• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 120
  • 11
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 164
  • 164
  • 52
  • 34
  • 33
  • 25
  • 23
  • 22
  • 20
  • 19
  • 19
  • 17
  • 17
  • 16
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Information networks within information networks

Gwala, Tholakele Celinhlanhla January 2002 (has links)
A thesis submitted in fulfilment of the requirements for the degree of MA (cum laude) in Communication Science University of Zululand, 2002. / In this thesis I characterise South African Infomercials as forms of persuasive mass media messages. After outlining the general nature of persuasive communication, and the rela¬tionship between persuasion and propaganda, I explain which communication codes adver¬tisers use to promote their products, particularly which codes Infomercial advertisers use. After characterising a range of South African TV Infomercials I give a detailed analysis of the pioneering serial radio and TV Infomercials used by the company SA Natural Products (SANP) in their extremely successful campaign over the past two years to make the natural health food supplement Spirulina by Marcus Rohrer® the best known and most used nutri¬tional supplement in South Africa today. 1 in particular look at the forms of communica¬tion used by managers at SANP to create information networks within their organisational network to sustain the popularity of the product in the public mind, and to keep it supplied to pharmacies, health food shops and chain stores that sell it.
72

Moral Panic and Political Rhetoric in the Early American Republic

Whitley, Daniel Edward 19 June 2018 (has links)
This study analyzes the reporting and editorializing in several major American newspapers during the height of the Citizen Genêt Affair in July and August, 1793. A hybrid form of sociological moral panic theory, focused predominantly on the "iteration" of moral panics and the language used to communicate them, is used to understand the dynamics of the information landscape of 1793. Specific attention is paid to the effects of time and space, personal and political bias, and incendiary historical rhetoric on reporting of and reactions to Genêt's actions. In doing so, this study highlights possible flaws or blind spots in both moral panic theory and historiography, and brings new understanding to the media environment in which America's political traditions gestated. Brief connections are drawn between this historical information landscape and series of events and contemporary concerns with regards to social media and incendiary political rhetoric. / Master of Arts
73

Um modelo de sistema de gestão da segurança da informação baseado nas normas ABNT NBR ISO/IEC 27001:2006, 27002:2005 e 27005:2008 / A model of information security management system based in the NBR ISO/IEC 27001:2006, 27002:2005 e 27005:2008 ABNT standards

Santos, Valdeci Otacilio dos 21 August 2018 (has links)
Orientador: Renato Baldini Filho / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação / Made available in DSpace on 2018-08-21T18:11:43Z (GMT). No. of bitstreams: 1 Santos_ValdeciOtaciliodos_M.pdf: 1681366 bytes, checksum: 4ed0e181fcbc30a368afc34e5d374cec (MD5) Previous issue date: 2012 / Resumo: O crescimento constante de ameaças e vulnerabilidades nos sistemas de informação faz com que a preocupação por parte dos administradores sobre a segurança desses sistemas também seja intensificada. Na busca de um nível adequado de segurança da informação, estão sendo criadas e aperfeiçoadas, não somente no Brasil, mas em escala mundial, legislações e normatizações que tratam sobre esse tema tão importante nos dias atuais. Este trabalho tem como objetivo propor um modelo de sistema de gestão da segurança da informação, com modelagem de processos e descrição das atividades, que contemple as principais diretrizes preconizadas nas normas ABNT NBR ISO/IEC 27001:2006, 27002:2005 e 27005:2008. O modelo proposto visa guiar a implementação de um novo sistema de gestão da segurança da informação em uma organização ou verificar a conformidade de um sistema já existente. O trabalho compreende uma aplicação prática do modelo proposto, em que foi executado um levantamento do nível de aderência das atividades desenvolvidas nos diversos processos que compõem um sistema de gestão da segurança da informação de uma organização, com o que está previsto no modelo e, consequentemente, nas normas utilizadas como referência. Na avaliação dos resultados da verificação realizada foi possível obter uma visão geral da situação em que se encontra a gestão da segurança da informação da organização, bem como a verificação dos pontos que estão de acordo com a normatização e daqueles que necessitam aprimoramentos / Abstract: The steady growth of threats and vulnerabilities in the information systems causes an intensified concern among administrators about the security of these systems. In search of an appropriate level of information security are being created and improved, not only in Brazil but worldwide, laws and regulations that deal with this important issue. This work aims to propose a model of information security management system with process modeling and description of activities, covering the main guidelines recommended in the standards ABNT NBR ISO/IEC 27001:2006, 27002:2005 e 27005:2008. The proposed model aims to guide the implementation of a new system for managing information security in an organization or verify the conformity of an existing system. The work includes a practical application of the proposed model, that was carried out a survey on the level of activities adhesion in the various processes that comprise a information security management system within an organization, what is envisaged in the model and consequently, the standards used as reference. In assessing the results of the verification carried out was possible to obtain an overview of the situation in which the information security management system of the organization is, as well as the verification of the points that are in accordance with norms and those that need improvement / Mestrado / Telecomunicações e Telemática / Mestre em Engenharia Elétrica
74

Relation of Personal Characteristics to Type of Position Among Bibliographic Network Coordinators, Ex-coordinators, and Selected Library Depeartment Heads

Upham, Lois Nicholson 08 1900 (has links)
The objectives of this investigation were two-fold. The first was to determine the personal characteristics of Bibliographic Network Coordinators, both past and present; the second was to compare these identified characteristics with those of persons working in traditional library positions at comparable levels of responsibility.
75

Criptografia quântica em redes de informação crítica - aplicação a telecomunicações aeronáuticas. / Quantum cryptography in critical information networks - application to aeronautical telecommunications.

Costa, Carlos Henrique Andrade 17 June 2008 (has links)
Ocorre atualmente um movimento de aumento da importância que a manutenção da segurança da informação vem adquirindo em redes de informação de crítica. Ao longo das últimas décadas a utilização de ferramentas criptográficas, especialmente aquelas baseadas em problemas de díficil solução computacional, foram suficientes para garantir a segurança dos sistemas de comunicação. Contudo, o desenvolvimento da nova técnica de processamento de informação conhecida como computação quântica e os resultados téoricos e experimentais apresentados por esta mostram que é possível inviabilizar alguns dos sistemas de criptografia atuais amplamente utilizados. A existência de tal vulnerabilidade representa um fator crítico em redes em que falhas de segurança da informação podem estar associadas a riscos de segurança física. Uma alternativa para os métodos criptográficos atuais consiste na utilização de sistemas quânticos na obtenção de um método criptográfico, o que se conhece como criptografia quântica. Este novo paradigma tem seu fundamento resistente mesmo na presença de capacidade tecnológica ilimitada, incluindo o cenário com disponibilidade de computação quântica. Este trabalho tem como objetivo levantar os impactos que o desenvolvimento da computação quântica têm sobre a segurança dos atuais sistemas criptográficos, apresentar e desenvolver alternativas de protocolos de criptografia quântica disponíveis, e realizar um estudo de caso por meio da avaliação da utilização de criptografia quântica no contexto da Aeronautical Telecommunication Network (ATN). Isto é feito por meio do desenvolvimento de um ambiente de simulacão que permite avaliar o comportamento de um protocolo de criptografia quântica em um cenário em um ambiente com requisitos de missão crítica, como é o caso da ATN. / The importance of security maintenance in critical information networks has been rising in recent times. Over the past decades, the utilization of cryptography tools, mainly those based on computationally intractable problems, was enough to ensure the security of communications systems. The development of the new information processing technique known as quantum computation and the theoretical and experimental results showed by this approach demonstrated that could be possible to cripple the current widely used cryptography techniques. This vulnerability represents a critical issue for networks where a security fault could be associated to a safety fault. An alternative for the current cryptography methods consists in the utilization of quantum systems to obtain a new cryptographic method. The new paradigm presented by this approach has solid principles even in the presence of unlimited computational capacity, including the scenario with availability of quantum computation. The aim of this work is the assessment of impacts that the development of quantum computation has over the current cryptographic methods security, the presentation and development of alternatives based on quantum cryptography protocols, and the development of a case study using the case of Aeronautical Telecommunication Network (ATN). This aim is reached by means of the development of a simulation environment that allows the evaluation of a quantum cryptography protocol behavior in an environment with mission critical requirements, like the ATN case.
76

The Perceived Impact of Technology-Based Informal Learning on Membership Organizations

Unknown Date (has links)
Educational leadership goes beyond the boundaries of the classroom; skills needed for talent development professionals in business closely align with those needed in traditional educational leadership positions as both are responsible for the development and growth of others. Traditionally, the role of professional membership associations or organizations such as the Association for Talent Development (ATD, formerly known as the American Society for Training and Development), the group dedicated to individuals in the field of workplace learning and development, is to provide learning opportunities, set standards, identify best practices in their respective fields, and allow members to network with other professionals who share their interests. However, with the rampant increase in the use of technology and social networking, individuals are now able to access a vast majority of information for free online via tools such as LinkedIn, Facebook, Google, and YouTube. Where has this left organizations that typically charged for access to this type of information in the past? Surveys and interviews were conducted with ATD members in this mixed-methods study to answer the following research questions: 1. What are the perceptions of Association for Talent Development (ATD) members regarding the effect of technology-based informal learning on the role of ATD? 2. How do ATD members utilize technology for informal learning? 3. Are there factors such as gender, age, ethnicity, educational level, or length of time in the field that predict a member's likelihood to utilize technology for informal learning? 4. Are there certain ATD competency areas for which informal learning is preferred over non-formal or formal learning? The significance of the study includes the identification of how the Association for Talent Development (ATD, formerly ASTD) can continue to support professionals in our constantly evolving te chnological society as well as advancing the field by contributing research connecting informal learning with technology to membership organization roles. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2015. / FAU Electronic Theses and Dissertations Collection
77

Behind the Bylines: Fixing World News in Turkey

Arjomand, Noah Amir January 2018 (has links)
A chain of actors brokers the flow of information through news organizations and transforms local realities into international journalism. “Fixers” are a crucial intermediary link between foreign reporters and local sources, translating, arranging logistics and interviews, and otherwise assisting reporters in gaining access and interpreting events. Fixers’ social networks and management of exchange between reporters and sources, this study argues, significantly shape the news. Brokers’ moral worlds, constituted by both norms of behavior toward brokers and norms that shape the behaviors of brokers themselves, are the focus of particular attention. How do news organizations, client journalists, and local news sources and power holders treat fixers? How do fixers navigate the uneven moral terrain created by conflicting expectations toward them? And how do their strategies for managing clients and sources shape the production of knowledge? This study, based on ethnographic research conducted in Turkey between 2014 and 2016, explains fixers’ mediations and their effects on the news. Empirical chapters provide composite narratives of fixers to illustrate both variation in mediating practices and typical career trajectories, followed by theoretical discussions. The production of international news, I argue, cannot be properly understood without reference to the national and local politics and media worlds that affect who becomes a fixer and what they use fixing to accomplish. Based on these contexts, some see fixing as an opportunity to gain recognition, as an apprenticeship toward a career in global journalism, or as a way to expand their social world; others see fixing as a way to remain anonymous while utilizing journalistic expertise they have developed, as a relatively safe form of activism in non-democratic political systems, or a step toward claiming refugee status. Patterns in who becomes a fixer and why affect the selection of “newsworthy” sources and events, the way local realities are transformed into information fed to client reporters, and the organizational structure of the foreign press corps. Fixers have difficulty, and are socialized to avoid, challenging overarching and preexisting meta-narratives, or frames, that foreign news organizations apply to Turkey and Syria. Nonetheless, they make use of “wiggle room” afforded them through the process of abstraction of local complexities into overarching narrative frames to shape international news in ways that are significant at the local level. This study offers insights not only into the production of international knowledge about Turkey and Syria, but also into the process of brokerage, a universal phenomenon in all contexts involving coordination of action and sharing of knowledge across social difference.
78

Network coding for security and error correction. / CUHK electronic theses & dissertations collection

January 2008 (has links)
In this work, we consider the possibility and the effectiveness of implementing secure network coding and error-correcting network coding at the same time. Upon achieving this goal, information can be multicast securely to the sink nodes through a noisy network. Toward this end, we propose constructions of such codes and prove their optimality. After that, we extend the idea of generalized Hamming Weight [54] for the classical point-to-point communication channel to linear network coding. We also extend the idea of generalized Singleton bound to linear network coding. We further show that the generalized Hamming weight can completely characterize the security performance of linear code at the source node on a given linear network code. We then introduce the idea of Network Maximum Distance Separable code (NMDS code), which can be shown to play an important role in minimizing the information that an eavesdropper can obtain from the network. The problem of obtaining the optimal security performance is in fact equivalent to the problem of obtaining a Network Maximum Distance Separable code. / Network coding is one of the most important breakthroughs in information theory in recent years. The theory gives rise to a new concept regarding the role of nodes in a communication network. Unlike in existing networks where the nodes act as switches, in the paradigm of network coding, every node in the network can act as an encoder for the incoming information. With this new infrastructure, it is possible to utilize the full capacity of the network where it is impossible to do so without network coding. In the seminar paper by Ahlswede et al. [1] where network coding was introduced, the achievability of the maxflow bound for every single source multicast network by using network coding was also proved. By further exploring the possibility of linear network coding, Cai and Yeung introduced the idea of error-correcting network coding and secure network coding in [7] and [8] respectively. These papers launched another two important research areas in the field of network coding. / Ngai, Chi Kin. / Adviser: Yqung Wai Ho. / Source: Dissertation Abstracts International, Volume: 70-06, Section: B, page: 3696. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 122-128). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts in English and Chinese. / School code: 1307.
79

Random Walk Models, Preferential Attachment, and Sequential Monte Carlo Methods for Analysis of Network Data

Bloem-Reddy, Benjamin Michael January 2017 (has links)
Networks arise in nearly every branch of science, from biology and physics to sociology and economics. A signature of many network datasets is strong local dependence, which gives rise to phenomena such as sparsity, power law degree distributions, clustering, and structural heterogeneity. Statistical models of networks require a careful balance of flexibility to faithfully capture that dependence, and simplicity, to make analysis and inference tractable. In this dissertation, we introduce a class of models that insert one network edge at a time via a random walk, permitting the location of new edges to depend explicitly on the structure of the existing network, while remaining probabilistically and computationally tractable. Connections to graph kernels are made through the probability generating function of the random walk length distribution. The limiting degree distribution is shown to exhibit power law behavior, and the properties of the limiting degree sequence are studied analytically with martingale methods. In the second part of the dissertation, we develop a class of particle Markov chain Monte Carlo algorithms to perform inference for a large class of sequential random graph models, even when the observation consists only of a single graph. Using these methods, we derive a particle Gibbs sampler for random walk models. Fit to synthetic data, the sampler accurately recovers the model parameters; fit to real data, the model offers insight into the typical length scale of dependence in the network, and provides a new measure of vertex centrality. The arrival times of new vertices are the key to obtaining results for both theory and inference. In the third part, we undertake a careful study of the relationship between the arrival times, sparsity, and heavy tailed degree distributions in preferential attachment-type models of partitions and graphs. A number of constructive representations of the limiting degrees are obtained, and connections are made to exchangeable Gibbs partitions as well as to recent results on the limiting degrees of preferential attachment graphs.
80

Job Information Networks and Game Theory / Informační sítě na trhu práce a teorie her

Benešová, Anita January 2010 (has links)
The use of personal contacts and the role of education as a signal of the Worker's productivity are two important aspects of the job search process. The aim of this thesis is to develop a model that combines both approaches. We distinguish between random and strategic models of job information networks. In the former case the structure of the network is given, while in the latter it depends on the strategic decision of the Workers. We present a strategic model of network formation with two types of Workers who are able to signal their productivity by the level of their education. When applying for a job they have two possibilities of contacting the Employer: a direct application and an indirect application through a friend who currently works for the Employer.

Page generated in 0.0901 seconds