• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 152
  • 46
  • 21
  • 13
  • 12
  • 11
  • 7
  • 6
  • 6
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • Tagged with
  • 350
  • 29
  • 25
  • 23
  • 21
  • 21
  • 21
  • 21
  • 20
  • 19
  • 19
  • 19
  • 18
  • 18
  • 16
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
211

Tinkering with Taste: NBC's Prime Time Television Programming 1978-1986

Hunt, Randall M. 12 1900 (has links)
The thesis explores how Grant Tinker's philosophy of quality programming grew into a working ideology which would serve as the basis for its rise from last place to first place in ratings and profits from 1978 to 1986. This thesis paper explores the prime time history of NBC from 1978 to 1986. The network is examined in terms of its programming history, its economic situation, and the men who presided over the entity, all within the time frame listed above. The thesis focuses on the strategies and philosophies of the three men crucial to the direction the network took during the above time frame: Fred Silverman, President of the network from 1978 to 1981, Grant Tinker, Chairman from 1981 to 1986, and Brandon Tartikoff, Programming Chief from 1980 to 1991.
212

Easy Encryption for Email, Photo, and Other Cloud Services

Koh, John Seunghyun January 2021 (has links)
Modern users carry mobile devices with them at nearly all times, and this likely has contributed to the rapid growth of private user data—such as emails, photos, and more—stored online in the cloud. Unfortunately, the security of many cloud services for user data is lacking, and the vast amount of user data stored in the cloud is an attractive target for adversaries. Even a single compromise of a user’s account yields all its data to attackers. A breach of an unencrypted email account gives the attacker full access to years, even decades, of emails. Ideally, users would encrypt their data to prevent this. However, encrypting data at rest has long been considered too difficult for users, even technical ones, mainly due to the confusing nature of managing cryptographic keys. My thesis is that strong security can be made easy to use through client-side encryption using self-generated per-device cryptographic keys, such that user data in cloud services is well protected, encryption is transparent and largely unnoticeable to users even on multiple devices, and encryption can be used with existing services without any server-side modifications. This dissertation introduces a new paradigm for usable cryptographic key management, Per-Device Keys (PDK), and explores how self-generated keys unique to every device can enable new client-side encryption schemes that are compatible with existing online services yet are transparent to users. PDK’s design based on self-generated keys allows them to stay on each device and never leave them. Management of these self-generated keys can be shown to users as a device management abstraction which looks like pairing devices with each other, and not any form of cryptographic key management. I design, implement, and evaluate three client-side encryption schemes supported by PDK, with a focus on designing around usability to bring transparent encryption to users. First, I introduce Easy Email Encryption (E3), a secure email solution that is easy to use. Usersstruggle with using end-to-end encrypted email, such as PGP and S/MIME, because it requires users to understand cryptographic key exchanges to send encrypted emails. E3 eliminates this key exchange by focusing on storing encrypting emails instead of sending them. E3 transparently encrypts emails on receipt, ensuring that all emails received before a compromise are protected from attack, and relies on widely-used TLS connections to protect in-flight emails. Emails are encrypted using self-generated keys, which are completely hidden from the user and do not need to be exchanged with other users, alleviating the burden of users having to know how to use and manage them. E3 encrypts on the client, making it easy to deploy because it requires no server or protocol changes and is compatible with any existing email service. Experimental results show that E3 is compatible with existing IMAP email services, including Gmail and Yahoo!, and has good performance for common email operations. Results of a user study show that E3 provides much stronger security guarantees than current practice yet is much easier to use than end-to-end encrypted email such as PGP. Second, I introduce Easy Secure Photos (ESP), an easy-to-use system that enables photos tobe encrypted and stored using existing cloud photo services. Users cannot store encrypted photos in services like Google Photos because these services only allow users to upload valid images such as JPEG images, but typical encryption methods do not retain image file formats for the encrypted versions and are not compatible with image processing such as image compression. ESP introduces a new image encryption technique that outputs valid encrypted JPEG files which are accepted by cloud photo services, and are robust against compression. The photos are encrypted using self-generated keys before being uploaded to cloud photo services, and are decrypted when downloaded to users’ devices. Similar to E3, ESP hides all the details of encryption/decryption and key management from the user. Since all crypto operations happen in the user’s photo app, ESP requires no changes to existing cloud photo services, making it easy to deploy. Experimental results and user studies show that ESP encryption is robust against attack techniques, exhibits acceptable performance overheads, and is simple for users to set up and use. Third, I introduce Easy Device-based Passwords (EDP), a password manager with improvedsecurity guarantees over existing ones while maintaining their familiar usage models. To encrypt and decrypt user passwords, existing password managers rely on weak, human-generated master passwords which are easy to use but easily broken. EDP introduces a new approach using self-generated keys to encrypt passwords, and an easy-to-use pairing mechanism to allow users to access passwords across multiple devices. Keys are not exposed to users and users do not need to know anything about key management. EDP is the first password manager that secures passwords even with untrusted servers, protecting against server break-ins and password database leaks. Experimental results and a user study show that EDP ensures password security with untrusted servers and infrastructure, has comparable performance to existing password managers, and is considered usable by users.
213

Sustainable apparel marketing and consumption : An analysis of Patagonia’s Worn Wear video marketing campaign

Syniuk, Artem January 2021 (has links)
Background: The modern world struggles with an environmental crisis and many industry sectors could be considered as non-sustainable. The fashion industry is poorly performing both in ecological and social sustainability due to mass production and apparel waste caused by fast changing fashion. To reduce the negative impact on the ecological and social environment the United Nations developed the Sustainable Development Goals focussing on the economic, social, and ecological sustainability. The apparel industry influenced by the international organisations and the customers sustainability demands is forced to adjust its business strategy towards ecological and socially sustainable business and production. Purpose: The purpose of this study is to understand how the brand Patagonia, a company in the fashion industry, communicates its core values and meanings in its marketing campaign focussed on sustainable production and consumption. By analysing Patagonia`s video series of the Worn Wear marketing campaign, the underlying core values and meaning building the companies brand image on topic of sustainability could be interpreted. Method: This thesis is conducted by applying interpretive thematic analysis and visual analysis by applying the study of semiotics and documentary video analysis. The employed theories allow the researcher to discover meaning and values through conducting a visual analysis. Conclusion: The results show that Patagonia Inc., communicates a total of four major and ten secondary themes on topics of both ecological and social sustainability in the Worn Wear campaign. The themes are representing the importance of slow fashion by repairing the gear and sustainable consumption. The reciprocity between adventures and sustainable environment is being mentioned, and the social and ecological factors are expounded.
214

Trafficking of Chlamydial Antigens to the Endoplasmic Reticulum of Infected Epithelial Cells

Giles, David, Wyrick, Priscilla B. 01 November 2008 (has links)
Confinement of the obligate intracellular bacterium Chlamydia trachomatis to a membrane-bound vacuole, termed an inclusion, within infected epithelial cells neither prevents secretion of chlamydial antigens into the host cytosol nor protects chlamydiae from innate immune detection. However, the details leading to chlamydial antigen presentation are not clear. By immunoelectron microscopy of infected endometrial epithelial cells and in isolated cell secretory compartments, chlamydial major outer membrane protein (MOMP), lipopolysaccharide (LPS) and the inclusion membrane protein A (IncA) were localized to the endoplasmic reticulum (ER) and co-localized with multiple ER markers, but not with markers of the endosomes, lysosomes, Golgi nor mitochondria. Chlamydial LPS was also co-localized with CD1d in the ER. Since the chlamydial antigens, contained in everted inclusion membrane vesicles, were found within the host cell ER, these data raise additional implications for antigen processing by infected uterine epithelial cells for classical and non-classical T cell antigen presentation.
215

Ultrastructural Analysis of Chlamydial Antigen-Containing Vesicles Everting From the Chlamydia Trachomatis Inclusion

Giles, David, Whittimore, Judy D., LaRue, Richard W., Raulston, Jane E., Wyrick, Priscilla B. 01 May 2006 (has links)
Several chlamydial antigens have been detected in the infected epithelial cell cytosol and on the host cell surface prior to their presumed natural release at the end of the 72-96 h developmental cycle. These extra-inclusion antigens are proposed to influence vital host cell functions, antigen trafficking and presentation and, ultimately, contribute to a prolonged inflammatory response. To begin to dissect the mechanisms for escape of these antigens from the chlamydial inclusion, which are enhanced on exposure to antibiotics, polarized endometrial epithelial cells (HEC-1B) were infected with Chlamydia trachomatis serovar E for 36 h or 48 h. Infected cells were then exposed to chemotactic human polymorphonuclear neutrophils not loaded or pre-loaded in vitro with the antibiotic azithromycin. Viewed by electron microscopy, the azithromycin-mediated killing of chlamydiae involved an increase in chlamydial outer membrane blebbing followed by the appearance of the blebs in larger vesicles (i) everting from but still associated with the inclusion as well as (ii) external to the inclusion. Evidence that the vesicles originated from the chlamydial inclusion membrane was shown by immuno-localization of inclusion membrane proteins A, F, and G on the vesicular membranes. Chlamydial heat shock protein 60 (chsp60) copies 2 and 3, but not copy 1, were released from RB and incorporated into the everted inclusion membrane vesicles and delivered to the infected cell surface. These data represent direct evidence for one mechanism of early antigen delivery, albeit membrane-bound, beyond the confines of the chlamydial inclusion.
216

Interaktiva mobilspel i klassrummet : Indikatorer på matematiska förmågor vid elevers användande av ett interaktivt mobilspel / Interactive Mobile Games in the Classroom : Indicators for Mathematical Abilities in Students’ Usage of an Interactive Mobile Game

Johansson, Peter, Öyan, Frans January 2020 (has links)
Detta produktionsarbete har undersökt spelet Plague Inc som ett verktyg i matematikklassrummet samt elevers attityd till digitala spel i undervisningen. Undersökningen har gjorts i en klass med 12 elever på gymnasiet, där de med hjälp av instruktioner och konstruerade uppgifter spelade spelet på sina telefoner och löste givna uppgifter under spelets gång. Två fokusgrupper valdes ut, som observerades och videoinspelades. Undersökningen omfattade även en skriftlig enkät om attityder och tankar kring spel i matematikundervisningen. Enkätsvaren visar att majoriteten av eleverna ställer sig positiva till spel i undervisningen och att de blir mer motiverade när undervisningen därigenom varieras. Elevaktiviteterna under spelets gång registrerades för att därigenom försöka synliggöra de förmågor som Skolverket har som mål för i matematikundervisningen. / This thesis studies the game Plague Inc as a tool in the mathematics classroom, including students´ attitudes towards digital games in the teaching of mathematics. The survey was made in a class consisting of 12 students in upper secondary school, where they with help from instructions and constructed tasks, played the game on their phones and solved written assignments. Two focus groups were chosen, observed and video-recorded. A poll was also conducted on the students´ attitudes and thoughts toward games in the mathematics practice. The result from the poll showed that most of the students had a positive attitude towards games in class and that they were more motivated when the teaching was varied. A registration of the students´ activities, when playing the game, was also made to try to detect the abilities that Skolverket lists as goals for the teaching of mathematics.
217

Selected attitudes and perceptions of adolescents at the Hood River, Oregon, attention home

Czerwinski, Marilyn, Olson, Linda 01 January 1973 (has links)
The aim of this study is to report selected perceptions and attitudes of adolescents placed in the “attention home” at Hood River, Oregon, as an early aid towards improved understanding and treatment, and program assessment.
218

A Descriptive Study of Oregon Literacy Tutors in Multnomah County

Schwiebert, Marva, Whittle, Kathleen 01 January 1976 (has links)
Oregon Literacy, Inc., requested a study of the volunteer tutors in Multnomah County. This study is primarily based on responses to questionnaires sent to all volunteer tutors on the active list with the program in Multnomah County, including all persons who were certified in the training workshops held in 1975. Results of the questionnaire are examined, and the thesis offers a descriptive analysis of Oregon Literacy Tutors in Multnomah County, Oregon.
219

The Porcupine's Quill and the Gaspereau Press : studies in the history, philosophy, and production values of two English-Canadian printer-publishers

Murphy, Tara Kathleen. January 2008 (has links)
No description available.
220

Hashavat Avedah : a history of Jewish Cultural Reconstruction, Inc.

Herman, Dana January 2008 (has links)
No description available.

Page generated in 0.0506 seconds