• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 1
  • Tagged with
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

The Intranet and Information Quality

Jonsdottir, Elin Astridur January 2000 (has links)
<p>In this work, the quality of information in the Internet and intranet will be dealt with. What characterises information of quality cannot be decided ones and for all, as it always will be in relation to the user's needs. The factors, however, that can be thought of when evaluating information can be outlined. These factors will be discussed and compared to the methods that are used by web editors to secure quality of the information in the intranet.</p><p>The methods used to investigate the paper's thesis, are the study of literature and three interviews are conducted. The study of literature is meant to reveal the aspects that can be considered when evaluating information published via the Internet and intranet. The interviews are conducted to see how web editors secure that the information in the intranet is of high quality.</p><p>The study has revealed that the following aspects can be considered when evaluating information in the Internet and intranet. These aspects are the purpose of the information; the information's authority; the accuracy, maintenance, and currency of the information and last, the accessibility and presentation of the information.</p>
2

The Intranet and Information Quality

Jonsdottir, Elin Astridur January 2000 (has links)
In this work, the quality of information in the Internet and intranet will be dealt with. What characterises information of quality cannot be decided ones and for all, as it always will be in relation to the user's needs. The factors, however, that can be thought of when evaluating information can be outlined. These factors will be discussed and compared to the methods that are used by web editors to secure quality of the information in the intranet. The methods used to investigate the paper's thesis, are the study of literature and three interviews are conducted. The study of literature is meant to reveal the aspects that can be considered when evaluating information published via the Internet and intranet. The interviews are conducted to see how web editors secure that the information in the intranet is of high quality. The study has revealed that the following aspects can be considered when evaluating information in the Internet and intranet. These aspects are the purpose of the information; the information's authority; the accuracy, maintenance, and currency of the information and last, the accessibility and presentation of the information.
3

Countering network level denial of information attacks using information visualization

Conti, Gregory John 27 March 2006 (has links)
We are besieged with information every day, our inboxes overflow with spam and our search queries return a great deal of irrelevant information. In most cases there is no malicious intent, just simply too much information. However, if we consider active malicious entities, the picture darkens. Denial of information (DoI) attacks assail the human through their computer system and manifest themselves as attacks that target the human's perceptual, cognitive and motor capabilities. By exploiting these capabilities, attackers reduce our ability to acquire and act upon desired information. Even if a traditional denial of service attack against a machine is not possible, the human utilizing the machine may still succumb to DoI attack. When successful, DoI attacks actively alter our decision making, often without our knowledge. In this dissertation, we address the problem of countering DoI attacks. We begin by presenting a taxonomy and framework of DoI attacks and countermeasures to add structure to the problem space. We then closely examine the use of information visualization as a countermeasure. Information visualization is a powerful technique that taps into the high bandwidth visual recognition capability of the human and is well suited to resist DoI attack. Unfortunately, most information visualization systems are designed without a clear emphasis on protecting the human from malicious activity. To address this issue we present a general framework for information visualization system security analysis. We then delve deeply into countering DoI in the network security domain using carefully crafted information visualization techniques to build a DoI attack resistant security visualization system. By creating such a system, we raise the bar on adversaries who now must cope with visualization enhanced humans in addition to traditional automated intrusion detection systems and text-based analysis tools. We conclude with a human-centric evaluation to demonstrate our systems effectiveness.

Page generated in 0.1167 seconds