• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 36
  • 13
  • 12
  • 3
  • 3
  • 2
  • 2
  • 1
  • Tagged with
  • 92
  • 92
  • 20
  • 18
  • 17
  • 17
  • 15
  • 15
  • 11
  • 11
  • 10
  • 9
  • 9
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

THE IMPACTS OF VISIBLE/INVISIBLE IDENTITY CHARACTERISTICS ON EMPLOYEES’ PERCEPTIONS OF DISCRIMINATION, JOB SATISFACTION, AND TURNOVER INTENTIONS

Vosoughian, Azadeh 01 June 2017 (has links)
Every individual associates him/herself with a specific and sometimes a unique identity. In a workplace setting individuals may choose to either openly display and/or speak about their identity or they may choose to conceal it. Research shows that manifestation and/or suppression of an identity in the workplace can affect individual outcomes such as perceptions of discrimination, job satisfaction, and turnover intentions. The present study investigated whether an identity characterized as visible and/or invisible would affect an individual’s decision to either manifest and/or suppress his/her identity. The study further examined the effects of identity management techniques used by individuals on their perceptions of discrimination in the workplace, job satisfaction, and intentions to leave the organization. The sample included 369 individuals who were at the time of the survey at least half time employed. Independent-samples t-tests were used to test the relationship between identity characteristics and identity management. Path analyses was used to analyze the hypothesized relationship between identity management, perceptions of discrimination, job Satisfaction, and turnover intentions. The study found that individuals with an invisible identity are more likely to suppress their identities. It was also found that identity suppression had a direct positive relationship with perceptions of discrimination. Perceived discrimination was found to have a negative correlation with job satisfaction and a positive relationship with turnover intentions. Additionally, the study found that Job satisfaction is negatively correlated with Turnover Intentions. The importance of proper diversity management strategies and the role of an inclusive work environment on employees’ decision to either manifest and/or suppress their identities are discussed.
22

Identity Management Strategies of Resident Assistants

Edwards, Rachel 01 August 2010 (has links)
The resident assistant (RA) position at higher education institutions is a position of great influence. RAs have the opportunity to impact many students’ lives through the various roles that they engage in as a RA. The most common roles that RAs are expected to perform include developing community, serving as a peer helper, being a friend to residents, and enforcing policy. The very nature of a multi-role position presents challenges for RAs in understanding how to effectively enact all of their roles. This study aimed at developing an understanding of the ways in which RAs engage in identity management strategies with residents. To accomplish this purpose, 143 RAs were surveyed using an identity management strategies scale designed for this study. In addition, a previously designed self-monitoring scale was also administered to test the relationship between identity management strategies and self-monitoring. These scales were applied to situations representing each of the four primary roles of a RA: community developer, peer helper, friend, and policy enforcer. The results indicate that RAs are more likely to engage in avoidance strategies during the policy enforcer role than any other strategy. In addition, first-year RAs generally use more effective identity management strategies when developing community than returner RAs use. First-year RAs’ identity management strategies also appear to be more influenced by the RAs’ desires to be friends with residents than returner RAs’ identity management strategies. The results also indicate that female RAs are more effective in the community development role than male RAs. However, male RAs are more effective than female RAs in the policy enforcement role. A result that was supported throughout the study was the finding that RAs with upperclassmen residents are not as actively engaged in communicating their roles to residents than are RAs with freshmen and upperclassmen residents or only freshmen residents. Finally, the relationship of perceived self-monitoring to RAs’ choice of identity management strategies was not supported. The results of the study, interpretation of the data analysis, study implications, and directions for future research are discussed in detail.
23

Identity Management and Resource Allocation in the Network Virtualization Environment

Chowdhury, N.M. Mosharaf 22 January 2009 (has links)
Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet architecture are now limited to simple incremental updates; deployment of any new, radically different technology is next to impossible. To fend off this ossification, network virtualization has been propounded as a diversifying attribute of the future inter-networking paradigm. In this talk, we provide an overview of the network virtualization environment (NVE) and address two basic problems in this emerging field of networking research. The identity management problem is primarily concerned with ensuring interoperability across heterogeneous identifier spaces for locating and identifying end hosts in different virtual networks. We describe the architectural and the functional components of a novel identity management framework (iMark) that enables end-to-end connectivity across heterogeneous virtual networks in the NVE without revoking their autonomy. The virtual network embedding problem deals with the mapping of virtual nodes and links onto physical network resources. We argue that the separation of the node mapping and the link mapping phases in the existing algorithms considerably reduces the solution space and degrades embedding quality. We propose coordinated node and link mapping to devise two algorithms (D-ViNE and R-ViNE) for the online version of the problem under realistic assumptions and compare their performance with the existing heuristics.
24

Identity Management and Resource Allocation in the Network Virtualization Environment

Chowdhury, N.M. Mosharaf 22 January 2009 (has links)
Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet architecture are now limited to simple incremental updates; deployment of any new, radically different technology is next to impossible. To fend off this ossification, network virtualization has been propounded as a diversifying attribute of the future inter-networking paradigm. In this talk, we provide an overview of the network virtualization environment (NVE) and address two basic problems in this emerging field of networking research. The identity management problem is primarily concerned with ensuring interoperability across heterogeneous identifier spaces for locating and identifying end hosts in different virtual networks. We describe the architectural and the functional components of a novel identity management framework (iMark) that enables end-to-end connectivity across heterogeneous virtual networks in the NVE without revoking their autonomy. The virtual network embedding problem deals with the mapping of virtual nodes and links onto physical network resources. We argue that the separation of the node mapping and the link mapping phases in the existing algorithms considerably reduces the solution space and degrades embedding quality. We propose coordinated node and link mapping to devise two algorithms (D-ViNE and R-ViNE) for the online version of the problem under realistic assumptions and compare their performance with the existing heuristics.
25

Corporate Identity Management : A case study of Corporate Identity within Linnaeus University

Kansbod, Mathias, Wang Andresen, Fredrik January 2012 (has links)
Linnaeus University was created January first, 2010 and set step in to a market where the competition between universities is increasing. It’s in fact increasing to a degree where universities might be forced to shut down as a result of the competition. As the competition is growing, schools marketing efforts is getting more professional. Many universities now have a well thought out strategy for attracting students and to get a competitive advantage. In order to accomplish this it’s essential for organizations to acquire and retain some uniqueness that cannot be imitated by competitors and in the last two decades there has been an increasing attention paid to corporate identity management as a source of competitive advantage. Most researchers perceive corporate identity as an organization´s presentation of itself to its various stakeholders and the way it distinguishes itself from similar and/or competitive organizations.Using a qualitative research method we studied the case of Linnaeus University. The purpose of this research was to study how Linnaeus University is using their corporate identity in their communication against students and employers. After analyzing the results of our empirical study and reflecting on the theoretical framework we concluded that Linnaeus University places great emphasis in their identity, that it is of great importance to them and that they have put a lot of effort in their corporate identity and how they mediate it in their communication. They have a clear picture of they see the university and how they want to communicate the identity, the basis for this is clarity and a strong internal communication strategy. In accordance with the theoretical framework Linnaeus University has a good corporate identity management and the university is so far a success.We believe that there is further research that should be carried out in the field of corporate identity and image in the world of academics. More qualitative as well as quantitative empirical research would be interesting, especially to use a comparative research design investigating both several universities and potential students.
26

Identity Management Strategies of Resident Assistants

Edwards, Rachel 01 August 2010 (has links)
The resident assistant (RA) position at higher education institutions is a position of great influence. RAs have the opportunity to impact many students’ lives through the various roles that they engage in as a RA. The most common roles that RAs are expected to perform include developing community, serving as a peer helper, being a friend to residents, and enforcing policy. The very nature of a multi-role position presents challenges for RAs in understanding how to effectively enact all of their roles. This study aimed at developing an understanding of the ways in which RAs engage in identity management strategies with residents. To accomplish this purpose, 143 RAs were surveyed using an identity management strategies scale designed for this study. In addition, a previously designed self-monitoring scale was also administered to test the relationship between identity management strategies and self-monitoring. These scales were applied to situations representing each of the four primary roles of a RA: community developer, peer helper, friend, and policy enforcer. The results indicate that RAs are more likely to engage in avoidance strategies during the policy enforcer role than any other strategy. In addition, first-year RAs generally use more effective identity management strategies when developing community than returner RAs use. First-year RAs’ identity management strategies also appear to be more influenced by the RAs’ desires to be friends with residents than returner RAs’ identity management strategies. The results also indicate that female RAs are more effective in the community development role than male RAs. However, male RAs are more effective than female RAs in the policy enforcement role. A result that was supported throughout the study was the finding that RAs with upperclassmen residents are not as actively engaged in communicating their roles to residents than are RAs with freshmen and upperclassmen residents or only freshmen residents. Finally, the relationship of perceived self-monitoring to RAs’ choice of identity management strategies was not supported. The results of the study, interpretation of the data analysis, study implications, and directions for future research are discussed in detail.
27

Netz- und Service-Infrastrukturen

Hübner, Uwe 21 May 2004 (has links)
Workshop "Netz- und Service-Infrastrukturen" vom 19.-22. April 2004 in Löbsal (bei Meißen)
28

The Design and Applications of a Privacy-Preserving Identity and Trust-Management System

Hussain, Mohammed 08 April 2010 (has links)
Identities are present in the interactions between individuals and organizations. Online shopping requires credit card information, while e-government services require social security or passport numbers. The involvement of identities, however, makes them susceptible to theft and misuse. The most prominent approach for maintaining the privacy of individuals is the enforcement of privacy policies that regulate the flow and use of identity information. This approach suffers two drawbacks that severely limit its effectiveness. First, recent research in data-mining facilitates the fusion of partial identities into complete identities. That holds true even if the attributes examined are not, normally considered, to be identifying. Second, policies are prone to human error, allowing for identity information to be released accidentally. This thesis presents a system that enables an individual to interact with organizations, without allowing these organizations to link the interactions of that individual together. The system does not release individuals' identities to organizations. Instead, certified artificial identities are used to guarantee that individuals possess the required attributes to successfully participate in the interactions. The system limits the fusion of partial identities and minimizes the effects of human error. The concept of using certified artificial identities has been extensively researched. The system, however, tackles several unaddressed scenarios. The system works not only for interactions that involve an individual and an organization, but also for interactions that involve a set of individuals connected by structured relations. The individuals should prove the existence of relations among them to organizations, yet organizations cannot profile the actions of these individuals. Further, the system allows organizations to be anonymous, while proving their attributes to individuals. Reputation-based trust is incorporated to help individuals make informed decisions whether to deal with a particular organization. The system is used to design applications in e-commerce, access control, reputation management, and cloud computing. The thesis describes the applications in detail. / Thesis (Ph.D, Computing) -- Queen's University, 2010-04-07 11:17:37.68
29

Turning the wheels of change : the top management contribution to the process of strategy formation /

Sminia, Harry, January 1900 (has links)
Thesis (doctoral)--Rijksuniversiteit Groningen, 1994. / Includes bibliographical references (p. 171-183).
30

Dois pesos, duas medidas : gerenciamento de identidades orientado a desafios adaptativos para contenção de Sybils. / TwoWeights and two measures: using adaptive puzzles in identity management for sybil contention

Mauch, Gustavo Huff January 2010 (has links)
O ataque Sybil consiste na criação indiscriminada de identidades forjadas por um usuário malicioso (atacante). Uma abordagem promissora para mitigar esse ataque consiste em conceder novas identidades mediante a resolução de desafios computacionais. Apesar de suas potencialidades, as soluções baseadas em tal abordagem não distinguem solicitações de usuários corretos das de atacantes, fazendo com que ambos paguem o mesmo preço por identidade solicitada. Por conta disso, essas soluções podem não ser efetivas quando os recursos computacionais dos atacantes são muito superiores aos que os usuários legítimos dispõem. Assumindo desafios de uma determinada dificuldade, atacantes com hardware de maior capacidade conseguiriam resolver um conjunto muito superior de desafios e, com isso, obter um número elevado de identidades. Aumentar uniformemente a dificuldade dos desafios poderia, no outro extremo, tornar proibitivo o ingresso de pares a rede. Para lidar com esse problema, nesta dissertação propi5e-se o use de desafios adaptativos como limitante a disseminação de Sybils. Estima-se um grau de confiança da fonte de onde partem as solicitações de identidade em relação as demais. Quanto maior a frequência de solicitação de identidades, menor o grau de confiança e, consequentemente, maior a complexidade do desafio a ser resolvido pelo(s) usuário(s) associado(s) Aquela fonte. Resultados obtidos por meio de experimentação mostram a capacidade da solução de atribuir desafios mais complexos a potenciais atacantes, penalizando minimamente usuários legítimos. / The Sybil attack consists on the indiscriminate creation of counterfeit identities by a malicious user (attacker). An effective approach to tackle such attack consists of establishing computational puzzles to be solved prior to granting new identities. Despite its potentialities, solutions based on such approach do not distinguish between identity requests from correct users and attackers, and thus require both to afford the same cost per identity requested. Therefore, those approaches may not be effective when the attacker's computational resources are superior than those used by correct users. Assuming any choice of puzzle hardness, attackers that have access to high-performance computing resources will be able to solve puzzles several order of magnitude faster than legitimate users and thus obtain a large amount of identities. On the other way, raising the cost to solve the puzzles could restrict legitimate users too much. To tackle this problem, in this paper we propose the use of adaptive computational puzzles to limit the spread of Sybils. We estimate a trust score of the source of identity requests in regard to the behavior of others. The higher the frequency a source requests identities, the lower its trust score and, consequently, the higher the complexity of the puzzle to be solved by the user(s) associated to that source. Results achieved by means of an experimental evaluation evidence our solution's ability to establish more complex puzzles to potential attackers, while minimally penalizing legitimate users.

Page generated in 0.0929 seconds