• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 648
  • 231
  • 120
  • 106
  • 83
  • 37
  • 33
  • 20
  • 20
  • 18
  • 15
  • 14
  • 13
  • 10
  • 7
  • Tagged with
  • 1586
  • 346
  • 233
  • 227
  • 206
  • 189
  • 145
  • 143
  • 143
  • 131
  • 131
  • 127
  • 126
  • 103
  • 98
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
531

Expérimentation d'un modèle d'évaluation permettant de juger du développement d'une compétence d'investigation scientifique en laboratoire

Dionne, Éric January 2008 (has links)
Thèse numérisée par la Division de la gestion de documents et des archives de l'Université de Montréal
532

Les apports de l'expérimentation assistée par ordinateur (ExAO) en pédagogie par projet en sciences de la nature au collégial

Marcotte, Alice January 2004 (has links)
Thèse diffusée initialement dans le cadre d'un projet pilote des Presses de l'Université de Montréal/Centre d'édition numérique UdeM (1997-2008) avec l'autorisation de l'auteur.
533

What is the impact of the Cyber Crime Act on the business community in Mauritius.

Jamalkhan, Nasserkhan. January 2004 (has links)
At this early age of the internet, the e-business environment is almost like a lawless territory. Fast movers are making fortunes whereas rebels can act with impunity and move on before the legal process can catch up. The fast expansion of cyber crimes in the world has been the motivation to perform this research on its impact on the business community in Mauritius after the devastating effects in developing countries. Organisations that are not keeping pace with these realities are becoming vulnerable to cyber criminals or hackers. An analysis of the situation in the world from the literature review has provided a better understanding of the most common crimes that are causing trouble to the businesses and obstacles to the advancement of e-commerce. Compared to earlier technological changes, the internet has shown a rapid proliferation. Organisations have to be ready to face this challenge or they may face the dangers of being attacked or even prosecuted for not having secured their system properly. While securing the internet remains a major challenge for every country, businesses have to cope with limited protection until an international law become in force to control this wild territory. The reports available on the Crime trend show that there has been a steady increase in Computer related crimes in the world. The research is conducted on a sample of IT literate participants. Interviews and focus group discussion have also contributed in the accuracy of the findings. The results and findings demonstrate that there is room for improvement but there is a lack of awareness on the Cyber crime act. Hopefully, this research will help to shed light on the major concerns of the business community. VI / Thesis (MBA)-University of KwaZulu-Natal, Durban, 2004.
534

Specialized worker training related to child sexual abuse custodyaccess investigations

Gentile, Sonia. January 2000 (has links)
In this paper the researcher discusses the importance of specialized training for workers in child welfare who are responding to allegations of child sexual abuse in the context of custody/access disputes. The researcher has implemented an experimental design involving two matched groups of staff, equally sized, from an Ontario child welfare agency. Participants were requested to complete a pre-test and post-test which measured the priority assigned to a set of fictitious scenarios developed for the project. A training session was offered to the experimental group prior to the post-test. / The outcome data suggests that the training affected the coding which members of the experimental group applied to scenarios. The experimental group tended to consider dynamics related to the issue of custody/access when assessing the priority of response time given to a referral. The control group evidenced no consideration of such dynamics. / The researcher has included a number of recommendations within the analysis section so that future applications of similar studies may be improved. The conclusion of this study clearly states that adequate worker training is essential in order that objective, reliable, and competent service is available to child welfare clients.
535

Utredning beträffande förutsättningar för sammankoppling över elnätsföretag / Investigation of conditions for interconnection of electrical grids across network companies

Gull Karlsson, Marcus January 2015 (has links)
Det här examensarbetet har utförts på uppdrag åt Trollhättan Energi AB (TEAB). Examensarbetet är en utredning beträffande förutsättningar för sammankoppling av TEAB:s och Hjärtum Elförenings elnät. De nuvarande ledningsnäten har radialnät och det innebär att det endast har inmatning från ena ledningsänden. En sammankoppling skulle ge möjlighet till sektionerad drift vilket innebär inmatningsmöjligheter från båda ledningsändar. Det gör att ledningsnätet blir mer säkert, tillförlitligt och effektivt. Ett förslag på ett nytt ledningsnät där delar av TEAB:s och Hjärtum Elförenings ledningsnät är sammankopplade har tagits fram. Med det nya förslaget blir ledningsnätet mer driftsäkert och uppfyller lag- och myndighetskrav. Beräkningarna som ligger till grund för arbetet är teoretiskt utförda. Därför bör en fortsatt planering och undersökning inom ämnet utföras innan ledningsnäten sammankopplas. Budgetpriset för ombyggnationen i ledningsnätet har beräknats till cirka 700 000 kronor och investeringen anses nödvändig för att kunna utföra en sammankoppling utav elnäten. / This bachelor´s thesis is conducted on behalf of Trollhättan Energi AB (TEAB). The bachelor´s thesis is an investigation of conditions for interconnection of TEAB and Hjärtum Elförenings electrical grids. The current electrical grids are radial electrical grids and means that it can only be fed from one cable end. An interconnection would allow for sectional operation of the electrical grid. This means input opportunities from both cable ends and that the electrical grid becomes more safely, reliably and efficiently. Suggestion for new electrical grids which parts of TEAB and Hjärtum Elförenings electrical grids are interconnected has been developed. With the new suggestions becomes the electrical grid more reliable and complies with legal and regulatory requirements. The calculations that are underpinning the work is theoretical. Therefore, a continued planning and research in the subject should be performed before the electrical grids are interconnected. Budget price for the reconstruction of the electrical grids have been estimated to be about 700 000 SEK and the investment is considered essential for the interconnection.
536

Forensisk analys av volatilt minne från operativsystemet OS X

Ogeskär, Tobias January 2014 (has links)
Behovet av att analysera volatilt minne från Macintosh-datorer med OS X har blivit allt mer betydelsefull på grund av att deras datorer blivit allt populärare och att volatil minnesanalysering blivit en allt viktigare del i en IT-forensikers arbete. Anledningen till att volatil minnesanalysering blivit allt viktigare är för att det går att finna viktig information som inte finns lagrad permanent på datorns interna hårddisk. Problemet som låg till grunden för det här examensarbetet var att det uppenbart fanns brist på undersökningsmetoder av det volatila minnet för Mac-datorer med OS X.Syftet med detta arbete var därför att undersöka möjligheten att utvinna information från ett volatilt minne från en Mac-dator med OS X genom att kartlägga och bedöma olika undersökningsmetoder. För att göra denna undersökning har litteraturstudier, informella intervjuer, egna kunskaper och praktiska försök genomförts.Slutsatsen blev att möjligheten att utvinna information från det volatila minnet från en Mac-dator med OS X är relativt begränsad. Det största problemet är själva dumpningen av minnet. Många av dumpningsmetoderna som finns att tillgå kräver administrativa rättigheter. Vid analysering av en minnesdump bör man aldrig förlita sig på en analysmetod då olika analysmetoder ger olika resultat som kan vara till nytta för en vidare undersökning av en Mac-dator. / The need to analyze volatile memory on Macintosh computers with OS X has become increasingly important due to the fact that their computers have become more popular and volatile memory analysis has become a more important part of an IT-forensics work. The reason volatile memory analysis has become more important is that it's possible to find information that’s not stored permanently on the computer’s hard drive. The problem that formed the basis for this thesis was that it was obvious there was a lack of methods of investigation of the volatile memory for Macs running OS X.The aim of this work was therefore to investigate the possibility of extracting information from a volatile memory from a Mac computer with OS X by identifying and assessing different methods of investigation. To do this investigation, literature studies, informal interviews, own knowledge and practical attempts have been conducted.It was concluded that the ability to extract information from the volatile memory from a Mac-computer with OS X is relatively limited. The biggest problem is the dumping of the memory. Many of the available dumping methods require administrative rights. When analyzing a memory dump you should never rely on one analyze method since different analyze methods give different results that can be useful for further investigation of a Mac-computer.
537

Om sanningen skall fram : polisförhör med misstänkta för grova brott / If truth be known : police interviews with suspects of serious crime

Kronkvist, Ola January 2013 (has links)
This thesis has explored the context of police interviews with suspects of serious crimes. Focus group studies, a case study and additional interviews have shown several aspects of information flow, decision making, interviewing tactics, human rights and tacit knowledge as these interviews are planned, performed and evaluated. The informants, homicide investigators, describe their work as an information generating and information evaluating process. They apply a series of methods, e. g. different forms of tactics in the use of investigative information during the police interviews. Based on the informants’ description and the case study, their methods seem to have research evidence in general, where such is available. The informants specifically stress the important role of planning and evaluation. The investigative process generates a vast amount of situations where decision making is needed. In these, the bases for the decisions are mainly the information flow of the investigation, which tends to be obscure and in constant change. The investigators’ decision making is thereby exposed to the risk of confirmation bias. The informants express an ambition to work objectively and to presume the suspects’ innocence. However, this generates a psychological conflict, which might affect the human rights of the suspect in negative ways. The informants describe several ways to handle this conflict. The informants describe that they have several concerns when making decisions. These can be categorized as legal, organizational and tactical concerns. Taken together, legal rule conflicts and the organizational ambition to lead the investigators in a target oriented way using quantitative measures, result in strong incitements for investigations to be finalized when they are good enough, rather than when they are good. The informants describe their profession as one where it is possible to develop expertise and where tacit knowledge plays an important role. When previous research on tacit knowledge is combined with the interview results, there seems to be a level between the tacit and the explicit knowledge. I have called this low-key knowledge. This low-key knowledge can be verbalized in the proper context in communication among those initiated in the subject at hand. The low-key knowledge also seems to risk being over-voiced in certain contexts.
538

Same-sex sexual harassment : factors affecting the perceptions of an evaluative third party

Raines, Joshua A. January 2002 (has links)
There is no abstract available for this thesis. / Department of Sociology
539

The implementation of a geo-environmental decision support system for development on dolomite / Pieter Pretorius

Pretorius, Pieter January 2012 (has links)
Due to the inherent hazardous characteristics associated with dolomite and development on dolomite, quantification of the stability attributes related to dolomite is essential. In large parts of South Africa, development on dolomite is inevitable due to the location thereof. The purpose of this study is to define an implementation framework for decision-making with regards to development on dolomite. The decision-making process is based on a dolomite stability investigation conducted by AGES North West (AGES, 2012) within Sarafina, Ikageng. The results from this study are interpreted by means of a decision support system that is based on the geo-environmental setting of the study area and the geotechnical properties related to the subsurface profile. This includes but is not limited to: Geo-environmental site conditions: • Drainage • Topography • Geophysical conditions • Regional geological conditions • Local geological conditions • Regional groundwater conditions • Local groundwater conditions Geotechnical stability of the dolomite based on the hazard characterisation and evaluation procedures: • Percussion drilling data • Receptacle development • Mobilisation agencies • Potential surface manifestation development space • Nature and mobilisation potential of the blanketing layer • The bedrock morphology These parameters are all inter-related and affect each other in various ways. During the study the importance of site specific observations and interpretations are emphasized. / Thesis (MSc (Environmental Sciences))--North-West University, Potchefstroom Campus, 2013
540

The implementation of a geo-environmental decision support system for development on dolomite / Pieter Pretorius

Pretorius, Pieter January 2012 (has links)
Due to the inherent hazardous characteristics associated with dolomite and development on dolomite, quantification of the stability attributes related to dolomite is essential. In large parts of South Africa, development on dolomite is inevitable due to the location thereof. The purpose of this study is to define an implementation framework for decision-making with regards to development on dolomite. The decision-making process is based on a dolomite stability investigation conducted by AGES North West (AGES, 2012) within Sarafina, Ikageng. The results from this study are interpreted by means of a decision support system that is based on the geo-environmental setting of the study area and the geotechnical properties related to the subsurface profile. This includes but is not limited to: Geo-environmental site conditions: • Drainage • Topography • Geophysical conditions • Regional geological conditions • Local geological conditions • Regional groundwater conditions • Local groundwater conditions Geotechnical stability of the dolomite based on the hazard characterisation and evaluation procedures: • Percussion drilling data • Receptacle development • Mobilisation agencies • Potential surface manifestation development space • Nature and mobilisation potential of the blanketing layer • The bedrock morphology These parameters are all inter-related and affect each other in various ways. During the study the importance of site specific observations and interpretations are emphasized. / Thesis (MSc (Environmental Sciences))--North-West University, Potchefstroom Campus, 2013

Page generated in 0.1102 seconds