• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 184
  • 141
  • 51
  • 25
  • 9
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 470
  • 177
  • 99
  • 86
  • 77
  • 67
  • 65
  • 60
  • 59
  • 56
  • 49
  • 42
  • 39
  • 38
  • 37
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

Hot och våld - En del av jobbet? : En kvalitativ studie om socialtjänstens säkerhetsarbete med hot och våld. / Threats and violence - A part of the job? : A qualitative study of the social services´ security work with threats and violence.

Ivarsson, Caroline, Hellman, Tess January 2019 (has links)
Titel: ”Hot och våld - en del av jobbet?” - En kvalitativ studie om socialtjänstens säkerhetsarbete med hot och våld. Författare: Tess Hellman och Caroline Ivarsson Syftet med denna studie är att undersöka hur ett urval av socialkontor arbetar med säkerhetsfrågor avseende hot och våld. Studiens frågeställningar är följande: ❖ Vilket säkerhetsarbete har socialkontoren avseende hot och våld? ❖ Hur arbetar socialsekreterare innan, under och efter ett klientmöte som befaras som hotfullt eller otryggt? ❖ Hur upplever socialsekreterare att deras säkerhetsarbete avseende hot och våld fungerar på arbetsplatsen? Studien är kvalitativ och empiri har insamlats via intervjuer från sex socialsekreterare som arbetar på olika socialkontor i Mellansverige. Empirin har tolkats genom innehållsanalys där följande huvudteman framkommit: Beskrivning av säkerhetsarbete, Beskrivning av rutiner samt Beskrivning av respondenternas upplevelser. Empirin har sedan analyserats utifrån tidigare forskning samt teorierna Normalisation Process Theory och KASAM. I resultatet framkommer att de olika socialkontoren som respondenterna företräder arbetar olika med hot och våld. En del respondenter har fått utbildning och har handledning. Det finns rutiner och riktlinjer för hur man ska arbeta förebyggande med hot och våld men även åtgärder efter att någonting har hänt. Några rutiner som ska följas är att larm finns tillgängliga vid klientmöten samt att vid hembesök ska det vara två socialsekreterare. Socialsekreterarna följer inte alltid de rutiner som finns. En orsak till detta är att “hot och våld” uppfattas olika. Det som någon anser är hotfullt kanske någon annan inte uppfattar likadant. / Title: “Threats and violence - A part of the job?” - A description of the social services´ security work with threats and violence. Authors: Tess Hellman and Caroline Ivarsson The purpose of this study is to investigate how a selection of social services works with security issues regarding threats and violence. The main questions are: ❖ Which security work does the social services have regarding threats and violence? ❖ How does social workers work before, during and after a client meeting when there is a fear that the meeting will become threatful or unsafe? ❖ How does social workers experience their safety work at their workplace regarding threats and violence? The study is qualitative and empirical data has been collected through interviews from six social workers that works at various social offices in central Sweden. The empirical data has since been interpreted through a content analysis where the following main themes have emerged: Description of security work, Description of routines and Description of the respondent’s experiences. The empirical data has been analysed based on previous research and the theories Normalization Process Theory and KASAM. The result shows that the various social offices that the respondent´s represent work differently with threats and violence. Some respondents have received education and have guidance. There are routines and guidelines for how to work with prevention with threats and violence, but also intervention after something has happened. Some routines that must be followed are that alarms are available at client meetings and at home visits it must be two social workers. The social workers do not always follow the routines that exist. One reason for this is that “threats and violence” are perceived differently. What someone thinks is threatening may not be threatening to someone else.
202

Analysis of security issues in cloud based e-learning

Kumar, Gunasekar, Chelikani, Anirudh January 2011 (has links)
Cloud based E-Learning is one of the booming technologies in IT field which brings powerful e-learning products with the help of cloud power. Cloud technology has numerous advantages over the existing traditional E-Learning systems but at the same time, security is a major concern in cloud based e-learning. So security measures are unavoidable to prevent the loss of users’ valuable data from the security vulnerabilities. Cloud based e-learning products also need to satisfy the security needs of customers and overcome various security threats which attack valuable data stored in cloud servers.So the study investigates various security issues involved in cloud based e-learning technology with an aim to suggest solutions in the form of security measures and security management standards. These will help to overcome the security threats in cloud based e-learning technology. To achieve our thesis aim, we used theoretical and empirical studies. Empirical study is made through the information gathered through various cloud based e-learning solution vendors websites. And the theoretical study is made through the text analysis on various research articles related to our subject areas. And finally the constant comparative method is used to compare the empirical findings with the facts discovered from our theoretical findings. These analysis and research studies are leads to find various security issues in cloud based e-learning technology. / Program: Magisterutbildning i informatik
203

Sjuksköterskors erfarenheter av hot och våld inom somatisk akutsjukvård: En beskrivande litteraturstudie.

Mokvist, Elin, Ahlgren, Gustaf January 2019 (has links)
Bakgrund: Hot och våld kan yttra sig både verbalt och fysiskt samt leda till fysiska och/eller psykiska skador på individen. Olika typer av hot och våld kan vara sexuella trakasserier eller andra sätt att hota en person på. Sjuksköterskan har ett stort ansvar gällande omvårdnaden, detta i kombination med dålig struktur och underbemanning på akutmottagningar kan sätta sjuksköterskan i en utsatt position. Syfte: Syftet med denna litteraturstudie var att beskriva sjuksköterskors erfarenheter av hot och våld inom somatisk akutsjukvård. Metod: En deskriptiv litteraturstudie gjordes med 12 vetenskapliga artiklar, vilka söktes fram i databasen Medline via sökmotorn PubMed. Huvudresultat: Resultatet visade att hot och våld var vanligt förekommande. Sjuksköterskor hade erfarenheter av att bli utsatt för både verbalt och fysiskt hot och våld. Resultatet visade även att anhöriga oftast var förövaren i dessa situationer och att triagearbetet kunde vara en bidragande faktor. Utsatthet för hot och våld kunde ge en känsla av rädsla och ångest, inte bara på arbetet utan även i privatlivet. Relevanta åtgärder skulle kunna vara att höja närvaron av säkerhetspersonal, installera överfallslarm och ha ett bra teamarbete. Slutsats: Litteraturstudien visade på att det fanns erfarenheter av verbalt samt fysiskt hot och våld. Studien visade att detta känslomässigt påverkar den utsatta individen. De åtgärder som många tyckte behövdes var att öka tillgången till säkerhetspersonal samt att bära överfallslarm. Den här studien kan öka medvetenheten på området, vilket i sin tur kan leda till förbättrade arbetsrutiner för att öka tryggheten för sjuksköterskor inom akutsjukvård. Med trygga sjuksköterskor kan det bidra till en bättre omvårdnad av patienterna. / Background: Violence could be both verbal and physical and can lead to physical and psychological damages for the victim. Different types of violence can be sexual harassment other ways to threat a person. The nurse has a big responsibility regarding the care of patients. Together with a bad structure and lack of personnel in the emergency care, could it put nurses in an exposed situation. Aim: The aim of this study is to describe nurses’ experiences of threat and violence in the somatic emergency care. Method: A descriptive literature review was conducted with 12 scientific articles that was found by using the database Medline via the search engine PubMed. Findings: This study found that threats and violence are an existing problem. The findings showed that nurses had experience of both verbal and physical threats and violence.The results also showed that relatives were usually the perpetrator and triage could escalate a situation. Exposure of threats and violence could give an emotional impact, both at work and in private life. Relevant actions could be to increase the presence of security personnel and assault alerts as well as to have good teamwork. Conclusion: The literature review found that nurses have experiences of verbal and physical threats and violence, this left an emotional impact on the exposed individual. The measurements nurses’ see as the most important in order to reduce the threats are to raise the presence of security personnel and to wear assault alerts.This study increases the awareness of threats and violence within emergency care. Increased awareness can lead to improved working conditions and procedures which increases the safety of the nurses. Nurses who are secure at the workplace will give better care to the patience in emergency care.
204

Segurança na cadeia de suprimentos internacional : protocolo de gestão de risco para o transporte marítimo de cargas less than container load

Bonatto, Heitor January 2016 (has links)
A gestão das ameaças e dos riscos nas empresas tem se dedicado a estudar estes problemas, pelo viés de mercado, com o intuito de torná-las mais preparadas para enfrentar estes desafios. Nesse sentido, uma série de instrumentos de análise diagnosticaram que as ameaças e os riscos fazem parte da natureza das relações empresariais. Dentre as inúmeras relações que uma empresa estabelece para atingir os seus objetivos, destacam-se as que estão inseridas em um sistema denominado “cadeia de suprimentos” que, em decorrência do processo de globalização tornou-se internacionalizada. As empresas, ao prolongarem suas cadeias de suprimentos “além fronteiras”, estão submetidas, às influências do ambiente econômico, geopolítico, social e histórico. Nesses ambientes, o ano de 2001 originou uma série de estudos de gestão de risco que identificaram, nas ameaças externas ou exógenas, isto é, as que estão fora do viés de mercado, a possibilidade de tornar a cadeia de suprimentos internacional insegura. Tais ameaças se configuram em ações da natureza e ações praticadas pelo ser humano, por meio de atos criminosos, como, o terrorismo, o tráfico, o contrabando e a pirataria marítima Além das empresas, os países criaram regimes internacionais que buscaram proteger as cadeias de suprimentos, principalmente, em seu sistema de transporte, destacando-se o modo chamado “marítimo”, em razão da sua intensa utilização para transportar cargas. O presente estudo tem como objetivo propor um protocolo de gestão de risco para o transporte marítimo de cargas “less than container load”, para tornar a cadeia de suprimentos internacional mais segura. A metodologia utilizada nesta pesquisa, foi descritiva e documental, já que descreveu o processo de operacionalização e baseou-se na análise dos documentos, utilizados na gestão do transporte marítimo “less than container load”. Conclui-se, assim, que o operador de transporte multimodal, como responsável por operacionalizar uma forma de transportar cargas, a qual torna a cadeia de suprimentos insegura, tem condições e, principalmente, o dever de juntar-se aos outros atores, em prol do aumento da segurança do sistema. / The management of threats and risks in the company has been dedicated to study these problems by market bias in order to make them better prepared to face these challenges. In this regard a number of analytical tools diagnosed threats and risks as part of the business relations. Among the many relationships that a company established to achieve their goals, we highlight those that are embedded in a system called the supply chain, which as a result of the globalization process has become internationalized. Companies to extend their supply chains "across borders", are subject to the influences of economic, geopolitical, social and historical environment. In these environments, the year 2001 led to a series of risk management studies that have identified the external or exogenous threats, those outside the market bias, the possibility of making the chain of uncertain international supplies. Such threats are configured shares of nature and actions taken by humans, by means of criminal acts as terrorism, trafficking, smuggling and maritime piracy In addition to companies, countries have created international regimes that sought to protect supply chains, especially in its transport system, highlighting the called maritime, because of their heavy use to transport cargo. The thesis aims to propose a risk management protocol for the shipping cargo "less than container load" to make the international supply chain more secure. The methodology used was based on descriptive type and documentary because described the operational process and analized documents used in the management of shipping “less than container load”, In conclusion, the multimodal transport operator who is responsible for operating a means of transporting cargo , which makes the supply chain insecure supplies, has conditions , and especially the obligation to join the other actors , in favor of the increase system security.
205

Interagency Coordination of Security Operations in a Large U.S. Seaport

Levy, Edmund 01 January 2015 (has links)
Protecting U.S. transportation hubs against a wide variety of security threats, while avoiding undue interference with the normal operations of the hubs, is one of the greatest challenges facing security agencies. The problem addressed in this study was the limited information on the contributing factors to seaport security. The purpose of this case study was to explore issues that can inhibit efficiency of security agency operation and collaboration and to identify actions that have enhanced collaboration. Based on theories of organizational development, leadership, and security tradecraft, this study examined the activities related to maintenance of security at a large California seaport. Research questions focused on the types of relationships that exist among supervisors and employees, how these relationships were formed, types of conflicts among organizations, and methods of task allocation among agencies. Individuals who worked for security agencies were randomly selected for participation (n =20). Data gathering was primarily through face-to-face interviews in an open-ended format and augmented by observations of people working within the research environment. An inductive approach to data collection, with open and axial coding, was used to identify themes and patterns. Key findings included themes of trust among seaport security personnel and threats such as smuggling, sabotage, and terrorism. Conclusions and recommendations may help security officials improve the efficiency and effectiveness of security resources. Positive social change may result from enhanced measures that increase security while avoiding threats to commercial activity and individual civil liberties.
206

Bridging the distance : children’s strategies on the internet

Dunkels, Elza January 2007 (has links)
<p>This thesis deals with the following questions: What do children find negative on the Internet? What counter strategies do they use? How have they developed these strategies? The method used is one-to-one online interviews and the analyses are qualitative in nature. The sample is children in grade 6 of the Swedish compulsory school, aged between 11 and 13. 104 children, 52 girls and 52 boys, from different parts of Sweden were interviewed.</p><p>The media debate seems to display consensus regarding what threats the Internet poses to young people. The conclusion of this thesis is, however, that children’s views of the Internet in many ways differ from the media related adult view. The children of this study do not express a great deal of anxiety about the negative sides of the Internet. They are aware of, and can describe many downsides but these are not present in their everyday use of the Internet. Digging deeper it turns out that many children have in fact well-developed counter strategies. However, these strategies are not conscious in the sense that the children discuss them. Instead, they seem integrated in their online environment. The counter strategies have been developed by the children alone or together with peers. In some, but remarkably few, cases adults have been giving tips or teaching the children strategies. Nevertheless, the study does not paint a picture of naïve children, unable to see actual threats, but of responsible young citizens who are aware of the threats that exist in their online setting – sometimes from personal experience – and have developed methods to avoid such threats.</p>
207

ARTSY : A Reproduction Transaction System

Björk, Mårten, Max, Sofia January 2003 (has links)
<p>A Transaction Reproduction System (ARTSY) is a distributed system that enables secure transactions and reproductions of digital content over an insecure network. A field of application is reproductions of visual arts: A print workshop could for example use ARTSY to print a digital image that is located at a remote museum. The purpose of this master thesis project was to propose a specification for ARTSY and to show that it is technically feasible to implement it. </p><p>An analysis of the security threats in the ARTSY context was performed and a security model was developed. The security model was approved by a leading computer security expert. The security mechanisms that were chosen for the model were: Asymmetric cryptology, digital signatures, symmetric cryptology and a public key registry. A Software Requirements Specification was developed. It contains extra directives for image reproduction systems but it is possible to use it for an arbitrary type of reproduction system. A prototype of ARTSY was implemented using the Java programming language. The prototype uses XML to manage information and Java RMI to enable remote communication between its components. It was built as a platform independent system and it has been tested and proven to be operational on the Sun Solaris platform as well as the Win32 platform.</p>
208

Security in VoIP-Current Situation and Necessary Development

Gao, Li Li January 2006 (has links)
<p>Nowadays, VoIP is getting more and more popular. It helps company to reduce cost, extends service to remote area, produce more service opportunities, etc. Besides these advantages, VoIP also put forward security problems.</p><p>In this paper, we introduce the popular protocols in VoIP and their security mechanisms, by introducing threats to VoIP, we point out the vulnerabilities with the security mechanisms of each VoIP protocol, and give recommendation for each VoIP protocol. In the conclusion part, we evaluate the vulnerabilities of each protocol, and point out in the future, with better protocol architecture, enhanced security policies, VoIP will has a brighter future.</p>
209

Recent transformations in West-Coast Renosterveld: patterns, processes and ecological significance.

Newton, Ian Paul. January 2008 (has links)
<p>This&nbsp / thesis&nbsp / examines&nbsp / the&nbsp / changes&nbsp / that&nbsp / have&nbsp / occurred&nbsp / within&nbsp / West-Coast Renosterveld within&nbsp / the&nbsp / last 350 years, and assesses&nbsp / the viability of&nbsp / the&nbsp / remaining fragments.</p>
210

Bridging the distance : children’s strategies on the internet

Dunkels, Elza January 2007 (has links)
This thesis deals with the following questions: What do children find negative on the Internet? What counter strategies do they use? How have they developed these strategies? The method used is one-to-one online interviews and the analyses are qualitative in nature. The sample is children in grade 6 of the Swedish compulsory school, aged between 11 and 13. 104 children, 52 girls and 52 boys, from different parts of Sweden were interviewed. The media debate seems to display consensus regarding what threats the Internet poses to young people. The conclusion of this thesis is, however, that children’s views of the Internet in many ways differ from the media related adult view. The children of this study do not express a great deal of anxiety about the negative sides of the Internet. They are aware of, and can describe many downsides but these are not present in their everyday use of the Internet. Digging deeper it turns out that many children have in fact well-developed counter strategies. However, these strategies are not conscious in the sense that the children discuss them. Instead, they seem integrated in their online environment. The counter strategies have been developed by the children alone or together with peers. In some, but remarkably few, cases adults have been giving tips or teaching the children strategies. Nevertheless, the study does not paint a picture of naïve children, unable to see actual threats, but of responsible young citizens who are aware of the threats that exist in their online setting – sometimes from personal experience – and have developed methods to avoid such threats.

Page generated in 0.0931 seconds