• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 75
  • 7
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 95
  • 95
  • 95
  • 24
  • 23
  • 15
  • 14
  • 14
  • 12
  • 12
  • 12
  • 10
  • 10
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Information security issues facing internet café users.

Kgopa, Alfred Thaga. January 2013 (has links)
M. Tech. Business Information Systems / Although owners of Internet cafés extend the freedom to have Internet access to the community, they fail to tighten their computer security to safeguard the private information of their customers. This dissertation provides a conceptual framework for improving information security in the Internet Café, to help and ensure data privacy, data integrity, risk management and information security (IS) behaviour. The study investigated the information security issues that are faced by users of Internet cafés and explored the effects of these issues. The framework shows how users can improve their physical security to reach higher standards of information privacy over the Internet.
82

Teachers' perceptions of using e-mail as a communication tool in student guidance in primary schools: a casestudy

Chung, Lai-kam, Kathy., 鐘麗金. January 2001 (has links)
published_or_final_version / Education / Master / Master of Education
83

Web-based e-mail client for computer science

Wu, Jichuan 01 January 2003 (has links)
The project is a web e-mail application to provide a web page interface for all CSCI faculty, staff and students to handle their e-mails. The application is written by JSP, Java Servlets, JavaScript and custom JSP tag libraries. Regular e-mail capabilities have been enhanced by the feature of allowing users to store and manage messages by day (store to daily folders, view in daily folders, append notes for that day).
84

E‐Shape Analysis

Sroufe, Paul 12 1900 (has links)
The motivation of this work is to understand E-shape analysis and how it can be applied to various classification tasks. It has a powerful feature to not only look at what information is contained, but rather how that information looks. This new technique gives E-shape analysis the ability to be language independent and to some extent size independent. In this thesis, I present a new mechanism to characterize an email without using content or context called E-shape analysis for email. I explore the applications of the email shape by carrying out a case study; botnet detection and two possible applications: spam filtering and social-context based finger printing. The second part of this thesis takes what I apply E-shape analysis to activity recognition of humans. Using the Android platform and a T-Mobile G1 phone I collect data from the triaxial accelerometer and use it to classify the motion behavior of a subject.
85

Use and management of electronic mail in the Central Government of Zimbabwe

Mutsagondo, Samson 01 1900 (has links)
This study investigated the use and management of electronic mail (email) in Zimbabwe’s central government. Employing a mixed method research approach, the study used a pluralist ontological paradigm and a pragmatic epistemological paradigm within the convergent mixed methods research design. Quantitative responses from questionnaires were corroborated by qualitative findings from semi-structured interviews, personal observation and document reviews. The study was restricted to Zimbabwe’s central government, focusing on head offices of 22 government ministries situated in Zimbabwe’s capital city of Harare. The population of the study was 670. The Corona Virus Disease 2019 (COVID-19) lockdown imposed in Zimbabwe as from 30 March 2020 negatively affected data collection as some targeted respondents could not be accessed as the researcher had initially planned, leading to an overall response rate of 37.3%. Nonetheless, 12 out of 22 government ministries participated in the study. Quantitative data were analysed using Microsoft Excel 2010® and descriptive statistics while qualitative data were analysed thematically using Atlas.ti®. The study conformed to ethical standards of research as espoused in the University of South Africa’s ethical review guidelines. The study revealed that due to the adoption of electronic government and the inherent relative advantages of email, among other factors, there was increase in use of email as an official record in Zimbabwe’s central government. Nonetheless, management of email was still in its nascent stages and was largely poorly articulated. Poor email classification, filing, appraisal, security, preservation and disposal were largely traceable to deficiencies in legal, policy and procedural frameworks as well as skills and information and communication technology infrastructural challenges. These in turn triggered email retrieval, access, preservation and authenticity challenges. This study was a first local research to address both the use and management of email in a single study and one which proposed a framework for the effective use and management of email where a call was made to match increase in use of email with increase in professional management of the same. The proposed framework may go a long way in influencing proper and professional use and management of email in Zimbabwe’s central government and similar organisations. / Information Science / D. Phil. (Information Science)
86

Gestion des connaissances et communication médiatisée : traçabilité et structuration des messages professionnels / Knowledge manageemnt and mediated communication : traceability and structure of professional emais

Rauscher, François 13 October 2016 (has links)
Même si le capital immatériel représente une part de plus en plus importante de la valeur de nos organisations, il n’est pas toujours possible de stocker, tracer ou capturer les connaissances et les expertises, par exemple dans des projets de taille moyenne. Le courrier électronique est encore largement utilisé dans les projets d’entreprise en particulier entre les équipes géographiquement dispersées. Dans cette étude, nous présentons une nouvelle approche pour détecter les zones à l'intérieur de courriels professionnels où des éléments de connaissances sont susceptibles de se trouver. Nous définissons un contexte étendu en tenant compte non seulement du contenu du courrier électronique et de ses métadonnées, mais également des compétences et des rôles des utilisateurs. Également l’analyse pragmatique linguistique est mêlée aux techniques usuelles du traitement de langage naturel. Après avoir décrit notre méthode KTR et notre modèle, nous l'appliquons à un corpus réel d’entreprise et évaluons les résultats en fonction des algorithmes d’apprentissage, de filtrage et de recherche / Even if intangible capital represents an increasingly important part of the value of our enterprises, it’s not always possible to store, trace or capture knowledge and expertise, for instance in middle sized projects. Email it still widely used in professional projects especially among geographically distributed teams. In this study we present a novel approach to detect zones inside business emails where elements of knowledge are likely to be found. We define an enhanced context taking into account not only the email content and metadata but also the competencies of the users and their roles. Also linguistic pragmatic analysis is added to usual natural language processing techniques. After describing our model and method KTR, we apply it to a real life corpus and evaluate the results based on machine learning, filtering and information retrieval algorithms
87

Design and implementation of personal health data monitoring and retrieval system for health providers

Ojo-Seriki, D. F. 17 August 2020 (has links)
M. Tech. (Department of Process Control and Computer System, Faculty of Engineering and Technology), Vaal University of Technology. / Personal health record system (PHRS) is a tool that is used in maintaining the health and wellness of an individual as well as helping with illness of an individual. PHRS gives the individual access to a wide range of credible health information, data, and knowledge. Individuals can use that access to improve their health and manage their diseases. Patients with chronic illness can track and manage their health in conjunction with their health provider, this will promote early intervention when they encounter an abnormality or complications. Continuous monitoring and storing of health information has been a challenge for patients and health providers. Personal health data monitoring and retrieval system for health providers was designed and implemented. The main aim of this study was to develop an accurate, secure and flexible personal health data monitoring and retrieval system for health providers (PHRS). This was achieved. The research showed that when a patient health information (Electrocardiogram (ECG) and temperature) was monitored, the heartbeat (ECG) sensor output the value as an analog value to the signal processing (NodeMCU) which was then converted to a digital value. The temperature sensor used in this research is a digital sensor which lowers the amount of ADC conversion that was done. The digital values are displayed on LCD, its send to a personal health data storage system which was designed for health information storage purposes. It also sends the value to a retrieval system which is an android application that is connected to the data storage system to display health information to the health providers from a remote location. Personal health data storage and the retrieval system are secure due to the Message queuing telemetry transport (MQTT) protocol used in the application layer. The MQTT protocol is secure due to the secure socket layer (SSL) which is an encryption based on presentation layer embedded inside the MQTT protocol. After the comparison of the software simulation and the prototype test, the differences in the value for the heartbeat and temperature sensor indicate 0.04 BPM and 0.04 oC which shows the accuracy of the sensing circuit. Personal health data monitoring and retrieval system developed is applicable and useful to multiple entities in and around South Africa such as; Ministry of health, hospitals, sport and recreations.
88

Doing Good While Going Public: Ramping Up the ExactTarget Foundation Amidst the IPO Process (Q1 2012)

Ross, Nicole Kristine 14 February 2013 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / indefinitely
89

Bulk unsolicited electronic messages (spam) : a South African perspective

Geissler, Michelle Lara 30 November 2004 (has links)
In the context of the Internet, spam generally refers to unsolicited and unwanted electronic messages, usually transmitted to a large number of recipients. The problem with spam is that almost all of the related costs are shifted onto the recipients, and many of the messages contain objectionable content. Spam has become a significant problem for network administrators, businesses and individual Internet users that threatens to undermine the usefulness of e-mail. Globally, spam spiralled to account for over 60% of all e-mail near the end of 2004. It is a problem that costs the global economy billions of dollars a year in lost productivity, anti-spam measures and computer resources. It has forced governments to enact legislation against the problem and it has prompted the development of numerous technical countermeasures. Spam can only be defeated by a combination of legal measures, informal measures (including self regulation and social norms), technical measures and consumer education. Because spam is a relatively recent and evolving problem, the application of various common law mechanisms are explored, including the law of privacy and the law of nuisance. Various constitutional concerns may also arise in the context of spam, and the right to freedom of expression must be balanced against other competing rights and values, including the right to privacy. Comparative legislation is examined, because it is important to recognise trends in spam legislation in other jurisdictions so as to ensure a measure of interoperability with those laws. The practical difficulties in identifying spammers, and the lack of jurisdiction over offshore offenders affect the practical implementation of the current protection offered by the ECT Act. In conclusion, this thesis identifies the need for direct anti-spam legislation in South Africa, and suggests various clauses that will need to be catered for in the legislation. It is submitted that "opt-in" legislation should be preferred over "opt-out" legislation. It is further submitted that a definition of spam should be based on the volume and indiscriminate nature of the e-mail, and not only on whether the communication was commercial. Therefore, a definition of bulk unsolicited e-mail is proposed. / Criminal & Procedural Law / LLD
90

Examining hybrid spaces for newcomer English language learners: a critical discourse analysis of email exchanges with business professionals / Critical discourse analysis of email exchanges with business professionals

Kramer, Benjamin Paul, 1968- 28 August 2008 (has links)
This paper provides analysis of a series of email correspondences between secondary newcomer immigrant students and Latino business professionals within the same urban community. The author, using James Gee's discourse theory (1990, 1996, 1999, 2004) contends that school-based discourses and structures have historically operated as barriers to academic success and societal acceptance for the vast majority of secondary English Language Learners, indicating the systemic perpetuation of a racist, classist, xenophobic social order through the public schools. When an attempt is made to sidestep these school-based discourses and put students in direct contact with mature, successful practitioners of English outside of the education community, the students encounter "mentor talk," a set of discourses that uncritically embrace the notions of a neutral, meritocratic, knowledge-based socioeconomic order. At the same time, students encounter language that can be appropriated for their own creative constructions of identity as they seek to position themselves in a new society. Even when there exists a strong alignment between the student's socially-situated identity presentation and the ideological thrust of "mentor talk," many societal barriers stand in the pathway of social and educational advancement. More often, the student identities express resistance, often subtle, to the standard, hegemonizing guidelines for success they have been offered. / text

Page generated in 0.1059 seconds