• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 283
  • 236
  • 116
  • 47
  • 24
  • 18
  • 16
  • 6
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 2
  • Tagged with
  • 892
  • 158
  • 150
  • 122
  • 110
  • 78
  • 71
  • 70
  • 62
  • 58
  • 58
  • 53
  • 51
  • 49
  • 46
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
111

Through the lens of exploitation: landscapes of care of identified trafficked people

Nicklas, Jeffrey 13 July 2017 (has links)
In this qualitative research project, I examine the development of landscapes of care for, and by, identified trafficked people and its implications for rebuilding a sense of place and identity. Through in-depth interviews and ethnographic data, I argue that discourse, place and identity interact to form complex landscapes within both providers and clients/patients that emerge as distinct experiences of care or non-care experiences. Each analytical chapter examines a particular production of care: a merging of psycho-legal care, the interactions of formalized informal caring relationships, and the burden of external identification in the configuration of self-identity among identified trafficked people. Building on anthropological theories of care (Giordano 2014; Mulla 2014; Stevenson 2014; Mattingly 2010), these chapters build the argument that, in contrast to humanitarian human trafficking and trauma discourse that focuses on a specific kind of trafficking experience; the complex assemblage of trafficking experience and subsequent care should be considered within what I term “structural trafficking.” Becoming identified as trafficked is beneficial for receiving specific rights and services. However, this identity can also be detrimental for rebuilding a sense of self and place, because it assumes a fixed experience that translates to fixed care packages. I examine multiple landscapes of care to better understand potentials for care by expanding identity and coordinating existing and novel systems of care.
112

Acyclic stereocontrol and chemical diversity & application to the synthesis of macrolide and ansa antibiotics

Wang, Wengui January 1998 (has links)
Thèse numérisée par la Direction des bibliothèques de l'Université de Montréal.
113

Human Trafficking in Gauteng, South Africa : How do socio-economic factors influence the vulnerability of women to engage in sexual services and potential trafficking in Gauteng, South Africa?

Lundqvist, Linnéa January 2024 (has links)
This research aims to investigate how socio-economic factors influence the vulnerability of women to engage in sexual services and potential trafficking in Gauteng, South Africa. This province is South Africa’s most prosperous one with an enormous flow of migrants and is therefore of interest to investigate. Moreover, it is certainly intriguing to examine more into South Africa's measures against human trafficking; additionally, it is interesting to investigate further here because of the signature by South Africa of the Palermo protocol and look further and deeper into if this signature has helped decrease the crime. This research seeks to untangle the complex web of factors contributing to vulnerability. By examining the socio-economic and potential other dimensions of human trafficking in South Africa, the aim is to gain a deeper understanding of how these factors interact, perpetuating a cycle of victimization and further raise crucial awareness of the subject. This research has adopted a abductive qualitative content-desk study to be most appropriate for the research and in order to do at least harm as possible to the victims by using already published documents and reports. Furthermore, theories and approaches such as Radical Feminist Theory, Rational Choice Theory, Human Rights-Based Approach and V-Dem Approach have been used in order to answer the objective as successfully as possible. The conclusion of this study points at the fact that women’s lower societal position, along with patriarchal influences, cultural practices and state corruption impact human trafficking and the vulnerability for women making them fall a victim of the crime. Recommendations that have been made in the paper are further studies on the subject and an idea of universal legislation regarding human trafficking, which could be similar to Agenda 2030 and finally some urgent measures in Gauteng.
114

Foreign Domestic Workers in Hong Kong: Identifying Risk Factors, Resilience, and Psychological Well-Being

Mok, Ka Yan 01 August 2019 (has links)
Domestic workers, also known as house maids or handmaids, are a predominately female workforce that traditionally provides labor in upper-class households. With the increase of dual income families and the global expansion of the middle class, the demand for domestic workers increased, which facilitated the practice of importing lower-cost foreign domestic workers (FDWs) from developing areas. Hong Kong has the highest concentration of FDWs when compared to other metropolitan areas, such as Taiwan, Singapore, or New York. Since the trade began in the 1970s, qualitative research and journalistic investigations have reported that FDWs frequently encounter exploitation, including emotional, physical, and sexual abuse; being underpaid and overworked; and racial discrimination. With sparse quantitative research identifying risk factors that predict psychological well-being, this study hypothesized two models: (a) racial and ethnic microaggressions, job satisfaction, and family concern predict psychological distress and (b) resilience mediates the association in the first model. We surveyed 478 female FDWs in Hong Kong, and the results suggested that racial and ethnic microaggressions, job satisfaction, and family concerns were significant predictors of psychological distress, supporting the first hypothesis. The women demonstrated very high levels of psychological resilience; however, due to a ceiling effect in the measure of resilience, the data collected on resilience were unrelated to job satisfaction and family concerns. Thus, the second model was not supported, apparently due to a problem in the measurement of the construct of resilience in this sample of FWDs. Overall, FDWs’ working conditions and their level of resilience to those conditions did significantly influence their levels of psychological distress. These findings serve as pilot data for future quantitative research that investigates female FDWs’ employment experience.
115

Intégration de la récolte de biomasse forestière comme outil sylvicole dans les opérations forestières en forêt boréale affectée par la tordeuse des bourgeons de l'épinette

Gouge, Daniel 04 February 2021 (has links)
L’utilisation de la biomasse forestière comme source d’énergie est de plus en plus intéressante dans le contexte actuel de lutte contre les changements climatiques puisqu’elle permet de réduire la consommation d’énergie fossile. La récolte de biomasse peut varier sur plusieurs aspects tels que le volume de bois récolté, la source de biomasse et le contexte du territoire. Cette étude vise à déterminer l’effet de la récolte de biomasse sur l’établissement de la régénération ainsi que sur les besoins subséquents en préparation de terrain dans les forêts affectées par la tordeuse des bourgeons de l’épinette; les retombées en termes de coûts et d’émissions de carbone sont aussi analysées. Le secteur d’étude fait partie du domaine bioclimatique de la pessière à mousses de la région de la Côte-Nord, Québec, Canada et se situe à 25 km au nord de la ville de Port-Cartier. Pour établir le dispositif, la récolte de biomasse a été effectuée durant les années 2018 et 2019 dans certaines aires de coupe totale de peuplements dominées par le sapin et l’épinette noire. Des parcelles échantillons ont été disposées aléatoirement dans des aires de coupe avec récolte de biomasse et des aires témoin (sans récolte de biomasse) pour y évaluer: la qualité de la régénération, la quantité de microsites propices à la régénération, le recouvrement de la compétition, la quantité de débris ligneux au sol et le type de substrat. Les données de coûts d’opération pour la collecte et le transport de la biomasse étaient fournies grâce à une collaboration avec l’industriel Rémabec. Nos résultats suggèrent que la récolte de biomasse augmente la densité de régénération et la quantité de microsites propices à la régénération. Nous avons aussi observé que la récolte de bois résiduel permettait de réduire les coûts de remise en production des sites de coupe d’environ 282.07$ CA ha⁻¹, ce qui équivaut à 14.45$CA par tonne métrique anhydre de biomasse récoltée. De plus, lorsque combiné à la préparation de terrain et à la plantation, un scénario incluant la récolte d’environ 45% du volume de débris ligneux pour la production de bioénergie entrainait la séquestration de carbone cumulative la plus élevée sur une période de 100 ans par rapport à tout autre scénario sans récolte de biomasse. Cette étude suggère que l’intégration de la récolte de biomasse comme outil sylvicole a un potentiel économique et écologique important. La bioénergie peut jouer un rôle clé pour la transition énergétique vers des énergies renouvelables, la mise en valeur des résidus forestiers et la lutte contre les changements climatiques.
116

"Auto"-Exploitation: A Marxist Examination of Self-Driving Cars

DuVall, Parker 01 January 2023 (has links) (PDF)
In this thesis, I argue that a neo-Marxist critical theory perspective on self-driving cars shifts critical conversations from risks and benefits to concerns about the commodification of free time necessary for our human experience of autonomy. First, I outline that neo-Marxist perspective by charting the different types of power exercised by a capitalist in order to increase their surplus. I then analyze Karl Marx's conception of time in economic exchange to show that, under capitalism, power is exercised over labor through the commodification of workers' free time. I then introduced Michel Foucault's concept of biopower to transition to the commodification not only of labor but also of bodies. Then, I introduce contemporary German philosopher Byung-Chul Han's concept of psychopolitics as a neo-Marxist critique of the exercise of power over the psyche of individuals in order to increase their surplus. These philosophers' models shift commodification from labor to bodies to information. In the final section, I apply Han's contemporary critique of power dynamics to the case of self-driving cars (SDCs) to show that the technologies they represent may serve to perpetuate the negative implications of a constantly optimizing society: a continuation of commodification of the very conditions of labor. This analysis illuminates an overlooked possible negative implication of this emerging technology, as contemporary literature focuses heavily on the developer of the self-driving cars rather than the user and glosses over possible concerns of alienation of the workers' time itself. I argue that increases in "free time" proposed by the implementation of self-driving cars will inevitably be used for "auto"-exploitation, or, self-exploitation. This thesis will contribute to developing work on the effects self-driving cars have on their users, rather than emphasizing effects on society or our environments.
117

Commercial sexual exploitation of children: Parents’ knowledge, beliefs, and protective actions

Langford, Grace Elisabeth Layton 01 May 2020 (has links)
While commercial sexual exploitation of children (CSEC) is widespread, little research has been conducted regarding parents’ knowledge of, beliefs about, and protective actions against CSEC. Using Bronfenbrenner’s ecological systems model as a lens and a quantitative survey, this study explored four questions: how knowledgeable of CSEC are parents in Mississippi and the surrounding states; what beliefs do parents have toward CSEC; how are parents taking protective actions against CSEC; and how are parents’ knowledge, beliefs, and protective actions correlated? Results from 13 participants were examined for frequencies and correlations. Findings indicated that parents have a basic knowledge of CSEC, beliefs favorable to CSEC prevention and intervention, and parents take protective actions. However, gaps and inconsistencies existed. In future, practitioners should target parents and church staff for CSEC prevention and intervention education and training.
118

An Approach To Graph-Based Modeling Of Network Exploitations

Li, Wei 10 December 2005 (has links)
Computer security professionals and researchers are investigating proactive techniques for studying network-based attack behavior. Attack modeling is one of these research areas. In this dissertation, we address a novel attack modeling technique called an exploitation graph (e-graph) for representing attack scenarios. The key assumption in this research is that we can use exploitation graphs to represent attack scenarios, and methods involving e-graphs can be applied to provide vulnerability mitigation strategies. The modeling process consists of three primary steps. The first step is the creation of a knowledge base of vulnerability graphs (v-graphs) from known system vulnerabilities. Each v-graph shows necessary preconditions in order to make the vulnerability exploitable, and post-conditions that denote effects after a successful exploitation. A template is used to facilitate the definition of preconditions and post-conditions. The second step involves the association of multiple v-graphs to create an e-graph specific to a system being modeled. Network topology information and security policies (e.g., firewall rules) are encoded during the modeling process. A set of experiments were designed to test the modeling approach in a cluster computing environment consisting of one server node and eight internal computing nodes. Experimental results showed that e-graphs can be used to evaluate vulnerability mitigation solutions, e.g., identifying critical vulnerabilities and evaluating firewall policies. The third step of this process focuses on devising graph-simplification techniques for large e-graphs. Efficient graph-simplification techniques are described based on host and exploitation similarity. The most distinctive feature of these techniques is that, they help to simplify the most complex graph-generation process and do not require excessive memory storage. Experimental results showed that these techniques can not only reduce the size of e-graphs substantially, but also preserve most information needed for useful attack scenario analysis. The usefulness of the e-graph approach is shown in this dissertation. As a general approach for system administrators, the proposed techniques can be used in, but is not limited to, the cluster-computing environment in providing proactive Vulnerability Assessment (VA) strategies.
119

Hazards, negligence, and abuse in the apparel manufacturing industry: Labor conditions from 1910-2015

Peterson, Emma 06 May 2016 (has links)
No description available.
120

The Effects of a Trust Violation in a Team Decision-making Task: Exploring the Affective Component of Trust

Fallon, Corey K. 11 October 2016 (has links)
No description available.

Page generated in 0.0255 seconds