• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 48
  • 18
  • 6
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 98
  • 98
  • 52
  • 45
  • 32
  • 28
  • 28
  • 25
  • 24
  • 22
  • 19
  • 15
  • 14
  • 14
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Personality traits and self-presentation on Facebook: a systematic review

Venter, Doreen Yvonne January 2016 (has links)
The influence of the Internet and Computer Mediated Communication (CMC) on the ways in which individuals with different personality traits present themselves, has been brought into question increasingly as modern life requires more and more of an enmeshment with technology in everyday life. The presentation of the self on Facebook has been the focus of recent research, delivering results that vary and sometimes contradict common ideas of the effects of individuals’ interaction via technology, especially in terms of how personality traits, as determined by the Five-factor model, impact self-presentation. A systematic review of the available literature was conducted, in order to bring about a consolidated description of the literature on the impact of personality traits on Facebook self-presentation. From 37 studies, the review found the motivation for Facebook use to be a mediating factor in the relationship between personality traits. Each personality trait in the Five-factor model impacts upon Facebook use, self-generated content, other-generated content, and the nature of the individual’s self-disclosure in varied ways. Due to visible cues on users’ profiles, some personality traits can be accurately detected by observers. The complexity and interrelatedness of variables involved in this relationship is highlighted by the findings of this review.
32

Investigating the relationship between the social phenomenon of Facebook and narcissistic socio-cultural tendencies

Zdanow, Carla January 2011 (has links)
Narcissism is increasingly being regarded as one of the biggest socio-cultural problems of the contemporary era. Indeed, recent studies by Baldwin and Stroman (2007) and Buffardi and Campbell (2008), among others, have advanced that new media technologies – in particular social networking websites – have significantly exacerbated the rise and spread of narcissism in contemporary society. Based on this premise, namely that social media provide the perfect platform for the promotion of self-infatuation, this research project will provide a critical analysis of the potential influence of social media in the development of a widespread narcissistic socio-cultural condition. In this regard, claims that increasingly consumerist, individualist and media-saturated societies are nurturing a culture of extreme narcissism, vanity and entitlement, will be examined in relation to an increase in the use of consumerorientated new media technologies. In particular, by examining the structural components of the popular social networking site, Facebook, this treatise will highlight the connection between the use of this form of new media and the engenderment of an acutely consumerist and narcissistic subjectivity – namely, commodity narcissism. That is, by examining the growth of narcissism from the 1940s through to the new millennium, the role of the media, and most recently new media technologies, in the promotion of commodity narcissism will be examined as factors of particular significance in the formation of contemporary subjectivity. In relation to this, the impact of commodity narcissism on the perpetuation and propagation of capitalist isolation, alienation and insecurity will be investigated with a view to exploring the potential impact of such narcissism on the efficacy of the democratic process. Finally, some remedial measures, which co-opt rather than negate such social media, will be proposed.
33

Facebook as a tool for social customer relationship marketing

Puffett, Lauren January 2012 (has links)
This study aimed to provide public relations professions with insight into the use of Social Customer Relationship Marketing as a marketing 2.0 tool which delivers the potential to elicit the opportunity for organisations to monitor, engage and manage conversations and relationships through Facebook. Drawing on literature from the fields such as new media, public relations, social customer relationship marketing, and public relations, a qualitative content analysis of case studies of selected organisations was conducted including 10 South African organisations that have incorporated Facebook into their Social Customer Relationship Marketing strategies. The content analysis was conducted to determine the amount of communications taking place on each fan page in order to support the data and provide additional insight into the research question, primary data was collected through two survey questionnaires of, firstly, social media users who subscribe to an organisation‘s Facebook page and, secondly, a survey conducted among the social organisations. Surveys were conducted to firstly determine the social organisations interactions with Facebook as secondly, to determine the social media users‘ interactions with the Facebook. The study found that the majority of the organisations under study in the content analysis successfully elicited user generated conversations about the brand, through content that was advocated by the organisations Facebook administrator. It is also evident as seen in the minority of organisations that these platforms are only likely to elicit consumer- driven dialogue on Facebook if the platform is managed effectively through initiated daily conversations about the brand. The continuous involvement by the administrator in encouraging conversations was necessary, as well as response to all wall posts by the social customer, participation in all conversations by providing accurate information to customers and potential customers about the brand. Conclusions from the survey questionnaires among the social identified the social customers need to be communicated with pro-actively by an organisations who can provide, through collaborative conversations, information pertaining to the brand in real time conversation, while the survey among the social organisation concluded the need for an organisation to not only create a social media footprint, but to allow for a space in which through conversation with the social customer, conversations can turn into relationships.
34

Localização de robô em ambiente interno utilizando um dispositivo móvel baseado no sistema operacional android para navegação inercial / Localization of a robot in indoor environment using a mobile device based on android operating system for inertial navigation

Silva, Pedro Ramon de Mello, 1987- 27 August 2018 (has links)
Orientador: Paulo Roberto Gardel Kurka / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Mecânica / Made available in DSpace on 2018-08-27T20:14:23Z (GMT). No. of bitstreams: 1 Silva_PedroRamondeMello_M.pdf: 5875188 bytes, checksum: c2d175b05fd3a31dbc7149f0b1b417b1 (MD5) Previous issue date: 2015 / Resumo: A navegação autônoma de robôs tem sido alvo de pesquisa. Um dos problemas a ser resolvido em navegação é a localização de um robô móvel enquanto este se locomove, ou seja, estimar o deslocamento e orientação para calcular a trajetória realizada. Um sistema de navegação inercial é um método de realizar a localização do robô utilizando sensores inerciais (acelerômetro, giroscópio e magnetômetro). Este trabalho apresenta a utilização de um dispositivo móvel baseado no sistema operacional Android, como UMI (Unidade de Medida Inercial), para um desenvolvimento de um sistema de navegação inercial de um robô terrestre. Para o calculo de orientação, foi aplicado o filtro complementar para melhorar o desempenho da estimação de orientação calculada pelo acelerômetro/magnetômetro combinado com o giroscópio. Para estimação de deslocamento, aplicou-se integral dupla nos dados de aceleração e propõe-se uma metodologia de movimento modulado para minimizar os erros de posição e desvios no sinal de velocidade devido ao processo de integração numérica e erros de devido a componente de corrente continua do acelerômetro / Abstract: The autonomous navigation of mobile robots have been the subject of many research. One of the problems to be solved in navigation, is the localization of a mobile robot as it moves around, in other words, to estimate the displacement and orientation to calculate the trajectory performed. An inertial navigation system is a method of performing the localization of the robot using inertial sensors (accelerometer, gyroscope and magnetometer). This work presents the use of a mobile device based on the Android platform, as IMU (Inertial Measurement Unit), for the development of an inertial navigation system of a robot. For guidance calculation, the complementary filter has been applied to improve the performance of guidance computed by accelerometer / magnetometer combined with the gyro. For displacement estimation, a double integral in the acceleration data was applied. Furthermore, a motion modulated methodology is proposed to minimize position errors and velocity drift due to numerical integration process and accelerometer offset errors / Mestrado / Mecanica dos Sólidos e Projeto Mecanico / Mestre em Engenharia Mecânica
35

A inquisição virtual : um estudo sobre a moralidade nos sites de redes sociais /

Kadooka, Aline. January 2019 (has links)
Orientadora: Rita Melissa Lepre / Banca: Maria Laura Nogueira Pires / Banca: Raul Aragão Martins / Banca: Antonio Francisco Marques / Banca: Luciane Guimarães Batistella Bianchini / Resumo: Os Sites de Redes Sociais são grandes dinamizadores do fluxo de informação e interconexões entre pessoas. Eles favorecem a construção e a produção de discursos que manifestam as múltiplas "verdades" sociais e suas representações. Além disso, são espaços complexos que estimulam o debate, geram ou desoprimem as tensões e, sobretudo, trazem os discursos sociais que refletem os valores e a moral de seus participantes. Nos Sites de Redes Sociais o ideal admitido é a liberdade e, portanto, os usuários tendem a avaliar e julgar a ação dos demais e vão além, aplicam sanções que bem entendem. O objetivo geral da pesquisa foi verificar e analisar como algumas questões relativas à moralidade apareceram nas publicações dos usuários e moldaram as suas ações dentro do Facebook. Temos como justificativa a necessidade de estudos que explorem a moralidade "virtual" dos participantes e apresentem programas e estratégias que promovam o uso consciente e responsável. Para tanto utilizamos como metodologia a netnografia. Ela consiste em uma pesquisa observacional participante, pois permite que o pesquisador adentre no universo que estuda por um determinado tempo, utilizando-se além das ferramentas próprias do Facebook, o diário de campo. Para cumprir com objetivos acessamos a plataforma diariamente durante o período de Junho de 2017 à Agosto de 2018, em busca de casos que causavam grande indignação nos usuários e eram as mais polêmicas da época. Além disso, elas deveriam tratar de questões... (Resumo completo, clicar acesso eletrônico abaixo) / Abstract: Social Networking Sites are great dynamizers of the flow of information and interconnections between people. They favor a construction and production of discourses that manifest as multiple "truths" and their representations. In addition, they are spaces that stimulate debate, generate or unfavor the tendencies and, above, bring social discourses that reflect the values and a moral of its participants. In Social Networking Sites the ideal is freedom, and therefore users tend to evaluate and judge an action of others and go beyond the attention that is understood. The purpose of the research was identified and shown as some issues related to morality. Studies justifying studies that explore a "virtual" morality and participate in programs and strategies that promote conscious and responsible use. For such use as a netnography network. It consists of a participatory observational survey, because it allows you to search in a universe that has a fixed rhythm, using the own tools of Facebook, the field diary. The date in the case of annual data to 2017 June of 2018, in the case of the case in the case of big data in the users are the greater data in time. In addition, they can be moral issues, such as: justice, robberies, lies, cooperation, altruism. We know that the feeling of indignation comes when the spectator disapproves of an action that considers a moral good and; in itself a value, and therefore what must be done must also follow the same foundations. Not accompanying the... (Complete abstract click electronic access below) / Doutor
36

Easy Encryption for Email, Photo, and Other Cloud Services

Koh, John Seunghyun January 2021 (has links)
Modern users carry mobile devices with them at nearly all times, and this likely has contributed to the rapid growth of private user data—such as emails, photos, and more—stored online in the cloud. Unfortunately, the security of many cloud services for user data is lacking, and the vast amount of user data stored in the cloud is an attractive target for adversaries. Even a single compromise of a user’s account yields all its data to attackers. A breach of an unencrypted email account gives the attacker full access to years, even decades, of emails. Ideally, users would encrypt their data to prevent this. However, encrypting data at rest has long been considered too difficult for users, even technical ones, mainly due to the confusing nature of managing cryptographic keys. My thesis is that strong security can be made easy to use through client-side encryption using self-generated per-device cryptographic keys, such that user data in cloud services is well protected, encryption is transparent and largely unnoticeable to users even on multiple devices, and encryption can be used with existing services without any server-side modifications. This dissertation introduces a new paradigm for usable cryptographic key management, Per-Device Keys (PDK), and explores how self-generated keys unique to every device can enable new client-side encryption schemes that are compatible with existing online services yet are transparent to users. PDK’s design based on self-generated keys allows them to stay on each device and never leave them. Management of these self-generated keys can be shown to users as a device management abstraction which looks like pairing devices with each other, and not any form of cryptographic key management. I design, implement, and evaluate three client-side encryption schemes supported by PDK, with a focus on designing around usability to bring transparent encryption to users. First, I introduce Easy Email Encryption (E3), a secure email solution that is easy to use. Usersstruggle with using end-to-end encrypted email, such as PGP and S/MIME, because it requires users to understand cryptographic key exchanges to send encrypted emails. E3 eliminates this key exchange by focusing on storing encrypting emails instead of sending them. E3 transparently encrypts emails on receipt, ensuring that all emails received before a compromise are protected from attack, and relies on widely-used TLS connections to protect in-flight emails. Emails are encrypted using self-generated keys, which are completely hidden from the user and do not need to be exchanged with other users, alleviating the burden of users having to know how to use and manage them. E3 encrypts on the client, making it easy to deploy because it requires no server or protocol changes and is compatible with any existing email service. Experimental results show that E3 is compatible with existing IMAP email services, including Gmail and Yahoo!, and has good performance for common email operations. Results of a user study show that E3 provides much stronger security guarantees than current practice yet is much easier to use than end-to-end encrypted email such as PGP. Second, I introduce Easy Secure Photos (ESP), an easy-to-use system that enables photos tobe encrypted and stored using existing cloud photo services. Users cannot store encrypted photos in services like Google Photos because these services only allow users to upload valid images such as JPEG images, but typical encryption methods do not retain image file formats for the encrypted versions and are not compatible with image processing such as image compression. ESP introduces a new image encryption technique that outputs valid encrypted JPEG files which are accepted by cloud photo services, and are robust against compression. The photos are encrypted using self-generated keys before being uploaded to cloud photo services, and are decrypted when downloaded to users’ devices. Similar to E3, ESP hides all the details of encryption/decryption and key management from the user. Since all crypto operations happen in the user’s photo app, ESP requires no changes to existing cloud photo services, making it easy to deploy. Experimental results and user studies show that ESP encryption is robust against attack techniques, exhibits acceptable performance overheads, and is simple for users to set up and use. Third, I introduce Easy Device-based Passwords (EDP), a password manager with improvedsecurity guarantees over existing ones while maintaining their familiar usage models. To encrypt and decrypt user passwords, existing password managers rely on weak, human-generated master passwords which are easy to use but easily broken. EDP introduces a new approach using self-generated keys to encrypt passwords, and an easy-to-use pairing mechanism to allow users to access passwords across multiple devices. Keys are not exposed to users and users do not need to know anything about key management. EDP is the first password manager that secures passwords even with untrusted servers, protecting against server break-ins and password database leaks. Experimental results and a user study show that EDP ensures password security with untrusted servers and infrastructure, has comparable performance to existing password managers, and is considered usable by users.
37

Vision Accomplished: How Professional Women Learned To Recreate Their Careers And Find Personal Fulfilment

Krug von Nidda, Helen January 2022 (has links)
Women account for half of a country’s potential talent base and numerous studies have shown that women’s participation in the workplace provides the nation with considerable competitiveness. Yet, despite an increasing breadth of educational and work opportunities, research has shown that women are more unhappy than they were in the 1970s. Some women, however, have made the successful and determined effort to seek fulfillment by voluntarily leaving an organization, pursuing their personal vision, and transitioning to their desired reality. This qualitative case study explored how 24 college-educated women learned to recreate their careers and find personal fulfillment. The purpose of this study was to understand how some women voluntarily left secured positions and how they applied the concept of a personal vision to transition to what was for them, a new desired reality. Personal vision is defined by Boyatzis et al. (2019) as an expression of an individual’s ideal self, expressing someone’s aspirations, dreams, and ambitions. The sample was a purposeful one. The primary method of data collection was participant semi-structured interviews. The second source of data was a group of six women with a personal vision who had not yet made the transition to their desired reality. The third source of data was document review, including CVs, LinkedIn, and social media accounts for cross-reference checking. The data was initially coded by research questions and the findings were coded by behavioral categories derived from the Conceptual Framework. Four conclusions emerged from the analysis. These include confirmation that women need to be motivated in order to achieve personal fulfillment, personal issues must be reconciled before women can begin their transition from an established situation to their desired reality, informal learning methods are key in helping women make their transition, and transitioning to a desired reality is unlikely without the support from others. Several recommendations for future research as well as recommendations for individuals, coaches, HR Practitioners and women’s networks and organizations are offered.
38

Changing communication through Facebook : redefining perceptions of public and private communication

Turco, Megan D. 01 January 2010 (has links)
There has been much research conducted into the phenomenon of online social networking. However, there has not been enough research conducted to establish its affect on our overall communication patterns. This research study focuses on the way in which Facebook is redefining perceptions of public and private communication. Using the current body of research paired with a varied theoretical backing, this research establishes Facebook's affect on the communication of college students while also noting how the users affect the way this medium is used. Focus groups at a private University were conducted to establish current uses and perceptions of Facebook and how college students utilize the site to communicate. The research discovered that through Facebook, a new version of confessing one's thoughts has been established and intensified. Also, the research discovered that students had difficulty in defining their own versions of private and public information, but they understood that the line between the two is no longer distinct.
39

Moving From A Textbook To Facebook College Students' Motivations For Using Social Networking Sites In Education

Halter, Heather J. 01 January 2010 (has links)
This study examined college student motivations for using social networking sites for educational purposes. Motives were examined through the uses and gratifications approach. If we can determine student motivations for using social networking sites, perhaps we can determine a way to successfully implement social networking sites into the classroom. By adding the concept of satisfaction, we can also determine if students will use the sites again. If students are satisfied with educational social networking site use, they will return to these sites for educational purposes again. Data was collected by giving a questionnaire to undergraduate students that assessed social networking site use, as well as motivations for and satisfaction with use. For general uses, students were motivated to use social networking sites for relationship maintenance, passing time, and information seeking purposes. Overall, students were satisfied with their use of the sites. For educational uses, students were motivated to use the sites for relationship maintenance and information seeking purposes. Overall, students are not satisfied with their use of these sites for educational purposes. Theoretical and practical implications of these findings are discussed.
40

Diseño e implementación de un sistema de fuerza de ventas para distribuidoras mayoristas sobre una red VPN móvil

Vargas Gómez, Carlos Manuel 14 July 2014 (has links)
En la presente tesis se realiza una propuesta de solución para la fuerza de ventas en las distribuidoras mayoristas. Dicha solución se plantea a través de un aplicativo móvil que permita el acceso a la información de la empresa como el monitoreo de dichos empleados, un aplicativo web el cual permite visualizar el monitoreo mencionado y será simulada sobre una red VPN Móvil. Esta tesis está estructurada de la siguiente manera: En el capítulo 1 se detallan el estado del arte de la cadena de suministros, la fuerza de ventas, antecedentes y estado actual de la red móvil en el país, estado de la red VPN Móvil y los aplicativos móviles. En el capítulo 2 se define la red VPN Móvil y sus partes, la red UMTS (3G) y su arquitectura. En el capítulo 3 se hace el diseño e implementación de la solución definiendo la arquitectura, el diagrama y diseño de los aplicativos a implementar. En el capítulo 4 se hace la simulación de la red VPN Móvil explicada en el capítulo 2 y el flujo del aplicativo móvil; se analiza los resultados obtenidos. Por último, en el capítulo 5 se realiza un análisis económico de cuan beneficioso resulta la utilización del aplicativo de fuerza de venta sobre dicha red para las empresas mayoristas.

Page generated in 0.1639 seconds