• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 113
  • 7
  • 5
  • 5
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 172
  • 35
  • 33
  • 27
  • 21
  • 20
  • 19
  • 19
  • 18
  • 16
  • 14
  • 13
  • 13
  • 13
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Sector policing to improve community policing in South Africa

Smith, Donovan January 2008 (has links)
Magister Administrationis - MAdmin / The study introduces and puts forward Sector Policing as a model to expand Community Policing and to broaden the scope of crime prevention. It also demonstrates how Sector Policing can be utilised to decentralise policing and deepen community participation.
72

Interventions aimed at enhancing supervision capacity : a systematic review (2000-2013)

Trimble, Lyle January 2015 (has links)
Magister Artium (Psychology) - MA(Psych) / Literature suggests that novice supervisors are not adequately trained or equipped with the skills required in research supervision or to become productive researchers, and recommend that intervention strategies aimed specifically at enhancing supervision capacity, be prioritized. Primary texts report positive effects on student output and timely completion in a range of intervention strategies aimed at enhancing supervision capacity including supervisor training. However, it is difficult to compare these individual reports without a systematic attempt at filtration in which studies are evaluated for methodological rigour. The aim of this study was to consolidate the body of literature reporting on strategies aimed at enhancing supervision capacity which satisfies a threshold of methodological quality. The present study was a systematic review evaluating published literature from 2003 to 2013 that report on strategies aimed at enhancing supervision capacity. Only full-text, English articles within the UWC library databases were considered for inclusion provided that they report on the specified target group and focus of the study. Identified articles were evaluated on three levels: titles, abstract, and full text. Four instruments were used to facilitate data extraction and quality assessment including a Title summary sheet, abstract summary sheet, critical appraisal tool, and data extraction sheet. Meta-synthesis of included texts was conducted. Ethics: Permission to conduct the study was obtained from the appropriate committees at the University of the Western Cape (Registration number: 14/5/18). The information sources used in this study were all previously published and are in the public domain; therefore no additional permission for access was required. The study formed part of a larger NRF funded parent study. Thus the distinction between collaboration and plagiarism was carefully monitored given the collaboration between the present study and the larger parent study.
73

Goalsetting as a motivational mechanism for therapeutic intervention

Drotsky, Willem Abraham 22 October 2004 (has links)
Numerous theories of motivation have been formulated over decades, but only in the last 25 years has the field of motivation research been dominated by powerful and more sophisticated theories organised around personal agency beliefs and goal-related processes. Goal setting is a motivational technique that is routinely recommended for enhancing task performance. If goals for performance are established that are specific and challenging, substantial increases in performance have been reported. The basic assumption of goal-setting research is that goals are immediate regulators of human action. If goal setting is viewed primarily as a motivational mechanism, it is relevant to ask how it affects performance. Similarly, are there ways to enhance the processes of goal setting and goal attainment, and are there strategies that can be implemented to prolong and maintain motivational levels until the desired outcome has been reached? First and foremost, can theories of goal setting be applied successfully in a psychological therapeutic setting? In psychotherapy, goal setting is usually used to give direction to a treatment plan, and emphasis is seldom placed on the goal-setting process as such. A goal-setting model, with the emphasis on strategies to enhance the goal-setting process, as a motivational mechanism, seems to have application relevancy in therapeutic settings. The application and incorporation of the goal-setting process into the therapeutic process represents a symbiotic relationship, where the two processes function on a parallel level, but are also intertwined. The present study endeavours to apply such a model, as a motivational technique, in the context of therapeutic intervention. The method of research is a qualitative investigation, using a case study strategy of inquiry. / Dissertation (MA (Counselling Psychology))--University of Pretoria, 2005. / Psychology / unrestricted
74

Gain-Framed Messaging to Promote Adult Sport: An Exploration of the Effects of Efficacy-Enhancing Messages on Psychological and Behavioural Outcomes

Littlejohn, Meagan January 2016 (has links)
To understand how to better stimulate adult sport engagement, this study investigated effects of gain-framed messages (GFM; Rothman & Updegraff, 2010) on psychological/behavioural outcomes, with or without efficacy-enhancing messages (Latimer et al., 2010). Eligible adults (30-69 years-old) were randomly assigned to one of two experimental conditions (‘GFM alone’ or ‘GFM plus efficacy-enhancing messages’), or a control condition. Participants (N = 232; 62.5% female) completed baseline/screening measures, watched their messaging intervention and reported outcomes one-week later (Time 2), and responded one-month later (Time 3). Comparing the experimental conditions showed non-significant differences for all outcomes, indicating no added benefit of efficacy-enhancing messages. Collapsing the experimental groups and comparing against the control showed significant group-by-time interactions for three ‘outcome expectancies’ (travel, social affiliation, stress relief), with reports higher among experimental participants. Results also indicated that moderate-to-vigorous physical activity significantly decreased at Time 3 within the control, but remained constant among experimental participants.
75

Traditional and New Enhancing Human Cybernetic and Nanotechnological Body Modification Technologies: A Comparative Study of Roman Catholic and Transhumanist Ethical Approaches

Caligiuri, Michael January 2013 (has links)
Advances in cybernetic and nanotechnological body modifications currently allow for enhancements to human physical and mental function which exceed human species-based norms. This thesis examines body modification and human enhancement from two perspectives—Roman Catholicism and Transhumanism— in order to contribute to bioethical deliberations regarding enhancement technologies. Roman Catholicism has a longstanding tradition of bioethical discourse, informing the healthcare directives of Roman Catholic institutions. Transhumanism is more recent movement that endorses body modifications and human enhancements as a means of individual betterment and social evolution. The thesis first considers definitions of human enhancement and levels of normalcy in connection to cybernetic and nanotechnological bionic implants, and outlines a series of criteria to assess a technology’s potential bioethical acceptability: implantability, permanency, power, and public interaction. The thesis then describes Roman Catholicism’s response to non-enhancing decorative body modifications (cosmetic surgeries, common decorative modifications such as tattoos and piercings, and uncommon modifications such as scarifications and brandings) in order to establish a basis for possible Roman Catholic responses to enhancing cybernetic and nanotechnological modifications. This is followed by an analysis from a Roman Catholic perspective of the major social issues brought forward by enhancement technologies: commodification, eugenics, vulnerability, and distributive justice. Turning to Transhumanism, the thesis describes the origins and philosophy of the movement, and then discusses the bioethical principles it advances with regard to human enhancement. The thesis concludes by locating points of convergence between Transhumanism and Roman Catholicism that could be the basis of more widely accepted ethical guidelines regarding modification technologies.
76

Elements of internal marketing as predictors of employee satisfaction

Lubbe, Sarah May January 2013 (has links)
Many factors can influence service quality, however the main determinant of customers’ perceptions of service quality is often their interaction with service staff (Zeithaml & Bitner, 2009:351), resulting in the importance of employees in service delivery. Internal marketing (IM) acknowledges this, and is similar to other marketing activities within an organisation, which focuses on staff in order to enhance external performance (Papasolomou & Vrontis, 2006:179). The aim of the present study has been to investigate the elements of IM as predictors of employee satisfaction and to determine the relative importance of various IM attributes and with this in mind the primary and secondary objectives driving this study were: • to confirm the IM scale as used in the study by Jou et al. (2008:73) in a South African context; • to determine how well the identified IM elements predict employee satisfaction by: • determining if any of the identified IM elements are predictors of employee satisfaction; • assessing the relative contribution to employee satisfaction of each of the IM elements found to be predictors; and • investigating whether certain biographical factors, such as gender, tenure and level of customer interaction, also explain employee satisfaction A literature study of IM theory pointed to a number of broad definitions of the concept, identifying IM as either a tool, an internal process or as a process supporting external activities. IM can also be a working mix of elements aimed at motivating employees (Papasolomou & Vrontis, 2006:178) toward inter-departmental co-ordination in order to achieve a more customer-orientated approach to service marketing. This working mix of elements is known as the IM mix, being elements under the control of management that can be implemented in order to illicit desired responses from employees (Ahmed & Rafiq, 2002: 27). The IM mix elements put forward are varied and numerous, and there is much debate as to which of the elements constitute an IM mix. Against the background of these disparate IM mix elements, it was necessary to reconfirm those elements pertinent to an IM programme in a South African context. It was found that job quality and reward together with empathy and consideration are significant predictors of IM and should therefore form the cornerstone of any IM programme. / Dissertation (MCom)--University of Pretoria, 2013. / hj2013 / Marketing Management / unrestricted
77

A model for compound purposes and reasons as a privacy enhancing technology in a relational database

Van Staden, W.J.S. (Wynand Johannes Christiaan) 29 July 2011 (has links)
The protection of privacy related information of the individual is receiving increasing attention. Particular focus is on the protection of user interaction with other users or service providers. Protection of this interaction centres on anonymising the user’s actions, or protecting “what we do”. An equally important aspect is protecting the information related to a user that is stored in some electronic way (or protecting “who we are”). This may be profile information on a social networking site, or personal information in a bank’s database. A typical approach to protecting the user (data owner) in this case is to tag their data with the “purpose” the collecting entity (data controller) has for the data. These purposes are in most cases singular in nature (there is “one” purpose – no combinations of purposes – of the data), and provide little in the way of flexibility when specifying a privacy policy. Moreover, in all cases the user accessing the data (data user) does little to state their intent with the data. New types of purposes called compound purposes, which are combinations of singular or other compound purposes, are proposed and examined in this text. In addition to presenting the notion of compound purposes, compound reasons are also presented. Compound reasons represent the intent of the entity using the data (the data user) with the data. Also considered are the benefits of having the data user specifying their intent with data explicitly, the verification of compound reasons (the data user’s statement of intent) against compound purposes, the integration of compound statements in existing technologies such as SQL by providing a model for using compound purposes and reasons in a relational database management system for protecting privacy, and the use of compounds (purposes and reasons) as a method for managing privacy agreements. / Thesis (PhD)--University of Pretoria, 2011. / Computer Science / unrestricted
78

Vliv způsobů vedení na postoj zaměstnanců k učení se / Leadership and its impact on employees' approach towards learning

Palečková, Karolína January 2020 (has links)
The attention toward organizational learning has increased in last twenty years according to present studies and researches. Organizations have to cope with rapidly changing world and they have to find ways how to succeed in it. This study endeavours to find answers whether and how learning can be supported and accepted in the working environment and what can be improved to do so. Leaders are put into the centre of the interest due to their close effect on their followers. The subject of the study is a Czech located branch of a Dutch bank. The participants of the study come from one of the departments. The investigation took place in a form of questionnaires. The results showed that leaders' behaviour that was oriented toward learning could significantly influence learning of the subordinates. It was also found that transformational leadership style was applied more often than other styles of leadership by the leaders. Learning was perceived very positively by all the respondents. The study suggests possible implications and a potential future research orientation. Key words: leadership, leaders, workplace learning, improving learning
79

Encrypted Documents Retrieval From The Cloud With Searchable Encryption : A Searchable Encryption Scheme Implementation / Hämtning av Krypterade Dokument Från Molnet Med Sökbar Kryptering : Implementering av ett sökbart krypteringsschema

Rabat, Salim January 2021 (has links)
Encrypting data is a solution to enhance the privacy and confidentiality of the data owners when outsourcing storage to cloud storage providers. However, using conventional encryption algorithms would render search queries based on the content of the data useless. One solution to that problem is encrypting the data using a searchable encryption scheme which allows querying the encrypted data by its contents while keeping it encrypted on the cloud to maintain the privacy and confidentiality of the data. One sector that might benefit from using a searchable encryption scheme is the public procurement sector. Preparing to bid on public procurement can be complex because the potential bidder needs to fulfill requirements to confirm that they are eligible. The information and documents needed to win a bid are confidential. Thus, privacy is essential. Tendium offers services to potential bidders to manage their documents with potentially sensitive data in a cloud-based environment. Clients using this service can benefit from using a searchable encryption scheme. A searchable encryption scheme was designed and implemented as a proof of concept. The implemented scheme builds an index database based on keywords extracted from the documents where each keyword is encrypted and stored in the database. Each entry in the database has encrypted keywords and associated identifiers for the corresponding document that the keyword occurs in. The documents are then encrypted using the AES encryption algorithm. Searching the database is performed by utilizing deterministic cryptographic primitives to encrypt the searched keywords and query the database for the resulting ciphertext, which returns its corresponding document identifiers. The document identifiers are used to retrieve the encrypted documents. The documents are decrypted after they are retrieved. The implemented scheme has a linear time complexity relative to the number of words in the document when encrypting a document. The implemented scheme utilizes MongoDB for its index database. It is demonstrated that the scheme is efficient and performs queries for single keyword search and multi-keyword search in less than one millisecond. / Kryptering av data är en lösning för att förbättra integriteten och sekretessen för dataägarna vid outsourcing av lagring till molnlagringsleverantörer. Använ- -dning av konventionella krypteringsalgoritmer skulle dock göra sökfrågor baserat på innehållet i data värdelös. En lösning på det problemet är att kryptera data med hjälp av ett sökbart krypteringsschema som gör det möjligt att söka efter krypterade data med dess innehåll och samtidigt hålla den krypterad på molnet för att upprätthålla upprätthålla dataskyddet och konfident- -ialiteten. En sektor som kan ha nytta av att använda ett sökbart krypteringssche- -ma är sektorn för offentliga upphandlingar. Att förbereda sig för att lägga ett bud på en offentlig upphandling kan vara komplext eftersom den potentiella budgivaren måste uppfylla kraven för att bekräfta att de är berättigade. Informat- -ionen och dokumenten som behövs för att vinna ett bud är konfidentiella. Därför är integritet viktigt. Tendium erbjuder tjänster för att hjälpa potentiella anbudsgivare hantera sina dokument i en molnbaserad miljö. Kunder som använder denna tjänst kan dra nytta av att använda ett sökbart krypteringssc- -hema. Ett sökbart krypteringsschema utformades och implementerades som ett bevis på koncept. Det implementerade schemat bygger en indexdatabas baserad på nyckelord extraherade från dokumenten där varje nyckelord är krypterat och lagrat i databasen. Varje objekt i databasen har krypterade sökord och tillhörande identifierare för motsvarande dokument som sökordet förekommer i. Dokumenten krypteras sedan med AES-krypteringsalgoritmen. Sökning i databasen utförs genom att använda deterministiska kryptografiska primitiv för att kryptera de sökte sökorden och söka databasen efter den resulterande krypterade texten, som returnerar motsvarande dokumentidentifierare. Dokum- -entidentifierarna används för att hämta de krypterade dokumenten. Dokument- -en avkrypteras efter att de har hämtats. Det implementerade schemat har en linjär tidskomplexitet i förhållande till antalet ord i dokumentet vid kryptering av ett dokument. Det implementerade schemat använder MongoDB för sin indexdatabas. Det har visat sig att schemat är effektivt och utför sökfrågor för enstaka nyckelord och flera nyckelord på mindre än en millisekund.
80

Technologies respectueuses de la vie privée pour le covoiturage / Privacy-enhancing technologies for ridesharing

Aïvodji, Ulrich Matchi 24 January 2018 (has links)
L'émergence des téléphones mobiles et objets connectés a profondément changé notre vie quotidienne. Ces dispositifs, grâce à la multitude de capteurs qu'ils embarquent, permettent l'accès à un large spectre de services. En particulier, les capteurs de position ont contribué au développement des services de localisation tels que la navigation, le covoiturage, le suivi de la congestion en temps réel... En dépit du confort offert par ces services, la collecte et le traitement des données de localisation portent de sérieuses atteintes à la vie privée des utilisateurs. En effet, ces données peuvent renseigner les fournisseurs de services sur les points d'intérêt (domicile, lieu de travail, orientation sexuelle), les habitudes ainsi que le réseau social des utilisateurs. D'une façon générale, la protection de la vie privée des utilisateurs peut être assurée par des dispositions légales ou techniques. Même si les mesures d'ordre légal peuvent dissuader les fournisseurs de services et les individus malveillants à enfreindre le droit à la vie privée des utilisateurs, les effets de telles mesures ne sont observables que lorsque l'infraction est déjà commise et détectée. En revanche, l'utilisation des technologies renforçant la protection de la vie privée (PET) dès la phase de conception des systèmes permet de réduire le taux de réussite des attaques contre la vie privée des utilisateurs. L'objectif principal de cette thèse est de montrer la viabilité de l'utilisation des PET comme moyens de protection des données de localisation dans les services de covoiturage. Ce type de service de localisation, en aidant les conducteurs à partager les sièges vides dans les véhicules, contribue à réduire les problèmes de congestion, d'émissions et de dépendance aux combustibles fossiles. Dans cette thèse, nous étudions les problèmes de synchronisation d'itinéraires et d'appariement relatifs au covoiturage avec une prise en compte explicite des contraintes de protection des données de localisation (origine, destination). Les solutions proposées dans cette thèse combinent des algorithmes de calcul d'itinéraires multimodaux avec plusieurs techniques de protection de la vie privée telles que le chiffrement homomorphe, l'intersection sécurisée d'ensembles, le secret partagé, la comparaison sécurisée d'entier. Elles garantissent des propriétés de protection de vie privée comprenant l'anonymat, la non-chainabilité et la minimisation des données. De plus, elles sont comparées à des solutions classiques, ne protégeant pas la vie privée. Nos expérimentations indiquent que les contraintes de protection des données privées peuvent être prise en compte dans les services de covoiturage sans dégrader leurs performances. / The emergence of mobile phones and connected objects has profoundly changed our daily lives. These devices, thanks to the multitude of sensors they embark, allow access to a broad spectrum of services. In particular, position sensors have contributed to the development of location-based services such as navigation, ridesharing, real-time congestion tracking... Despite the comfort offered by these services, the collection and processing of location data seriously infringe the privacy of users. In fact, these data can inform service providers about points of interests (home, workplace, sexual orientation), habits and social network of the users. In general, the protection of users' privacy can be ensured by legal or technical provisions. While legal measures may discourage service providers and malicious individuals from infringing users' privacy rights, the effects of such measures are only observable when the offense is already committed and detected. On the other hand, the use of privacy-enhancing technologies (PET) from the design phase of systems can reduce the success rate of attacks on the privacy of users. The main objective of this thesis is to demonstrate the viability of the usage of PET as a means of location data protection in ridesharing services. This type of location-based service, by allowing drivers to share empty seats in vehicles, helps in reducing congestion, CO2 emissions and dependence on fossil fuels. In this thesis, we study the problems of synchronization of itineraries and matching in the ridesharing context, with an explicit consideration of location data (origin, destination) protection constraints. The solutions proposed in this thesis combine multimodal routing algorithms with several privacy-enhancing technologies such as homomorphic encryption, private set intersection, secret sharing, secure comparison of integers. They guarantee privacy properties including anonymity, unlinkability, and data minimization. In addition, they are compared to conventional solutions, which do not protect privacy. Our experiments indicate that location data protection constraints can be taken into account in ridesharing services without degrading their performance.

Page generated in 0.0915 seconds