• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 18
  • 13
  • 4
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 50
  • 26
  • 15
  • 9
  • 7
  • 6
  • 6
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Tillit och misstro till molntjänster : Identifiering av vilka kriterier som skapar tillit till molntjänster / Trust and distrust in cloud computing : Identification of which criteria establishes trust incloud computing

Gustafsson, Jesper, Knutsby, Viktor January 2014 (has links)
Cloud computing innebär att datorkraft och IT-resurser i form av servrar, lagring och lokala nätverk görs tillgängliga via internet, cloud computing har ökat snabbt i användning de senaste åren. Möjligheterna med molntjänster har lett till nya utmaningar avseende tillit till molntjänster genom att öppna för helt nya förhållanden mellan leverantör och kund. I dagsläget så är tillit till molntjänsterna ett stort problem för kunder såsom mikroföretag samt små och medelstora företag. Vårt examensarbete syftar till att beskriva mikroföretags samt små och medelstora företags tillit och misstro till molntjänster, samt identifiera vilka kriterier som bidrar till detta. Resultatet visar att det är svårt att tydligt definiera tillit och misstro hos företag, då deras situationer och verksamheter skiljer sig. Tack vare vår litteraturstudie i kombination med våra intervjuer har vi skapat oss en bra bild av vilka kriterier som bidrar med tillit och misstro till molntjänster. Baserat på vårt arbete har vi sammanställt en konceptuell modell som beskriver tillit och misstro till molntjänster. / Cloud Computing means the possibility to use computer power and IT-resources through internet. The use of cloud computing have rapidly increased the last few years. The opportunities it brings has led to challenges in trust to Cloud services by enabling new form of relations between customer and suppliers. Nowadays, trust in Cloud services is a problem for customers such as microenterprises, small and medium business. Our thesis work seeks to describe microenterprises, small and medium business’s trust and distrust to Cloud services and identify which criteria contributes to this. The result shows that is hard to clearly define trust and distrust in business, as their situations and activities differ from one another. Thanks to out literature review combined with the interviews we’ve conducted, we have created a good understanding of what contributes to trust and distrust in Cloud services. Based on our thesis work, we’ve compiled a conceptual model that describes trust and distrust in Cloud services.
22

A victimological investigation of farm attacks with specific reference to farmers’ perceptions of their susceptibility, the consequences of attacks for farmers and the coping strategies applied by them after victimisation

Hornschuh, Veronica 28 July 2008 (has links)
Acts of violence on farms and smallholdings are continuing unabated in spite of the efforts of the government and the agricultural unions to quell attacks on members of the farming community. Although research has been done on various aspects of farm attacks, empirical information regarding farmers’ perceptions of their susceptibility to attacks, the consequences that are suffered and the coping strategies that farmers apply after victimisation, is limited to that contained in the Report of the Committee of Inquiry into Farm Attacks. In order to gain first-hand information with regard to this phenomenon, the researcher interviewed 15 direct victims of attacks on a one-on-one basis. All the attacks occurred in the Mpumalanga Province and the adjoining Nokeng Tsa Taemane region in the Gauteng Province. Based on the analysis and interpretation of the data, it was found that most of the respondents felt unsafe on their farms. In spite of this, they were all taken by surprise by their attackers. While the majority of the respondents believed that their homes were reasonably secure, financial and familial constraints prevented some from improving the guardianship on their farms. Those who had good security systems in their homes, were attacked outside or in the early evening before the systems were activated. The findings also revealed that the immediate reactions of victims of farm attacks do not differ fundamentally from those of other victims of crime. Reactions include surprise, fear of being killed, injured and/or raped and powerlessness. After the attacks they often experienced anger and bitterness. Analysis of the data furthermore indicated that physical injuries ranged from minor to serious injuries that necessitated hospitalisation. Emotional and social harm were also experienced by victims, causing them to be fearful and distrustful of black persons, as the attacks were all black on white. Farm attacks also had negative financial consequences for the victims. Capital that might have been used for other purposes had to be used to pay medical and funeral bills and upgrade security, especially since most victims feared re-victimisation. After the attacks some respondents preferred to relocate. While many of the respondents found it too costly to implement the necessary target hardening measures, avoidance behaviour in the form of alertness was identified as the most effective means of preventing victimisation in the future. Other avoidance tactics included feeding dogs in the afternoon when visibility is still good and sending employees out to establish the reason for the visit of black strangers who arrive on the farm without an appointment. Erroneous perceptions with regard to the motives for attacks and the profile of attackers, as well as complacency about security which often sets in because of the routine nature of farmers’ lifestyle, were identified as the main reasons for farmers’ susceptibility to victimisation. It was also found that the respondents’ coping strategies varied. While some relied on their Christian faith and the support of family and friends, others exerted their inner strength to regain their emotional equilibrium. On the basis of the above findings, recommendations were made regarding further research and measures that might be implemented by both the government and farmers to reduce the number of farm attacks. It was highlighted that factors such as hate speech, socio-economic conditions in rural areas, the acceleration of land reform and education deserve further attention. Farmers must guard against complacency and make informed decisions about security on the farms. As coping strategies vary, it was furthermore stated that victimised farmers need to persevere until they have assimilated the negative experience. / Dissertation (MA)--University of Pretoria, 2008. / Social Work and Criminology / unrestricted
23

Understanding Host Community Distrust and Violence Against Oil Companies in Nigeria

Amabipi, Abby Kalio 01 January 2016 (has links)
The violence of the Niger Delta host communities against the international oil companies (IOCs) is rampant and dogged. The extent of violence that occurs is harmful to communities, individuals, and oil companies that provide a certain degree of economic stability to the region. The Nigerian government faces a major challenge of resolving community violence in Nigeria. This case study used social exchange theory to better understand the causes and consequences of the lack of community trust against the oil companies that is pervasive in the region. Purposeful sampling was used in the selection of 10 community members, 8 representatives of the oil industry, and 3 government officials. Data were collected through in-depth interviews and documents provided by participants. These were inductively coded and then analyzed using a constant comparative technique. Findings revealed that participants perceived a lack of adequate collaboration among stakeholders and the application of inadequate management strategies of the IOCs and government having an impact on the degree and frequency of community violence. The implications stemming from this study include recommendations to the Nigerian government and IOCs to precede policy formulation with thorough consultation, engagement, and negotiation with the stakeholders for their acceptance before implementation of policy. This collaborative action may encourage corporate engagement and management that is positively viewed by the communities in the Niger Delta.
24

Responsibility and Manipulation

Cogley, Charles Zachary 03 September 2010 (has links)
No description available.
25

Electronic Personal Health Records: A Matter of Trust

Daglish, David 10 1900 (has links)
<p>Early trials of Electronic Personal Health Records (ePHRs) show they provide two strong benefits: better healthcare outcomes and lower taxpayer costs. However, consumers are concerned about the possible loss or misuse of personal health data. For people to adopt ePHRs, they must trust both the system and the operating organization. The model presented here studies consumers’ likelihood of adopting ePHRs, combining trust, distrust, risk, motivation, and ease of use; as well as their perceptions of government, software vendors, and physicians as providers of ePHRs. Based on the Technology Acceptance Model, and incorporating elements of trust-distrust dualism and perceived risk, the model was tested empirically using survey data from 366 Canadian adults. The model explains 52 percent of the variance in the intention to use an ePHR, with strong negative effects from perceived risk and distrust, and strong positive effects from trust and perceived usefulness. Other findings include further evidence that trust and distrust are different constructs, not ends of a spectrum; that Canadians’ relationship with their healthcare system is complex; and that the risks in using an online system can be overcome by the perceived benefits. Open-ended responses show that people generally trust their doctors, but are sceptical that a doctor could provide a secure ePHR. Responses indicated that participants liked the consolidation of data and ease of access, but feared loss of privacy.</p> / Doctor of Philosophy (PhD)
26

價值不信任 / The Value of Distrust in Social Capital Theory: A Canadian Perspective

唐佩馨, Dangoisse, Pascale Unknown Date (has links)
價值不信任 / The paper reviews some of the main perspectives on social capital literature and its relationship with political processes of a democratic government. It has been shown that social capital enables a group to achieve common goals. The present study focuses on the trust dimension of social capital. Salient expressions of trust within a community and towards a government are both generally regarded favorably. Recent studies are alarmed by the present lowered levels of trust of the population towards the government. Scholars and policy makers are trying to find a solution to the problem. The author of this paper argues that lowered expression of trust in the government is not alarming and actually not critical to the well functioning of the government. The author shows that trust networks within a community and trust towards a government do not work in the same way. The author demonstrates how distrust in the government can have a positive impact on both the community and the government itself. It will also be shown that distrust does not limit cooperation and that distrust can push for new institutions to be formed. Distrustful individuals will demand higher transparency and honesty levels from the agents they believe to be untrustworthy until they have proven themselves otherwise. This is particularly important in people – government relationships. The study uses a historical analysis of two Canadian cases to demonstrate the value of distrust. The Oka crisis of 1990 and the development of the Chantier de l’économie sociale will be detailed and analyzed.
27

Multimedia transaction tracking from a mutual distrust perspective.

Wong, Angela S. L. January 2007 (has links)
In this thesis, we present a novel, elegant and simple method for secure transaction authentication and non-repudiation for trading multimedia content. Multimedia content can be video, images, text documents, music, or any form of digital signal, however here we will focus particular on still images with application to video. We will provide proof that not only can receiving parties within a transaction be untrustworthy, but the owner, or members within an owning party, also cannot be trusted. Known as the insider attack, this attack is particularly prevalent in multimedia transactions. Thus the focus of the thesis is on the prevention of piracy, with particular emphasis on the case where the owner of a document is assumed to be capable of deceit, placing the system under the assumption of mutual distrust. We will introduce a concept called staining, which will be used to achieve authentication and non-repudiation. Staining is composed of two key components: (1) public-key cryptography; and (2) steganographic watermarking. The idea is to watermark a multimedia document after encryption, thereby introducing a stain on the watermark. This stain is due to the non-commutative nature of the scheme, so that decryption will be imperfect, leaving a residue of the cryptographic process upon the watermark. Essentially, secrets from the owner (the watermark) and the receiver (the cryptographic key) are entangled rather than shared, as in most schemes. We then demonstrate our method using image content and will test several different common cryptographic systems with a spread-spectrum type watermark. Watermarking and cryptography are not usually combined in such a manner, due to several issues such as the rigid nature of cryptography. Contrary to the expectation that there will be severe distortions caused to the original document, we show that such an entanglement is possible without destroying the document under protection. We will then attack the most promising combination of systems by introducing geometric distortions such as rotation and cropping, as well as compressing the marked document, to demonstrate that such a method is robust to typical attacks. / http://proxy.library.adelaide.edu.au/login?url= http://library.adelaide.edu.au/cgi-bin/Pwebrecon.cgi?BBID=1297339 / Thesis (Ph.D.) - University of Adelaide, School of Electrical and Electronic Engineering, 2007
28

Mothering and trust among women living with a history of childhood violence experiences: A critical feminist narrative inquiry

Pitre, Nicole Unknown Date
No description available.
29

Politické, sociální a etické aspekty konspiračních teorií / Political, social and ethical aspects of conspiracy theories

HNÁTEK, Martin January 2016 (has links)
The thesis deals with the concept of conspiracy theories in the context of society, psychology, political science and ethics. In connection with these areas there was created a framework of relevant subtopics that fall under the phenomenon of conspiracy theories. This thesis is divided into five parts. The firts part is dealing with connspiracy theories as a concept and presents its definition, typology and historical occurrence. Next chapter is devoted to the mutual relationship of conspiracy thinking and society, and how conspiracy theories acquiring its popularity. The following sections deals with the influence of psychological disorders on conspiracy belief, how conspiracies influence the political sphere and the last chapter deals with ethical evaluation of conspiracy theories impact.
30

Dare to Restore Trust and Drive Loyalty in Distrust-Dominated Environments: A Stakeholders Perspective

Talton, Rachel Y. January 2010 (has links)
No description available.

Page generated in 0.0361 seconds