• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 68
  • 9
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 129
  • 23
  • 19
  • 16
  • 13
  • 13
  • 12
  • 12
  • 10
  • 10
  • 10
  • 10
  • 9
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
111

消費者如何使用說服知識來判別網路口碑之真偽 / Consumer’s use of persuasion knowledge on ewom

陳禹安, Chen, Yu An Unknown Date (has links)
本研究旨在了解消費者如何運用說服知識,來判讀線上口碑訊息之真偽。說服知識一詞,最早於1994年,由Friestad以及Wright在其著作「說服知識模型:人們如何回應他人的說服意圖」一文中所提出。該模型在當時線上口碑尚未流行的年代,是完全以線下情境為研究主題開發而成。也因此,本研究希冀打造適用於線上口碑環境所使用的線上說服知識模型,藉由深度訪談八位受訪者,了解他們使用線上口碑的情形,進而深入探討,他們如何在今日線上口碑充斥著置入性行銷口碑的環境中,運用自身的說服知識,來辨認線上口碑訊息之真偽。在受訪者分享如何辨別偽口碑的經驗談時,本研究也因此了解人們是如何運用自身對產品、議題、品牌等主題知識(topic knowledge),如何運用說服知識(persuasion knowledge),如何應用說服者知識(agent knowledge)等由Friestad以及Wright所歸納而成的三大知識體系,來辨別線上口碑的真實性。本研究更進一步指認出台灣線上環境所特有的”鄉民”知識,並將之融入到線上說服知識模型之中。本研究結果顯示,人們對線上口碑環境的熟悉程度(是否經常瀏覽特定網站),以及個人涉入口碑的深淺程度(觀看線上口碑的頻繁程度),都影響到個人線上說服知識模型之架構。本研究是線上口碑文獻中,首度建構線上說服知識模型之研究。 / This research explores consumers’ use of persuasion knowledge in judging the credibility of eWOM. Persuasion Knowledge is a concept first coined by Friestad and Wright (1994) in their work of The Persuasion Knowledge Model: How people cope with persuasion attempts. The Persuasion Knowledge Model, however, was designed specifically for the offline context. This research aims to build an online Persuasion Knowledge Model by conducting in-depth interviews to eight participants in identifying their perceived dubious eWOM triggers. Throughout the process of participants’ reasoning with these triggers, we were able to see how consumers judge the credibility of eWOM by using their persuasion knowledge, topic knowledge, and agent knowledge in the online context. The findings also suggest a fourth knowledge base—villager knowledge—in the online WOM context. Furthermore, this study shows that one’s familiarity with an online WOM environment and one’s level of involvement with online WOM all influence the construction of one’s online Persuasion Knowledge Model. This study is a first in constructing the online Persuasion Knowledge Model in the eWOM literature.
112

"These kind of flesh-flies shall not suck up or devour their husbands' estates:" married women's separate property rights in England, 1630-1835

Mercier, Courtenay 18 June 2018 (has links)
During the long eighteenth century, married women in England were subject to the rules of coverture, which denied them a legal identity independent of their husbands and severely curtailed their acquisition, possession and disposition of property. There is a consensus among historians that married women circumvented the restrictions of coverture both in their daily lives and by use of the legal mechanism of the separate estate. This study reviews contemporary legal and social attitudes towards women’s property rights in marriage to examine the extent to which married women had economic agency under coverture. Through a review of reported cases, treatises on the law of property, and a contemporary fictional representation of pin-money, I assess the foundations justifying the law of coverture, and the challenges presented to coverture by the separate estate. I argue that there is a distinction between the theory and practice of the separate estate; the separate estate must be understood as a type of property set aside for a special purpose rather than a type of property separated from a husband’s control. More precisely, the existence of the separate estate generally, and pin-money in particular, did little to advance married women’s economic agency. / Graduate
113

Speaking Tumblr : A Case Study of Textual Communication on Social Media

Elmgren, Tove January 2018 (has links)
This essay describes a case study of textual communication on the online social mediaplatform Tumblr. The aim of the research was to analyse the communicative functions and thestylistic, sociolinguistic, and pragmatic characteristics of textual discourse on Tumblr. Usingdata gathered on Tumblr, this essay analyses discursive aspects such as function, style, andpragmatics, relating the findings to literature on topics including relevance theory and theoriesof computer-mediated communication and cyberpragmatics. The research found thatdiscourse on Tumblr is largely phatic in nature, with an overwhelming focus on the discussionof shared interests. Such discussion on Tumblr appears to heavily depend on sharedbackground knowledge, which works as a barrier of in-group discursive solidarity andprovides and furthers feelings of connectedness. This study further found that alternative useof style and grammar on Tumblr appears to be largely uniform, suggesting that divergencesfrom standard norms are a way of displaying membership of a group and obtaining covertprestige, rather than a display of linguistic innovation.
114

Comportamento verbal sob controle de estímulos encobertos em indivíduos com atraso no desenvolvimento intelectual : estudos exploratórios / Verbal behavior under covert stimuli control in individuals With intellectual disabilities: exploratory studies

Chereguini, Paulo Augusto Costa 27 March 2009 (has links)
Made available in DSpace on 2016-06-02T19:46:08Z (GMT). No. of bitstreams: 1 2588.pdf: 959710 bytes, checksum: fe057f9dee825e64b6a9897674590534 (MD5) Previous issue date: 2009-03-27 / Financiadora de Estudos e Projetos / This study aimed to develop the procedure for study and analysis of the covert event and to verify verbal behavior emergency under covert stimulus control. Two children and two adolescents with intellectual disabilities, students at a specialized institution, were submitted to matching to sample tasks. Preliminarily, some preferred edibles were selected for each participant and then conditioned reinforcing value of tokens was taught to make it possible to use them as teaching consequences. There was an array of experimental procedures involving two stimulus sets: set A, composed by dictated words and set B, by pictures. There was also set A composed by participants spoken words. Sets A and B were composed by four stimuli. The experimental design consisted of (1) teaching relations AB and BA , (2) teaching arbitrary relations B3B1 and B4B2 and testing symmetry, and (3) testing relations A4A 2 and A3A 1. When systematic incorrect responses were observed during relations B3B1 and B4B2 teaching, blocked trial procedure was applied. Other additional teaching procedures consisted of withdrawing the S-, teaching symmetry (B1B3 and B2B4) and providing verbal cues. However, even after applying these additional procedures, performance were above criterion, characterized by instability and deterioration. The literature emphasizes the difficulties in teaching conditional discriminations with visual stimuli for participants with intellectual disabilities. The results lead to a discussion of the intervenient variables, such as: i. Difficulties found by persons with intellectual disabilities in the matching to sample procedure; ii. What type of instruction should be given by the experimenter to help them perform the task and have access to consequences; iii. The computer as a resource to present the tasks; iv. The modality of stimuli and stimulus relations; v. Different performances presented by the participants during the exposure to the same experimental condition; vi. The consequences of reinforcement; vii. The criterion of performance established for each experimental condition and for additional procedure and; viii. Interruption in data collection. We conclude that although the participants did not reach performance criterion in relations B3B1 and B4B2 teaching, this study provides contributions of procedure design, and raises methodological questions that advance the understanding of covert stimulus tact acquisition by persons with intellectual disabilities. Through the discussion on these possible intervenient variables, we may infer that participants errors may be a matter of procedure instead of being related to their learning disabilities. / Este estudo objetivou desenvolver um procedimento para estudo e análise do evento privado e, por meio deste, verificar a emergência de comportamento verbal sob controle de estímulos encobertos. Duas crianças e dois adolescentes com atraso no desenvolvimento intelectual, alunos de uma instituição especializada, foram submetidas a tarefas de escolha de acordo com o modelo. Preliminarmente foram selecionados itens de preferência comestíveis, dos participantes, e ensinado valor reforçador condicionado de fichas para que servissem como conseqüências ao ensino. Realizou-se um arranjo de procedimentos experimentais que envolveram dois conjuntos de estímulos: o conjunto A, composto por palavras ditadas; o conjunto B por figuras; e o conjunto A de respostas, constituídas por palavras correspondentes aos demais conjuntos, faladas pelos participantes. Cada um dos dois primeiros conjuntos era composto por quatro estímulos. O delineamento experimental constituiu-se de: ensino das relações AB e BA , ensino e, em seguida, teste de simetria das relações arbitrárias B3B1 e B4B2, e, teste das relações A4A 2 e A3A 1. Diante das sistemáticas respostas incorretas apresentadas durante o ensino das relações B3B1 e B4B2, aplicou-se o procedimento adicional de ensino de discriminação condicional com tentativas em bloco e estratégias de ensino de retirada de S-, simetria dos blocos 1 e 2 e dicas verbais. Mesmo com estas estratégias, as respostas incorretas se mantiveram, caracterizadas por instabilidade e deterioração de desempenhos. A literatura enfatiza as dificuldades em ensinar discriminações condicionais com estímulos visuais para pessoas com atraso no desenvolvimento intelectual. Algumas possíveis variáveis intervenientes são discutidas, como: i. Dificuldade encontrada por pessoas com atraso no desenvolvimento intelectual ao serem expostas a tarefas de escolha de acordo com o modelo; ii. A dificuldade de compreensão das instruções para executar a tarefa e para ter acesso às conseqüências reforçadoras; iii. A utilização do computador como recurso para apresentar as tarefas; iv. O tipo de estímulo e a relação de arbitrariedade entre os estímulos modelo e comparação; v. Diferentes desempenhos apresentados pelos participantes frente a exposição de uma mesma condição experimental; vi. As conseqüências de reforçamento; vii. O critério de desempenho estabelecido em cada condição experimental e no procedimento adicional e; viii. Interrupção na coleta de dados. Conclui-se que apesar de não ter sido possível alcançar critério de desempenho no ensino das relações B3B1 e B4B2, o presente estudo fornece contribuições de procedimento, e levanta questionamentos metodológicos, que avançam na compreensão do ensino de comportamentos verbais sob controle de estímulos encobertos, por pessoas com atraso no desenvolvimento intelectual. Depreende-se daí que os erros apresentados pelos participantes podem ser muito mais uma questão de procedimento do que função das dificuldades de aprendizagem.
115

Security for Virtualized Distributed Systems : from Modelization to Deployment / Sécurité des Systèmes Distribués Virtualisés : De la Modélisation au Déploiement

Lefray, Arnaud 03 November 2015 (has links)
Cette thèse s'intéresse à la sécurité des environnements virtualisés distribués type “Clouds” ou informatique en nuage. Dans ces environnements, le client bénéficie de ressources ou services (de calcul, stockage, etc.) à la demande sans connaissance de l'infrastructure sous-jacente. Ces services sont proposés à bas coût en mutualisant les ressources proposées aux clients. Ainsi, ces derniers se retrouvent à partager une infrastructure commune. Cependant, cette concentration des activités en fait une cible privilégiée pour un attaquant, d'autant plus intéressante que les Clouds présentent de nouveaux vecteurs d'attaque entre les clients du Clouds de part le partage des ressources. Actuellement, les fournisseurs de solutions de Cloud proposent une sécurité par défaut ne correspondant pas nécessairement aux besoins de sécurité des clients. Cet aspect est donc bien souvent négligé et cette situation donne lieu à de nombreux exemples d'attaques (vol de données, usage malicieux, etc.). Dans cette thèse, nous proposons une approche où le client spécifie ses besoins de sécurité ainsi que son application virtualisée au sein d'un modèle. Nous proposons notamment une nouvelle logique dédiée à l'expression de propriétés sur la propagation de l'information dans un système.Puis, nous proposons un déploiement automatique de ce modèle sur une infrastructure de type Cloud basée sur la virtualisation grâce à nos nouveaux algorithmes prenant en compte les propriétés de sécurité. Ces dernières sont assurées via un placement prenant en compte les risques d'attaques entre ressources partagées et/ou via la configuration de mécanismes de sécurité existants au sein du système. / This Thesis deals with security for virtualized distributed environments such as Clouds. In these environments, a client can access resources or services (compute, storage, etc.) on-demand without prior knowledge of the infrastructure underneath. These services are low-cost due to the mutualization of resources. As a result, the clients share a common infrastructure. However, the concentration of businesses and critical data makes Clouds more attractive for malicious users, especially when considering new attack vectors between tenants.Nowadays, Cloud providers offer default security or security by design which does not fit tenants' custom needs. This gap allows for multiple attacks (data thieft, malicious usage, etc.)In this Thesis, we propose a user-centric approach where a tenant models both its security needs as high-level properties and its virtualized application. These security objectives are based on a new logic dedicated to expressing system-based information flow properties. Then, we propose security-aware algorithm to automatically deploy the application and enforce the security properties. The enforcement can be realized by taking into account shared resources during placement decision and/or through the configuration of existing security mechanisms.
116

An analysis of parliamentary intelligence oversight in South Africa with speciric reference to the Joint Standing Committee on intelligence

Dlomo, Dennis Thokozani 08 February 2005 (has links)
This study analyses parliamentary intelligence oversight in South Africa by assessing the understanding of members of the JSCI of its core business, its mission and vision and powers and functions as are stipulated by law. The study locates the JSCI within an international intelligence oversight milieu through a review and evaluation of selected countries’ intelligence oversight mechanisms. Furthermore, international best practice is sought and applicable lessons are drawn for South Africa. The study is bases on a literature review and interviews with members of the JSCI to gather information and draw insights to evaluate and test the propositions in the context of international and national best practice. The propositions, which are supported by the research, are that: · Intelligence oversight in South Africa under the JSCI has hitherto been relatively effective although there is room for improvement. · The JSCI has good relations with the other arms of the state that are responsible for the oversight of Intelligence in South Africa – making parliamentary intelligence oversight, overall, quite effective. · Despite this effectiveness there are legislative gaps and problems pertaining to the modus operandi of the JSCI that need the attention of both the Executive and Legislature and which could be part of a package of legislative reform. The research supported these propositions whilst pointing out that new initiatives need attention if the culture of oversight is to find root. These are the need to widen the scope of accountability to build a culture of accountability among middle and senior management members of the Intelligence structures and secondly the way Parliament resources the JSCI. / Dissertation (M (Political Sciences))--University of Pretoria, 2006. / Political Sciences / unrestricted
117

An investigation of children's aggression in the foundation phase : a socio-education perspective

Padayichie, Kumaree 11 1900 (has links)
This study served to highlight the aggressive nature of learners in the Foundation Phase, namely of those who are between the ages of 5 to 6 years. The project is based on qualitative research, and the data were collected from three primary schools in the northern suburbs of Johannesburg. Interviews were conducted with two principals, three educators and three parents. Four learners were used in order to gather further information on the causes of the aggressive behaviour of learners. Their input assisted the researcher to understand the various discipline structures within the school and also, how parents and educators manage the aggressive behaviour of learners. The study sought to identify whether primary and secondary socialisation, and the influence of the media are related to learners behaving aggressively. The information collected confirmed that children model the behaviour of adults and of their peers. The principals and the educators were of the opinion that positive primary socialisation is of the utmost importance, as it lays the foundation for future socialisation. / Educational Studies / M. Ed. (Socio-Education)
118

Periodismo y marcas. La presencia de publicidad encubierta en el relato periodístico especializado en moda. Caso: Cosas Moda 2019 / Journalism and brands. The presence of covert advertising in the journalistic story specialized in fashion. Case: Cosas Moda 2019

Yriarte Galindo, Daniela del Carmen 04 November 2020 (has links)
El presente trabajo de investigación de carácter cualitativo aborda como idea central la presencia de la publicidad en el discurso periodístico de moda de las piezas informativas de la revista Cosas Moda. Se ha desarrollado un análisis de contenido sobre este caso en específico  relacionado a la problemática del mecanismo de publicidad encubierta. El contexto de la presencia de las marcas en las revistas especializadas en moda ha favorecido a la aparición de un fenómeno como la publicidad encubierta en el periodismo de moda a través de recursos como la hibridación del discurso y el brand placement. Esta situación se hace evidente en este tipo de publicaciones, a través de géneros periodísticos como el reportaje, la nota informativa y la entrevista, que tratan temas sobre moda, pero incorporan en su relato inclinaciones preferentes y valorativas por alguna marca y/o organización. / This qualitative research work presents as a central idea the presence of advertising in the fashion journalistic discourse of the informative pieces of the magazine Cosas Moda. A content analysis has been developed on this specific case related to the problem of the covert advertising mechanism. The context of the presence of brands in specialized fashion magazines has favored the appearance of a phenomenon such as disguised advertising in fashion journalism through resources such as hybridization of discourse and brand placement. This situation is evident in this type of publications, through journalistic genres such as the report, the informative note and the interview, in which topics about fashion are discussed, but which include in their story preferential and evaluative inclinations for some brand or organization. / Tesis
119

The use of physical surveillance in forensic investigation

Knoesen, Andre Leon 11 1900 (has links)
The problem that was identified is that physical surveillance is not generally used by general detectives in the South African Police Service as a technique during their investigations. According to the researcher’s experience, this can be due to lack of understanding or experience or may stem from ignorance. A lack of training on the use of physical surveillance as a method to obtain information for the investigation process was also identified as a problem. This study therefore investigated the role and use of physical surveillance within the forensic investigation process. The focus of the research was on basic static (stationary), foot and vehicle surveillance as these types of surveillance are usually conducted in conjunction with each other. An empirical research design was used to conduct the research. A qualitative research approach enabled the researcher to obtain first-hand information from interviews with general detectives. Information was also obtained from a thorough literature study and from the researcher’s own experience on the topic. To conduct effective investigation, it is important for investigators to be familiar with the concept of physical surveillance, its elements, its influence and its values. A physical surveillance operation is a forensic tool used to gather evidence, to recover stolen property, and to identify and arrest the perpetrator. The use of physical surveillance during investigations serves the purpose of gathering evidence and information that can be used as intelligence. Successful forensic investigation requires skill and places extraordinary demands on detectives to utilise all available methods and techniques. The recognition of the use of physical surveillance as a method of evidence gathering is of outmost importance. The research has revealed that general detectives do not acknowledge the importance of physical surveillance as a method to obtain information for the investigation process. It is of vital importance that all detectives be properly trained with the necessary knowledge and skills to make use of this valuable investigative tool. / Police Practice / M. Tech. (Forensic Investigation)
120

Female Fabrications: An Examination of the Public and Private Aspects of Nüshu

Lee, Ann-Gee 03 December 2008 (has links)
No description available.

Page generated in 0.0265 seconds