• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 222
  • 150
  • 121
  • 37
  • 34
  • 33
  • 24
  • 23
  • 16
  • 8
  • 7
  • 7
  • 7
  • 6
  • 4
  • Tagged with
  • 753
  • 126
  • 124
  • 84
  • 52
  • 49
  • 49
  • 47
  • 47
  • 45
  • 45
  • 44
  • 44
  • 41
  • 41
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

The effects of voting systems on voter participation : punch card voting systems in Ohio /

Fraser, Jeannette L. January 1985 (has links)
No description available.
162

DANISH GREEN CARD SCHEME: An Analytic Study of the Formulation of Conditions to Qualify

Barlach, Romelda January 2012 (has links)
To determine whether selective immigration policies are influenced by national experience and economic concerns, this research studies Denmark’s The Greencard scheme, and seeks to find the answer if the formulation of the conditions to be qualified will attract or repel the aspiring immigrant. Reasons such as immigration patterns, integration issues, and increasing pressure to the society contributes to the tendency and positive overall impression suggesting repulsive formulation. The content analysis of the research material amicably identified the object of signification and Western values in the definition of parameter to qualify. Although the reduced data showed the application of systematic distinctions in the process of differentiation, the subsequent analysis of the results inferred the intention of the country that is mutually beneficial. That, the basis of evaluation using a point system is designed to assess the likelihood that the immigrant will be able to find qualified work in Denmark. The result of this study revealed an interesting starting point in conducting further research. It will help the researcher to step forward in incorporating either opinion survey or interviews in order to generate an even better strength of results and a more generalized conclusion.
163

Intervening to Increase the ID-Checking Behavior of Cashiers: Cashier-Focused vs. Customer-Focused Approaches

Downing, Christopher O'Brien Jr. 11 June 2015 (has links)
The present four field studies explored the effectiveness of multiple prevention techniques designed to increase the frequency of cashiers' identification (ID)-checking behaviors from a customer-focused and cashier-focused approach. Studies 1 and 2 examined customer-focused approaches, whereas Study 3 examined a cashier-focused approach. Study 4 examined a combination of the cashier-focused and customer-focused approaches. From a customer approach, Study 1 investigated the use of four prompts (a no-prompt control, an antecedent only, an antecedent with a positive consequence, and an antecedent with a negative consequence) at encouraging cashiers to ask customers for their ID during a credit purchase. Research assistants (RAs) visited various stores and made credit purchases, while displaying one of the four prompts covering their card's signature line to the cashier during check-out. The results showed RAs were checked for ID the most when using the prompts containing the antecedent and consequence, which was checked for ID significantly more than the no-prompt control. Study 2 (also a customer approach) attempted to replicate Study 1 in a non-college community. Using a similar methodology as Study 1, the results showed RAs were checked for ID the most when using the prompt with the antecedent and positive consequence, which was checked for ID significantly more than the no-prompt control. From a cashier approach, Study 3 investigated the use of a goal-setting and prompt intervention led by the restaurant manager to increase the frequency of cashiers' ID-checking behavior. Using an A-B-A (Baseline-Intervention-Withdrawal) reversal design at one of two restaurants, the results showed the intervention restaurant's percentage of ID-checked purchases increased from Baseline to the Intervention phase. But, it decreased slightly during the Withdrawal phase, showing functional control but also some maintenance over the target behavior. The percentage of ID-checked purchases at the control restaurant was almost nonexistent throughout the study. Study 4 investigated the impact of using two intervention approaches (i.e., the customer and cashier approach) as opposed to one (i.e., the customer approach) to increase the frequency of cashiers' ID-checking behavior. While the A-B-A phases were occurring in the restaurants used in Study 3, RAs entered the restaurants and displayed an antecedent and positive consequence prompt to the cashiers during a credit purchase. The results of Study 4 partially supported the hypothesis. The cashiers in the intervention restaurant significantly checked more RAs for ID when two intervention approaches were combined than when only one intervention approach was used during Baseline, but not during the Withdrawal phase. / Ph. D.
164

Developing a Practical Intervention to Prevent Identity Theft: A Behavioral-Science Field Study

Downing, Christopher O'Brien Jr. 16 April 2010 (has links)
Cashiers' identification-checking behaviors were observed at two grocery stores with the aim to actively involve cashiers in decreasing credit-card fraud. After baseline observations, cashiers at one store received a participative goal-setting and feedback intervention, whereby they collaboratively set a store goal for checking customers' identification. Over 23 days, the cashiers received one-to-one verbal feedback on their store's identification-checking percentages. The percentage of identification-checked purchases at the intervention store increased from 0.2 percent at Baseline to 9.7 percent during the Intervention. Then, it declined to 2.3 percent during Withdrawal, showing functional control of the intervention over the cashiers' target behavior. The cashiers at the other store served as the control group, and their percentage of identification-checked purchases were 0.3 percent, 0.4 percent, and 0.7 percent respectively during each of the A-B-A phases at the intervention store. It was also found the intervention affected male cashiers more than female cashiers. The present study also assessed the social validity of the current intervention by surveying both customers and cashiers from the intervention store. The results showed that customers do not mind getting their ID checked, while cashiers consider it important to check a customer for identification during a credit purchase. / Master of Science
165

Kredit-kort och gott : En studie om hur svenska konsumenter värderar kreditkortsattribut. / Kredit-kort och gott : How do swedish consumers value different credit card attributes?

Herder, Emil, Nilsson, Filip, Seglarvik, Mats January 2016 (has links)
Författare: Emil Herder, Filip Nilsson och Mats Seglarvik Handledare: Anders Hytter Examinator: Bertil Hultén Kurs: Examensarbete 30hp, Civilekonomprogrammet inriktning marknadsföring, Linnéuniversitetet Kalmar, VT 2016, 4FE63E. Rapportens namn: Kredit-kort och gott Frågeställning: Hur värderar svenska konsumenter olika kreditkortsattribut? Syfte: Det primära syftet med vår studie är att undersöka hur svenska konsumenter värderar kreditkortsattribut på den svenska marknaden och att undersöka eventuella samband som existerar mellan deras värderingar och olika valda variabler. Som delsyfte ämnar vi att utifrån vår undersökning komma med relevanta rekommendationer som kan hjälpa Resurs Bank att skapa attraktiva kreditkortserbjudanden för konsumenter på den svenska marknaden. Metod: Uppsatsen har till en början en induktiv ansats som sedan övergår till en mer deduktiv ansats. Datainsamling har i huvudsak skett genom enkätundersökning, men även genom intervjuer. Resultat & slutsatser: Vi har rangordnat hur svenska konsumenter har värderat olika kreditkortsattribut och funnit att det existerar samband mellan hur olika individer värderat olika kreditkortsattribut baserat på andra värderingar och grupptillhörighet. Teoretiskt och praktiskt bidrag: Teoretiskt har vi bidragit med en grund för hur svenska konsumenter värderar olika kreditkortsattribut samt en undersökningsmodell som kan användas som underlag för vidare forskning. Våra praktiska bidrag är att informationen kan användas som beslutsunderlag när ett kreditkortserbjudande som inriktar sig mot kundens upplevda värde ska läggas fram. Nyckelord: Kreditkortsattribut, kreditkort, bonussystem, välgörenhet, konsumentbeteende, konsumentvärde / Author: Emil Herder, Filip Nilsson and Mats Seglarvik Mentor: Anders Hytter Examiner: Bertil Hultén Course: Master Thesis 30 credits, Master of Business and Economics, Marketing, Linnaeus University, Kalmar, Spring 2016 4FE63E. Name of report: Kredit-kort och gott Research question: How do swedish consumers value different credit card attributes? Purpose: The primary purpose of our study is to reserach how swedish consumers value credit card attributes on the swedish market and research possible correlations that exists between their values and different chosen vairables. The subpurpose of the study is to come up with relevant recommendations which may help Resurs Bank to create attractive credit card offerings for the swedish credit card market. Method: The study starts off with and inductive approach that later turns into a more deductive approach. The data was collected from a survey and interviews. Results and conclusion: We’ve ranked how swedish consumers value different credit card attributes based on other values and group membership. Theoretical and practical contribution: Theoretically we’ve contributed with a foundation on how swedish consumers value different credit card attributes and a researchmodel that can be used as a basis for further research. Our practical contribution is that the information from our study can be used to support decisions when it comes to creating a credit card offering that targets the customers percieved value. Keywords: Credit card attributes, credit card, bonus system, charity, consumer behaviour, consumer value.
166

Plastic card frauds, a survey of current relevant card and system properties / Plastkortsystem och brottsmöjligheter, en genomgång av egenskaper hos kort och läsare

Savostyanova, Natalia, Velichko, Valeriya January 2004 (has links)
<p>Recently the society has been turning from the use of paper-based technologies to plastic cards in certain spheres of our life. With the emergence and proliferation of high technologies we cannot content with the security provided bypaper only. Therefore the society has chosen plastic to protect its information because it offers far more security based not only on human perception but also on machine-readable elements. </p><p>The number of plastic cards in circulation in different spheres of our everyday life increases constantly. They replace money, documents and allow easy and safe access to some services. In spite of its security the plastic card however is subjected to fraud. </p><p>Plastic card fraud results in significant losses for the various industries. Since the first appearance of plastic cards methods of committing fraud have changed dramatically. Now there is a wide range of high technologies at the disposal of criminals as well as card manufacturers. </p><p>Therefore we have put the great emphasize of this work on the analysis of the most common card technologies in the Plastic Card World, the magnetic stripe and the chip, existing crimes and main means of their committing. And we also have revealed the weak and strong sides of the prevention techniques, which are currently in use.</p>
167

The Researches on Performance Enhancement in Ad Hoc Networks

Su, Tung-shih 05 January 2010 (has links)
The most studies on ad hoc network mainly focus on TCP (Transmission Control Protocol) of transport layer, the routing of network layer, multi-hop of Data-link layer, and the integration of WWAN and WLAN to increase the load balancing, coverage, and power savings. Nevertheless, in this dissertation, the system performances of four schemes proposed are improved with respect to data-link and network layers. One purpose of the data link layer is to perform error correction or detection. The other is responsible for the way in which different users share the transmission medium. The Medium Access Control (MAC) sublayer is responsible for allowing frames to be sent over the shared media without undue interference with other users. This aspect is referred to as multi-access communications. In the first and third schemes, the FDMA (Frequently-division multiple access) is employed to improve system performance, while in the fourth scheme the CDMA (Code-division multiple access) is used to enhance performance. Network layer has several functions, first is to determine the routing information. A second function is to determine the quality of service. A third function is flow control to avoid network to become congested. In the third scheme, the data-link and network layers have been used to increase system performance. Furthermore, the second scheme mainly concentrates on power savings under wireless sensor network. In ad hoc wireless networks, most data delivery is accomplished through multi-hop routing (hop by hop). This approach may leads to long delay and routing overhead regardless of which routing protocol is used. To overcome this inherent characteristic, this work presents a novel idea adopting dual-card-mode and performing self-organization process with specific IP naming and channel assignment to form a hierarchical star-graph ad hoc network (HSG-ad hoc) which can not only expedite the data transmission but also eliminate the route discovery procedure during data transmission. Therefore, the overall network reliability and stability can be significantly improved. Simulation results show that the proposed approach achieves substantial improvements in terms of average end-to-end delay, throughput, and packet delivery ratio. In a large-scale wireless sensor network, a topology is needed to gather state-based data from sensor network and efficiently aggregate the data given the requirements of balanced load, minimal energy consumption and prolonged network lifetime. In this study, we proposed a ring-based hierarchical clustering scheme (RHC) consisting of four phases: pre-deployment, parent-child relationship building, deployment, and member join phases. Two node types are distributed throughout the network: cluster head nodes (type 1 node) and general sensor nodes (type 2 node). The type 1 node has better battery life, software capability and hardware features than the type 2 node does; therefore, the type 1 node is a better cluster head than type 2 node. Most routing protocols focus mainly on obtaining a workable route without considering network traffic conditions for a mobile ad hoc network. Consequently, real time and multimedia applications do not achieve adequate quality of service (QoS). To support QoS, this work proposes a QoS-aware routing protocol, i.e. QUality of service with Admission control RouTing (QUART), that incorporates an admission control scheme into route discovery and route setup procedures. One variant of QUART, called, QUART-DD, adopts a dual-card dual-signal mechanism to increase system performance. Simulation results indicate that QUART-DD can significantly improve packet delivery ratio and throughput, while having a lower average end-to-end delay than routing protocols without QoS support. The performance of ad hoc wireless network suffers from problems in multi-hop transmission. This study adopts code division to modulate the frame header and the frame payload separately. A common spreading code modulates the frame header, and a special spreading code is negotiated and to modulate the frame payload. A field in the frame header indicates the spreading code used to modulate the successive frame payload. The modulated frame is transparent for every node, enabling many frames to be transmitted simultaneously. To allow the special spreading code negotiation, the RTS/CTS command is modified as ERTS/ECTS, and a spreading code table (SCT) is maintained in every node. Due to the space reuse, the proposed scheme has superior performance in latency and bandwidth utilization, as revealed by the simulation results.
168

Plastic card frauds, a survey of current relevant card and system properties / Plastkortsystem och brottsmöjligheter, en genomgång av egenskaper hos kort och läsare

Savostyanova, Natalia, Velichko, Valeriya January 2004 (has links)
Recently the society has been turning from the use of paper-based technologies to plastic cards in certain spheres of our life. With the emergence and proliferation of high technologies we cannot content with the security provided bypaper only. Therefore the society has chosen plastic to protect its information because it offers far more security based not only on human perception but also on machine-readable elements. The number of plastic cards in circulation in different spheres of our everyday life increases constantly. They replace money, documents and allow easy and safe access to some services. In spite of its security the plastic card however is subjected to fraud. Plastic card fraud results in significant losses for the various industries. Since the first appearance of plastic cards methods of committing fraud have changed dramatically. Now there is a wide range of high technologies at the disposal of criminals as well as card manufacturers. Therefore we have put the great emphasize of this work on the analysis of the most common card technologies in the Plastic Card World, the magnetic stripe and the chip, existing crimes and main means of their committing. And we also have revealed the weak and strong sides of the prevention techniques, which are currently in use.
169

Zaměstnávání cizinců / Employment of foreigners

Chromečková, Monika January 2016 (has links)
The diploma thesis "Employment of foreigners" deals with the topic of legislation and proceedings concerning employment of foreigners in the Czech Republic. In the first place it is aimed at employment of foreigners that do not have nationality of European Union member states, member states of European Economic Area and Switzerland, but it also deals with employment of nationals of European Union member states. Different rules for access to labour market are set up for these two distinct groups of foreigners while for nationals of European Union member states the access is significantly easier. This diploma thesis is structured into six chapters. Chapter One deals with sources of law that are relevant for given topic - both on domestic and on international level. Chapter Two contains definitions of basic concepts that are essential for this thesis. These are concepts of foreigner, employment, subjects of employment relationship, family member of national of EU member state and illegal work. Chapter Three is aimed at particular types of residence of foreigners in the Czech Republic. Foreigners can use several different types of residence permits that allow them to stay in the country. Chapter Four deals with special obligations imposed on employers in connection with employment of foreigners....
170

Bezpečnost platebních karet / Payment cards security

Fuchs, Michal January 2013 (has links)
This thesis aims to identify and evaluate the risks related to payment cards and their use. The main focus is the methods used to commit card related fraud and possible methods of protection related to this topic. First of all, the technology that is nowadays used in relation with the payment cards is analyzed and its weaknesses and attacks used to gather card information are described. After that, statistical data related to card fraud are analyzed in relation with different world regions. Qualitative analysis of risk related to payment card use is performed on the statistical data of ECB for the cards issued in Czech Republic. The qualitative analysis is then followed by recommendations that are designed to limit the risk's impact or probability. To verify the recommendations, a survey is carried out.

Page generated in 0.0315 seconds