the study makes recommendations for policymakers and actors in Malawi where there is urgent need to address socio-economic challenges and to improve the well-being of citizens using ICTs.
219

The impact on organisational performance as a result of investment in self-service technology within the South African financial services industry

Leak, Gerald January 2017 (has links)
The advent of self-service technology (SST) and the adoption thereof has occurred in many industries and sectors globally. The financial services and banking sector embraced the SST transformation and invested heavily into this channel including the South African industry. This study aims to understand the causal relationship between the investment into the SST channel and the impact it has on organisational performance within the South African context. This research exercise applied a single unit of analysis case study research strategy to examine the impact on the organisation's various performance criteria, namely profitability, productivity, cost efficiency and intangible benefits as a result of a SST investment strategy. Qualitative data was collected from interviews with key informants from the selected organisation and analysed thematically. The study adopted a theory based deductive approach using the DeLone and McLean model of IS success (2003) as its underlying research framework. The findings of this study deduced that with an appropriate investment strategy in SSTs, there would be a positive impact on the net benefits of the organisation with an explicit relationship dynamic. This study lends support to earlier studies of this nature, particularly with regard to the SST channel offering, as there is a lack of literature due to the evolution of perception and recency of this technology channel. The relationship dynamic aspects between the constructs of this study also contributes to the closing of gaps within the body of knowledge that exists. However it must be noted that these findings are based on a single unit of analysis case study research strategy which connotes limitations in terms of generalisations.
220

Attitudes and perception of healthcare workers in health facilities with regards to the 'Intention to Use' of the Road to Health Booklet (RtHB)

Khumalo, Nanziwe Kelly January 2016 (has links)
Introduction: That low and middle income countries (LMICs) are plagued with high burdens of disease and limited health resources is well documented in the literature. These two realities necessitate the availability of good quality and reliable information to enable the efficient distribution of recourses and services. Growing recognition of the importance of health information has seen the introduction of numerous health information systems (HIS). The goal of these HIS is to attain preventative and curative treatment for those that need them, in adequate quantities, promptly, reliably and at equitable cost. Amongst the variety of HIS is the Road-to-Health Booklet (RtHB) in South Africa. This is a paper-based, patient-held medical record given to new mothers, intended to monitor all contact children have with the healthcare system. Due to the dearth of local research and increasing need for strong HIS, more research is needed in the implementation of the HIS and its use by healthcare workers (HCWs) in the African context. Methods: The aim of this study is to explore and understand the influence HCWs' attitudes and perceptions have on the implementation of the RtHB within the Khayelitsha Sub-District of Cape Town, South Africa. A qualitative case study was conducted utilising in-depth interviews, naturalistic observations, document review and mind mapping to explore HCWs' attitudes and perceptions on the RtHB. A combination of purposive and snowball sampling was used to identify participants with insights on the RtHB.

Page generated in 0.1053 seconds