• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 177
  • 136
  • 51
  • 25
  • 9
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 458
  • 172
  • 94
  • 85
  • 72
  • 66
  • 62
  • 59
  • 57
  • 55
  • 48
  • 41
  • 39
  • 36
  • 36
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Dynamics of Napier stunt phytoplasma between the cultivated and wild graminae in East Africa / George Ochieng Asudi

Asudi, George Ochieng January 2015 (has links)
Cultivation of Napier grass, Pennisetum purpureum, the most important livestock crop in East Africa is severely constrained by Napier Grass Stunt (NGS) disease. The disease spreads via an insect vector or vegetative propagation of infected plant material and is caused by a phytoplasma. This necessitates the development of an integrated management approach for the disease. Therefore, objectives of this study were to assess the incidence of the disease and its severity, to identify its wild hosts and farmers‟ knowledge on these hosts, to assess the threat of NGS disease to cultivated grasses and to establish the role of wild inoculum sources in its spread. The study showed NGS incidence ranging from 33% in Uganda to 95% in Kenya with 49% of the farmers interviewed, being able to discern NGS disease by its symptoms. Most farmers cited roguing and use of alternative fodder grasses as control measures, making these strategies the likely components of an integrated management approach for the disease. Responders named Sedge grass (Cyperus spp.) and Star grass (Cynodon dactylon) as the likely hosts of diseases caused by phytoplasma. Phytoplasmas were detected in leaves of 11 of 33 wild grass species collected using polymerase chain reaction (PCR) based on the highly conserved phytoplasma-specific 16S ribosomal DNA fragment. Sequence determination of amplified PCR fragments revealed the presence of NGS-related phytoplasmas in 11 grass species, Bermuda grass white leaf (BGWL) phytoplasmas in three and goosegrass white leaf (GGWL) in two wild grass species, showing that the geographical distribution and diversity of phytoplasmas and their grass hosts are greater than previously thought. The relationships between NGS and Hyparrhenia grass white leaf (HGWL) phytoplasmas were determined using sequences based on secA gene and immunodominant protein (imp). Results showed a very low genetic diversity between NGS and HGWL and produced a phylogenetic tree congruent to that produced by the 16S, affirming the inclusion of HGWL in the 16SrXI group. NGS phytoplasma was transmissible to food crops through Maiestas banda Kramer (Hemiptera: Cicadellidae) under screen-house conditions. With 56.3%, Saccharum officinarum showed the highest infection level followed by Eleusine coracana with 50%, Sorghum bicolor with 43.8%, Oryza sativa with 31.3% and Zea mays with 18.8%. All the phytoplasma-infected plants were asymptomatic except S. officinarum plants, which showed mild to moderate symptoms consisting of foliar yellow leaves and bright white or yellow midribs. This hints that besides wild hosts, food crops may also serve as alternative source of inoculum enabling a complex NGS disease cycle, which may add to challenges in the development of the disease control strategies. However, failure by M. banda to transmit HGWL and BGWL phytoplasmas back to Napier grass is an indication that it could be the exclusive vector of NGS. Therefore, there is need to initiate transmission trials using planthoppers and leafhoppers occurring on HGWL and BGWL phytoplasma-infected grasses to determine whether insect vectors capable of transmitting phytoplasmas from native grasses to Napier grass, are present in the region. / PhD (Environmental Sciences), North-West University, Potchefstroom Campus, 2015
72

Hotbilder och dess utmanare : De mediala opinionsbildarnas filtrering av hotbilder och maktutövande i den svenska Nato-debatten

Sigfrid, Olof January 2016 (has links)
This study examines perceptions of threats and the actors in the Swedish Nato-debate. The particular sequence of debate which is investigated took place in Swedish media during the summer of 2015. The objects examined in this study are the actors involved in the debate and the perceptions of threats formed by these actors. Lack of knowledge regarding how debates are formed by actors, through their perceptions of threats, makes us unable to fully comprehend how and why these perceptions are formed. This lack of knowledge makes us unable to evaluate the debate beyond the claims of the participating actors. This study seeks to explain how perceptions of threats in the chosen debate-sequence were formed through filtration. Theory considering filtration of perceived threats states that the actors forming perceived threats does this through psychological-, bureaucratic-, political- and medial processes. Actors and their perceived threats can also exercise power. Whether the actors and their discourses have exercised power in the Swedish Nato-debate is examined through a relational- and productive power perspective. Results show that the participating actors examined, scientists, journalists and politicians, have all formed perceived threats through different forms of filtration, and all actors have in some way exercised relational or productive power in the debate.
73

Hot och våld i arbetslivet : - En kvalitativ studie om socialsekreterares utsatthet

Hugosson, Louise January 2010 (has links)
The purpose of this study was to investigate how social services workers describe, the risk of being exposed to threats and violence in their profession. Six social services workers were interviewed, four from the Welfare Office in a major city and two from the Child and Family Services in a minor city. Results showed that the majority of social services workers consider themselves exposed in their profession, meaning that they feel there's a risk of a violent or threatening situation occurring in their work situation. All interviewees had experiences from some sort of threat or violence in a work related context and they attested that non-personal assaults, such as threats made through telephone, email and answering machines are more common than verbal assaults made in personal meetings. Being prepared and listening to ones intuition is a way of dealing with exposure when meeting with a client. By working in pairs you can decrease the risk of being exposed in a violent/threatening situation. Several of the interviewees pointed out that they are more tolerant to certain clients in order to cope with their work situation.
74

Constructing a Cyber Preparedness Framework (CPF): The Lockheed Martin Case Study

Beyer, Dawn Marie 01 January 2014 (has links)
The protection of sensitive data and technologies is critical in preserving United States (U.S.) national security and minimizing economic losses. However, during a cyber attack, the operational capability to constrain the exfiltrations of sensitive data and technologies may not be available. A cyber preparedness methodology (CPM) can improve operational capability and cyber security. The CPM enables a corporation to (a) characterize cyber threats; (b) determine the level of preparedness necessary to ensure mission success; (c) facilitate strategic planning for cyber security (CS); and (d) establish priorities for CS investment planning and management decisions. The cyber preparedness framework (CPF) underlies the CPM. A corporation's leadership articulates its fundamental approach to risk management (RM) and mission assurance, and determines its target level of preparedness. Typically, corporations utilize the CPF to (a) characterize the caliber of the threat; (b) assess the technical and operational capabilities to counter the threat; and (c) develop the governance and processes necessary to achieve its cyber preparedness level. The problem that was investigated in this case study was how to construct a CPF for Lockheed Martin (LM) that works in conjunction with a risk management process (RMP). The goal was to extend the CPF into an RMP to construct a risk management framework (RMF) paradigm that can aid similarly large-sized private sector U.S. Government (USG) contractors in implementing the CPM. In this investigation, the author identified the corporate (a) security categorization, (b) cyber threats, (c) cyber threat level, (d) cyber preparedness level, (e) capabilities the corporation should utilize to counter cyber threats, and (f) governance and processes necessary to achieve the cyber preparedness level for a large-sized private sector USG contractor. The results of this investigation were organized in terms of RMP phases. Based on the results, the author constructed an RMF paradigm that can aid similarly large-sized USG contractors in implementing a CPM.
75

Ekologinio saugumo Baltijos jūros regione užtikrinimas: HELCOM vaidmens Švedijoje ir Lietuvoje palyginimas / Ecological security in the Baltic sea region: a comparison of the Helsinki Commission’s role in Lithuania and Sweden

Černiauskaitė, Inga 12 June 2009 (has links)
Svarstymai apie ekologinio saugumo sampratą bei šio sektoriaus reikšmę valstybių nacionalinių interesų kontekste prasidėjo dar praeito šimtmečio viduryje. Dėl spartaus ekonominio vystymosi kilo daugybė aplinkos saugumo problemų, tiek visame pasaulyje, tiek Baltijos jūros regione. Ekologinio saugumo problemos bei jų sprendimas savo prigimtimi peržengia nacionalinių valstybių sienas. Dėl šios priežasties pradėtos kurti tarptautinės institucijos arba režimai, atsirado poreikis tarptautiniam bendradarbiavimui. Siekiant spręsti aplinkos saugumo klausimus Baltijos jūros regiono valstybės įkūrė Helsinkio Komisiją bei aktyviai dirba šioje srityje. Pagrindinis darbo tikslas yra susipažinti ekologinio saugumo problematika Baltijos jūros regione, įvardijant pagrindinus tikslus bei iššūkius, bei jų įgyvendinimo galimybes ir efektyvumą. Siekiant geriau atskleisti temą darbe yra lyginami Švedijos ir Lietuvos atvejai. Pagrindiniai darbo uždaviniai yra apibrėžti valstybių nacionalinių interesų saugumo sampratą ir plačiau apžvelgti pagrindinius ekologinio arba aplinkos saugumo apibrėžimus ir perspektyvas politikos mokslų teorijoje. Aptarti svarbiausias grėsmes ir iššūkius Baltijos jūros regiono ekologiniam saugumui, atkreipiant dėmesį į pagrindines aplinkos saugumo problemas su kuriomis susiduria Švedija ir Lietuva. Susipažinti su Helsinkio Komisijos vaidmeniu Baltijos jūros regiono ekologinio saugumo srityje. Siekiant įgyvendinti darbo tikslą bei uždavinius naudojamas aprašomasis... [toliau žr. visą tekstą] / Ecological security problems, such as climate change and severe air and water pollution, have reached global attention over the last couple of decades. Environmental threats are usually caused not only by one state and can have impacts well beyond national borders. Hence, there is an obvious need for cross-national cooperation. The main object of this study is the challenges of ecological security in the Baltic Sea region and the efforts to meet them through cooperation within the Helsinki Commission. The Helsinki Commission is one of the main institutions seeking to ensure marine environment protection in the Baltic Sea through international cooperation between Denmark, Estonia, Finland, Germany, Latvia, Lithuania, Poland, Russia, Sweden and the wider European Union. To better understand the role and possible effects of the Helsinki Commission, a comparison between Sweden and Lithuania is being made. The main focus is on recent developments of ecological security, particularly after the adoption of the Helsinki Commission’s Baltic Sea Action Plan in 2007. The central question of this work is: what are the main ecological security problems and objectives set by the Helsinki Commission and what are the challenges for implementation in Sweden and Lithuania? Descriptive, comparative, and analytical research methods are employed in order to analyze this question. Numerous studies have revealed that pollution, caused by the agricultural sector, marine transportation and other... [to full text]
76

U.S. coercive diplomacy towards North Korea

Lee, Giseong January 2009 (has links)
Since the end of the Korean War tensions have continued on the Korean peninsula. This research focuses on the role of coercive persuasion employed by the United States when North Korea provoked several crises from the late 1960 to the early 1990s.  The case studies include the USS <i>Pueblo</i> incident in 1968, the EC-121 incident in 1969, the axe-murder incident in 1976, and the North Korean nuclear inspection crisis in 1993-94.  In addition to examining crisis negotiations, each case introduces an overview of the changing environment surrounding the Korean peninsula, and analyses North Korea’s motives and intentions in causing crises during that given period. In the theoretical debate on international relations, this study introduces two distinct theories about the explanation of state behaviour.   On the one hand, realists predict that states seek security and survival as the most important objective of their national interests when they are faced with outside threats.  Culturalists meanwhile seek to explain states’ behavioural patterns as distinct and different from state to state due to their unique strategic cultures, which are deeply rooted in historical experience, national self-image, and unique ideology.  Overall, the North Korean responses in the several crises under investigation could be best explained by a combination of these two theories, but this study aims at evaluating the persuasiveness of the two theories in the chosen case histories of US-North Korean relations. To assess the cases more thoroughly with historical evidences, this study draws on primary source materials.  It relies substantially on declassified US government documents, although it also examines South Korean and North Korean materials in order to offer a balanced and objective account of the crises.
77

Transformation of the Israel Defense Forces an application of the U.S. military transformation?

Arikan, Mehmet Okan 12 1900 (has links)
Approved for public release; distribution in unlimited. / The thesis studies the Israel Defense Forces' (IDF) transformation in the context of the U.S. military transformation. The thesis argues that the uniqueness of the U.S. military transformation does not prevent other militaries from applying the relevant concepts and considers the IDF as a good candidate for such a demonstration. Therefore, the thesis explores the U.S. military transformation as a model to be benefited in the IDF's continuing transformation. The thesis also studies IDF from many perspectives to identify the transformational imperatives and the relevance of the current IDF transformational efforts. Main areas of interest are the Israeli security environment, societal transformation, and the features of the IDF's transformational efforts. During the analysis, the thesis discovers weak points concerning, both, the U.S. military transformation and the IDF's current organization. The examination of the IDF's transformation in relation to the U.S. transformation reveals similarities between the two transformations and comes up with recommendations, primarily for the IDF, but to a lesser extent for the U.S. military. / First Lieutenant, Turkish Army
78

Trust and security risks in mobile banking

Messaggi Kaya, Monica January 2013 (has links)
With the development and growth of mobile technologies, mobile phones enable users to perform a number of different tasks with their devices: from sending simple text messages, checking e-mails and browsing the internet, to running elaborated applications. Nowadays, the mobile phone platform creates great opportunities for businesses, especially due to its capabilities and population coverage: the number of mobile subscriptions approaches global population figures. In order to explore such opportunities, most banks have already launched their mobile applications and/or re-designed mobile version of their websites. One of the benefits of using mobile banking is the possibility for users to carry out bank transactions, such online payments or transfers, at anytime and anywhere. Expectations for the adoption of mobile banking were high; however, it represents about 20% of mobile phone users at the present. One factor has been recognised as being a strong reason for users not to adopt mobile banking: their concerns about security. This dissertation focuses on the relationship between the trust users have in mobile banking and the security risks that the use of mobile devices potentially pose. A questionnaire was created in order to gather users’ perception of security about mobile banking, and its results compared with recognised security issues.
79

A Prudent Access Control Behavioral Intention Model for the Healthcare Domain

Mussa, Constance Cecilia 01 January 2011 (has links)
In recent years, many health care organizations have begun to take advantage of computerized information systems to facilitate more effective and efficient management and processing of information. However, commensurate with the vastly innovative enhancements that computer technology has contributed to traditional paper-based health care information systems, are security vulnerabilities that have potentially devastating effects on these systems. To ensure the confidentiality, integrity, and availability of information and to ensure compliance with the Security Rule of the Health Insurance Portability and Accountability Act (HIPAA), health care organizations have implemented a number of security controls. Although the objectives of these controls are understood and acknowledged by users of computerized patient care information management systems, the controls are sometimes circumvented or ignored. The purpose of this study was the development of an instrument that measures key determinants of healthcare professionals' prudent access control behavior. The study examined healthcare professionals' prudent access control behavior using a model that integrates the Theory of Planned Behavior (TPB) and the Health Belief Model (HBM). Two additional variables - information security awareness and perceived information security responsibility were incorporated into the model. Rather than focusing on a single behavior or a few specific behaviors, a category of behaviors was proposed. Results of the study indicate that the HBM and TPB constructs as well as the two additional constructs included in the model are indeed key determinants of healthcare professionals' intention to engage in prudent access control behavior that mitigate security threats. Additionally, results of the study provide support for the partial mediating effects of perceived benefits and perceived responsibility for information security on attitude, information security awareness, subjective norm, perceived behavioral control, and perceived severity. The study contributes to the IS knowledge domain by providing theoretically grounded explanations for a subset of prudent information security behaviors of healthcare professionals.
80

Sjuksköterskors upplevelser av att ha blivit utsatt för hot och våld inom akutsjukvård. : En litteraturöversikt / Nurses`experienceof being exposed to threats and violence in emergency care : A literature review

Merzuk Adem, Hayat, Kebrab Kidane, Salem January 2019 (has links)
Bakgrund: Hot och våld inom vården är ett växande problem både globalt och i Sverige. Dessa händelser inträffar särskilt inom akutsjukvården. Sjuksköterskor är en av de yrkesgrupper som mest löper risk att utsättas för hot och våld på grund av deras närhet till patienter och närstående. Inom akutsjukvården finns olika riskfaktorer som kan bidra till hot och våld. Konsekvenserna leder till ökade sjukskrivningar och försämrat välbefinnande samt ökat antal uppsägningar. Det kan påverka verksamhetens kostnader och därmed ökade kostnader för samhället. Syfte: Syftet var att beskriva sjuksköterskors upplevelser av att ha blivit utsatt för hot och våld inom akutsjukvård från patienter och närstående. Metod: Litteraturöversikten baserades på sammanställning och tolkning av tio vetenskapliga artiklar med både kvalitativ och mixad metod där två databaser genomsöktes. Artiklarnas analys gjordes enligt Friberg. Resultat: Litteraturöversiktens resultat sammanställdes i sex centrala teman: Hot och vålds psykiska inverkan, Hot och vålds fysiska inverkan, Hot och vålds sociala inverkan, Hot och vålds inverkan på yrkesutövning, Normalisering av hot och våld och sjuksköterskans upplevelser av brist på stöd. Diskussion: Resultatdiskussionen tar upp hot och vålds negativa konsekvenser såsom psykiska, fysiska och sociala välbefinnande samt förmågan att ge god vård. Sjuksköterskor upplevde att hot och våld var en del av arbetet trots dess negativa inverkan. Det fanns en avsaknad för stöd från verksamhet och ledning vilket resulterade i att hot och våld normaliserades. Utgångspunkt tas framförallt i Joyce Travelbee omvårdnadsteori med fokus på mellanmänskliga relationer. / Background: Threats and violence in health care is a growing problem both globally and in Sweden. These accidents occur especially in emergency care. Nurses are one of the professional groups most at risk of being subjected to threats and violence because of their proximity to patients and families. In emergency care there are various risk factors that may contribute to threats and violence. The consequences lead to increased sick leave and poorer welfare, but also increased number of layoffs. It can affect business costs and increase costs for society. Aim: The aim was to describe nurses’ experiences of having been subjected to threats and violence in emergency care of patients and families. Method: The literature review was based on the compilation and interpretation of the ten scientific articles with both qualitative and mixed method was searched in two databases. Articles analysis was done according to Friberg. Results: The literature review results were compiled in six central theme; Threats and violent mental influence, threats and violent physical influence, threats and violent social influence, threats and violent impact on the profession, Normalization of threats and violence and the nurse's perceptions of lack of support. Discussion:The result discussion addresses how threats and violence’s negative consequences such as mental, physical and social well-being and the ablity to provide good care. Nurses experienced threats and violence as a part of their job, despite the negative impact. They found no support from the company or the management, which resulted in that threats and violence became normalized. Starting points are taken primarily in Joyce Travelbee´s nursing theory with a focus on the concepts of interpersonal relationships.

Page generated in 0.0277 seconds