• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 152
  • 87
  • 38
  • 26
  • 13
  • 7
  • 7
  • 5
  • 5
  • 4
  • 3
  • 3
  • 3
  • 2
  • 1
  • Tagged with
  • 391
  • 86
  • 55
  • 53
  • 44
  • 39
  • 38
  • 38
  • 32
  • 32
  • 32
  • 32
  • 31
  • 30
  • 30
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Motivating students attending a teacher education programme in Hong Kong using quality learning teams

Timmins, Andrew A. January 2003 (has links)
Purpose. In 1995, the Government of Hong Kong amalgamated six independent, Government sponsored Colleges of Education, which offered Certificate in Education courses, into the Hong Kong Institute of Education. The remit of the newly-formed, autonomous Institute was to attain university status and to upgrade courses to degree and post-degree level. Many of the existing staff remained with the newly-formed institute while a recruitment drive resulted in an increase in international lecturing staff. This study results from action research, undertaken by the author, to develop pedagogy suitable for both the international lecturing staff and the Chinese student teachers. The research set out to take advantage of the diverse backgrounds of the lecturing staff. Of the various pedagogic strategies employed by lecturing staff, the Total Quality Management (TQM) approach emerged as the most effective, promoting as it does a way for the students to plumb co-operatively the often difficult depths of what they are studying, as well as motivating them in their chosen career. The stringent examination system in Hong Kong, the lack of university places and the economic situation all play their part in determining the student population in the Institute of Education where students whose first choice is to enter the teaching profession could well be outnumbered by those who consider themselves without more attractive alternatives. In addition, the lecturing staff from overseas became aware of the Chinese culture of 'Shame’ among their students - the students who had failed were castigated and further marginalized by their family and friends. It was hoped that the employment of a TQM approach through the use of Quality Learning Teams would help to combat this 'shame' and, hopefully, increase the self-confidence of these 'shamed' students. The project's aim was to introduce and role-model a different pedagogic practice and to utilise constructivist-based pedagogy so that two major outcomes could be measured: (1) that student teachers would become active and confident learners who would themselves challenge their own pupils and (2) that colleagues outside the project could observe the usefulness of this alternative pedagogy and make use of the innovation in their own lecture rooms. This involved investigation of diverse aspects of teaching and learning. Research on individual areas has been quite extensive, but little research has been done in this particular area with regard to student teachers in Hong Kong and it is, therefore, the purpose of this study to add to existing knowledge, with specific emphasis on Quality Learning Teams. The rationale for the study was, on the one hand, the Hong Kong Special Administration (HKSAR) Government Educational Reforms, but also - and more importantly for the lecturers concerned - the search for a means to inculcate a culture of co-operative learning within the student-teacher body, as well as a means for international lecturing staff to create an effective pedagogy, utilizing both mother tongue and English as languages of instruction. Major Findings. The findings of the study indicated that student learning was enhanced by using Quality Learning Teams. This was demonstrated by the overall module results which showed higher module grades for the groups who were subjected to the innovative pedagogy than for those groups who were subjected to the normal 'traditional' pedagogy. Student self-esteem, self-confidence, trust in peers, and a work ethos of self-sufficiency developed amongst the majority of student teachers. Language skills were enhanced and strategies for learning were improved. It is hoped that the results of this study will assist in the future planning of courses in the education of student-teachers and in creating a more 'risk-taking' culture within the lecturing staff at the Institute.
2

Science PGCE students' understanding of secondary science teaching

Reyes, Pilar January 2001 (has links)
No description available.
3

'Readings' of units 3 & 4 of the Victorian Certificate of Education's Literature study design /

Gravina, Angela Mary. Unknown Date (has links)
Thesis (MEd (Literacy and Language Education)) --University of South Australia, 1994
4

Zavedení systému managementu kvality podle norem řady ISO 9000 / The Introduction of the Quality Management System According to ISO 9000

Černá, Lenka January 2012 (has links)
The main aim of my thesis is to compare the functioning of society EKAN Servis s.r.o. before the introduction of the quality management system and after its introduction. In the theoretical part I focused on the quality management system according to ISO as a whole, their characteristics and an explanation. In the practical part deals with the performance of the company EKAN Servis s.r.o., a specific procedure for the introduction of quality management system in the company EKAN, quantify the cost of implementing the system and comparing its functioning before and after the introduction of a quality systém.
5

Phishing on Open WLANs: Threat and Preventive Measure

Khanna, Isha 10 January 2010 (has links)
Phishing is an internet security issue whose shape is still changing and size is still increasing. This thesis shows the possibility of a phishing attack on open, private Wireless LANs. Private WLANs which use a login page to authenticate users in hotels, airports and academic campuses are all vulnerable to this attack. Virginia Tech's WLAN is used as an example to show that the attack is possible. The attack combines two very well known attacks: one is to deceptively guide a user into logging into a fake website, which shows similar log-in page to the page of the website the user intends to go to, and the second attack is to show users a valid certificate, which does not show a warning. The rogue server takes the user to a log-in page which is similar to Virginia Tech's log-in page and shows him a valid security certificate. We present a solution to the proposed problem. Software is implemented that runs on Windows Vista. The software warns the user if there are servers with more than one type of security certificates, claiming to be from the same network. We contrast our method to already existing methods, and show in what respects our solution is better. The biggest advantage of this method is that it involves no change on the server side. It is not necessary for the users to have any prior knowledge of the network, which is very helpful when the users access WLAN at airports and hotels. Also, when using this method, the user does not need to connect to any network, and is still able to get a warning. It however, requires the user to be able to differentiate between the real and fake networks after the user has been warned. / Master of Science
6

Analysis of Longitudinal Changes of Certificate Chains / Analysis of Longitudinal Changes of Certificate Chains

Ringström, Marcus, Olivestam, Anton January 2022 (has links)
Certificate validation is today a vital part of keeping communication secure over the internet. It allows secure daily communication for roughly 5 billion people using the internet. This is done by the help of Certificate Authorities, who use the technique of certificate validation chains for a more relentless validation and to widen the possibilities of secure communication. These chains have been in a changing process since the beginning, which has not been in a single direction. In this thesis, the changes in properties of the certificate chains are studied during the time period 2013 until 2021. The datasets of certificate chains are generated from the crt.sh database. The focus is put on finding changes in the length of the certificate chains and where in the chains these changes appear. Being able to understand and explain these changes is of great value in order to know about the further development of these chains and to predict the future direction that these chains might take. Based on the findings from the analysis of the chains included in the dataset, it was possible to conclude that the average length of the chains has increased over the time period. Though there have been special occasions in the industry-leading to decline in later years of the time period.The findings in this thesis indicates that what is important for the industry has changed. From having a focus on increasing the length to shift focus to shorten the length to provide better performance in terms of speed.
7

Public certificate management : An analysis of policies and practices used by CAs / Offentlig certifikathantering : En analys av policys och praxis som används av CAs

Bergström, Anna, Berghäll, Emily January 2021 (has links)
Certificate Authorities (CAs) carry a huge responsibility in today's internet security landscape as they issue certificates that establish secure end-to-end connections. This thesis conducts a policy review and survey of CAs' Certificate Policies and Certificate Practice Statements to find similarities and differences that could lead to possible vulnerabilities. Based on this, the thesis then presents a taxonomy-based analysis as well as comparisons of the top CAs to the Baseline Requirements. The main areas of the policies that were focused on are the issuance, revocation and expiration practices of the top 30 CAs as determined by the use of Tranco's list. We also determine the top CA groups, meaning the CAs whose policies are being used by the most other CAs as well as including a top 100 CAs list. The study suggests that the most popular CAs hold such a position because of two main reasons: they are easy to acquire and/or because they are connected to several other CAs.  The results suggest that some of the biggest vulnerabilities in the policies are what the CAs do not mention in any section as it puts the CA at risk for vulnerabilities. The results also suggest that the most dangerous attacks are social engineering attacks, as some of the stipulations for issuance and revocations make it possible to pretend to be the entity of subscribes to the certificate rather than a malicious one.
8

Relay Racing with X.509 Mayflies : An Analysis of Certificate Replacements and Validity Periods in HTTPS Certificate Logs / Stafettlöpning med X.509-dagsländor : En Analys av Certifikatutbyten och Giltighetsperioder i HTTPS-certifikatloggar

Bruhner, Carl Magnus, Linnarsson, Oscar January 2020 (has links)
Certificates are the foundation of secure communication over the internet as of today. While certificates can be issued with long validity periods, there is always a risk of having them compromised during their lifetime. A good practice is therefore to use shorter validity periods. However, this limits the certificate lifetime and gives less flexibility in the timing of certificate replacements. In this thesis, we use publicly available network logs from Rapid7's Project Sonar to provide an overview of the current state of certificate usage behavior. Specifically, we look at the Let's Encrypt mass revocation event in March 2020, where millions of certificates were revoked with just five days notice. In general, we show how this kind of datasets can be used, and as a deeper exploration we analyze certificate validity, lifetime and use of certificates with overlapping validity periods, as well as discuss how our findings relate to industry standard and current security trends. Specifically, we isolate automated certificate services such as Let's Encrypt and cPanel to see how their certificates differ in characteristics from other certificates in general. Based on our findings, we propose a set of rules to help improve the trust in certificate usage and strengthen security online, introducing an Always secure policy aligning certificate validity with revocation time limits in order to replace revocation requirements and overcoming the fact that mobile devices today ignore this very important security feature. To round things off, we provide some ideas for further research based on our findings and what we see possible with datasets such as the one researched in this thesis.
9

A survey to Evaluate the Need of a Pharmacy Resident Teaching Certificate Program for Pharmacy Residents in Arizona

Hannosh, Jason January 2009 (has links)
Class of 2009 Abstract / OBJECTIVES: The purpose of this study was to determine if there is a perceived need to offer a teaching certificate program to pharmacy residents in the state of Arizona. METHODS: This cross-sectional, descriptive study utilized a web-based, electronic survey to gather data from Arizona pharmacy residents and residency program directors. Residents who were part of the Class of 2008 or 2009 were included in the study. The survey asked the respondents to rate the value of a pharmacy certificate program on a 6-point Likert scale. Data on the current activities for residents in the programs, resident confidence levels on performing specific tasks, topics of modules for a certificate program, the quantity and length of the modules, and interest in participating in a program were also collected. RESULTS: There was a 50% response rate for both pharmacy residents (n=17) and residency directors (n=12). The respondents indicated that there was a perceived value to a teaching certificate program (p<0.0001) and 28 stated that they would participate in the certificate program if one was offered (p<0.0001). Seven of the nine proposed module topics for the program were positively received by the respondents, with “How to be a Preceptor” ranked highest (p<0.0001). Overall, a teaching certificate program of 4 to 6 modules (p=0.006) between 46 to 60 minutes in length (p<0.0001) was most appealing to the respondents. CONCLUSIONS: Arizona pharmacy residents and residency program directors who participated in this survey showed a positive interest in a teaching certificate program.
10

Neonatal Identification Screening for Hearing Impairment: A Comparison of the Utah Maternal Questionnaire and Birth Certificate

Clark, Carl Hugh 01 May 1980 (has links)
The purpose of this study was to compare the Utah maternal questionnaire and birth certificate as they relate to the identification of hearing impairment in infants. Comparative data relating to rate of return, number of high risk infants, number of at risk infants, number of hearing impaired infants, false positive rates, and item analysis were obtained for both screening instruments. Tabulation of the results showed the birth certificate to be a better neonatal screening device of hearing impairment than the maternal questionnaire. The birth certificate maintained a low false positive rate and a high rate of identification of hearing impairment in infants.

Page generated in 0.0647 seconds