• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 439
  • 244
  • 114
  • 87
  • 57
  • 20
  • 13
  • 10
  • 10
  • 8
  • 6
  • 6
  • 5
  • 3
  • 3
  • Tagged with
  • 1151
  • 204
  • 197
  • 154
  • 153
  • 137
  • 136
  • 119
  • 87
  • 84
  • 82
  • 81
  • 79
  • 77
  • 76
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
881

Réseaux sociaux professionnels : instruments d'empowerment professionnel ? : analyse de cas de consultants RH et de recruteurs sur LinkedIn / Professional networks : tools of professional empowerment ?

Hoblingre Klein, Hélène 23 October 2018 (has links)
Cette thèse vise à appréhender les possibilités et les contraintes induites par LinkedIn en termes de « représentation de soi » chez les professionnels des ressources humaines. La recension de la littérature permet de mettre en évidence deux grandes catégories d’utilisation d’un profil LinkedIn : l’utilisation individuelle et l’utilisation institutionnelle. Par ailleurs, il apparaît que le profil pourrait potentiellement permettre à l’individu d’accroître son efficacité au travail, de divulguer son image à un grand nombre de personnes, de développer des relations avec d’autres professionnels ou de développer la confiance en soi. Une première typologie d’utilisateurs est proposée à partir de la sociologie des RSNP. Une analyse sémiotique de profils LinkedIn et des entretiens de recherche compréhensifs ont permis de valider une typologie des usagers du réseau LinkedIn. Les résultats montrent qu’un clivage entre deux grands types d’utilisation semble se dessiner. L’utilisation institutionnelle fait apparaître une forme d’empowerment tournée vers l’efficacité au travail tandis que l’utilisation individuelle est propice à la médiatisation de soi. / This doctoral dissertation focuses on the use of professional network services by Human Resource staff registered on LinkedIn. The aim is to understand the new possibilities and the constraints induced by the RSNP in terms of "self-representation". The literature review shows that a LinkedIn profile can be used in two main ways : for individual and institutional uses. Moreover, it appears that the profile could potentially allow users to increase their efficiency at work by making their image known to a large number of people, to develop relationships with other professionals or develop self-confidence. An initial typology of users is proposed based on the sociology of PNS. A semiotic analysis of LinkedIn profiles and comprehensive research interviews also validate a typology of users. The results show that a cleavage between two major types of use seems to appear. The common purpose of institutional use is to be more efficient at work. At the same time, individual use mainly pursues an objective of self-mediatization.
882

Who is Really in Charge Here: An Exploration of the Formation and Empowerment of Opinion Leaders in a Reddit Gaming Community

Carter, Clinton Chase 12 1900 (has links)
In an attempt to shed light on the further sophistication of opinion leadership in online communities, this study examined the forces and structures that affect their formation in the League of Legends subreddit. By investigating what users thought about the various types of individuals with which the communicate, the researcher hoped to begin to understand and record how those forces work bother on this particular subreddit and in mass media beyond. Opinion leadership continues to be an integral force in deciding what information is consumed by a public and under what frames and agendas it is contextualized. If researchers can operationalize formal definitions for the influences and structures that occur online, they can better navigate the deep waters that are global communication on the internet.
883

Vylepšení rozšíření pro omezení volání JavaScriptu / JavaScript Restricting Web Extension

Timko, Martin January 2019 (has links)
The purpose of this thesis is to functionally expand the browser extension prototype created by Ing. Zbyněk Červinka, focused on the privacy protection of the user during his web browsing. Acquired facts about the function of existing tools for safety and privacy protection, such as technology JavaScript Zero, were used in the solution, which was created by employing a technique of encapsulating JavaScript objects and functions. This allows greater anonymity and safety for users during web browsing. The extension was tested and published under the title JavaScript Restrictor. The main benefit of this thesis is the increase of safety from attacks and increase of anonymity linked to the user data harvesting.
884

Säkerhetsrisker & riskförebyggande av smarta hem : En kvalitativ studie om säkerhetsrisker, integritetsproblem & riskförebyggande av smarta hem / Security risks & risk prevention of smart homes

Johansson, Simon, Tern, Johanna January 2021 (has links)
Den tekniska utvecklingen och digitaliseringen utvecklas i snabb takt och har idag börjat acklimatiserats till hemmamiljöer. För några år sedan var smarta hem och dess enheter ovanligt men idag är ett smart hushåll mer angeläget än någonsin där allt fler digitaliserade funktioner skapar bekvämlighet för användare världen över. Ett smart hem tillhör Internet of Things (IoT) där enheter bestående av sensorer och datorer kommunicerar och utbyter data med varandra vilket bygger på inbyggd intelligens, insamling, analys och överföring av data. Ett smart hem avser enheter som befinner sig i ett hem och är uppkopplad till ett och samma nätverk vilket bidrar till att skapa en enkel och säker vardag. Det smarta hemmet medför många fördelar men genom fördelar kommer också ofta nackdelar. Varje enhet i hemmet kan bli utsatt för olika typer av attacker av en obehörig individ där varje enhet är mer eller mindre lätt att komma åt och där en attack medför att personliga data blir åtkomlig och kan spridas vidare på nätet. Det utgörs en korrelerad risk med antal uppkopplade produkter vilket medför fler integritetskränkande attacker i samma takt som antalet smarta hem och enheter ökar. Användare kan bli analyserade och kartlagda vilket också motiverar fysiska brottsliga handlingar. Det är svårt för användare att veta vem som får tillgång till deras data vilket också gör det svårt för användare att skydda sig. Studien syftar till att öka kunskap om de bakomliggande risker och integritetsproblem som uppstår genom privat användning av smarta hem och undersöker hur risker kan förebyggas. Forskningen inom förebyggandet av risker är idag förhållandevis smal. Förutsättningarna i studien har varit att samla in tidigare forskning och litteratur följt av en kvalitativ intervjuundersökning. Genom tidigare forskning har val av informanter gjorts och intervjufrågor har utformats för att på så sätt kunna besvara våra forskningsfrågor. Intervjuundersökningen genomfördes semi-strukturerat genom olika kommunikationsplattformar. Intervjumaterialet transkriberades där kodning och val av teman utformades. Utifrån de insamlade material tillsammans med empiri presenteras ett resultat och en analys utfördes. Genom de utvalda teman och genomförda analysen presenteras vår slutsats baserat på  forskningsfrågor följt av förslag till vidare forskning. / Technology and digitalization are developing fast and have begun to acclimatize to home environments. A few years ago, smart homes and smart devices were unusual, today a smart household is more urgent than ever, where more digitized features create convenience for users worldwide. A smart home belongs to the Internet of Things (IoT) where devices, consisting of sensors and computers, communicate and exchange data with each other, which is based on built in intelligence, collection, analysis, and transmission of data. A smart home refers to devices that are connected to the same network which helps to create a simple and safe everyday life for users. The smart home brings many advantages but through advantages there are disadvantages. Each device in the smart home environment can be subjected to different types of attacks by an unauthorized user where each device is easy to access and where an attack means that the personal data becomes accessible and can be spread online. There is a correlated risk through the number of connected products which leads to more privacy infringing attacks. Users can be analyzed, which also justifies physical criminal acts. It is difficult for users to know who is accessing their data, which makes it difficult to protect themselves. This study aims to increase knowledge about the underlying risks and privacy problems that arise through private use of smart homes and also how risks can be prevented. Research in risk prevention is currently relatively narrow. The prerequisites in the study have been to collect previous research and literature followed by a qualitative interview survey. Through the literature study, the choice of informants has been made and interview questions have been designed to be able to answer the research questions. The interview survey was conducted semi-structured through various communication platforms. The interview material was transcribed where coding and choice of themes were designed. Based on the collected materials together with empirical data, a result was presented, and an analysis was performed. Based on the selected themes and the analysis that was performed, our conclusion is finally presented based on our research questions followed by suggestions for further research. This study was conducted in swedish.
885

Komunikační software pro terminálové klienty linuxového serveru / Communiacation software for terminal clients of a Linux server

Hanák, Karel January 2009 (has links)
The thesis contains a proposal and implementation of an environment convenient for operation of network client applications which use common terminals. It also consists of implemented examples where the way of their usage is presented. The centralized way of communication is the basis. The approach is used also for the possibility of their joining with managing subsystems, i.e. unlimited ways of regulation of systems for real estate management, access to devices, user authority access to access data points to the devices. The environment is based on operation system Linux and database MySQL. Their realization is supposed on a server, in the network environment. This relates also to the overall security policy and this work also focused on social treatment of clients possibilities.
886

Systém informační agendy společnosti / Information Agenda System

Vencovský, Petr Unknown Date (has links)
This graduation theses suggests informative business of meeting concrete company. Record is proposal information system, which registration workers, theirs attendance, reservation rooms and means for work, transfer files between users. The attendance is basis for counting-room. The whole system is written in PHP language in combination with HTML with the usage of database language SQL and database MySQL.
887

Efektivita základní neodkladné resuscitace dětí poskytovaná osobami na vozíku / Effectivness of Basic Life Support in Children Provided by Wheelchair Users

Zachoval, Jakub January 2020 (has links)
Name: Effectivness of Basic Life Support in Children Provided by Wheelchair Users Objectives: The aim of this diploma thesis is to evaluate the effectiveness of elementary emergency resuscitation children under 1yr of age with three selected positions of resuscitation manikin in persons using a wheelchair for their movement. Based on the comparison of the results when positioning the manikin on a lap, on a mat and on the ground, aim is to evaluate the most suitable position for performing elementary emergency resuscitation. Method: The research group consisted of ten people with spinal cord injury (four with tetraplegia and six with paraplegia), who use wheelchair for their movement. Three methods of data collection were used in this work. A survey was used for the first method, which obtained anamnestic data of the research group. The second method of data collection was the observation of probands during first aid. The third selected method was a measurement using a SimPad SkillReporter and a Resusci Baby QCPR resuscitation manikin. The measurement was used to evaluate the effectiveness of elementary emergency resuscitation of children for five minutes in three selected positions. Results: Based on observations and measurements, it was found that all probands are able to lift and manipulate a...
888

Blindenspezifische Methoden für das User-Centred Design multimodaler Anwendungen

Miao, Mei 09 October 2014 (has links)
Multimodale Anwendungen bieten den blinden Benutzern neue Möglichkeiten und Chancen, die durch Verlust des Sehsinnes entstandenen Defizite über andere Sinneskanäle auszugleichen. Die benutzerorientierte Gestaltung ist der sicherste Weg, um interaktive Systeme gebrauchstauglich zu gestalten. Dabei sind die Benutzer hauptsächlich an zwei Aktivitäten beteiligt. Dies sind die Nutzungsanforderungsanalyse und die Evaluation. Hinsichtlich dieser zwei Aktivitäten wurden in der vorliegenden Arbeit Usability-Methoden untersucht bzw. neu entwickelt, um die nutzerzentrierte Gestaltung multimodaler Anwendungen für blinde Benutzer zu unterstützen. Bezogen auf die Aktivität Nutzungsanforderungsanalyse wurde ein Verfahren entwickelt, welches speziell die Besonderheiten blinder Benutzer und multimodaler Anwendungen bei der Nutzungsanforderungsanalyse berücksichtigt. Zusätzlich wurden zwei Schritte des Verfahrens, die Erstellung mentaler Modelle und die Modalitätsauswahl, die speziell auf den Kontext multimodaler Anwendungen für blinde Benutzer ausgerichtet sind, weiter vertiefend untersucht. Für den Schritt Erstellung mentaler Modelle wurden zwei Erstellungsmethoden, Teaching-Back und Retrospective Think-Aloud, mit blinden Benutzern untersucht. Dabei sind sowohl die Gestaltung vom Teaching-Back als auch der Vergleich beider Methoden von Interesse. Für den Schritt Modalitätsauswahl stand die Analyse des multimodalen Nutzerverhaltens blinder Benutzer im Mittelpunkt. Vier Eingabemodalitäten, Sprache, Touchscreen-Gesten, Touchscreen-Tastatur und Touchscreen-Braille bzw. deren Kombinationen wurden unter Einfluss von acht Aufgabentypen bei der Bedienung einer mobilen multimodalen Navigationsanwendung untersucht. In Hinblick auf die Usability-Evaluationsmethoden wurde zuerst das Augenmerk auf die Auswertung und die Erhebung mentaler Karten von blinden Benutzern gerichtet, da sie eine wichtige Rolle bei der Entwicklung von Navigationssystemen spielen. Zwei Auswertungsmethoden für mentale Karten hinsichtlich des Überblicks- und Routenwissens wurden entwickelt. Beide Methoden ermöglichen es, die mentalen Karten anhand speziell entwickelter Bewertungskriterien, wie Anzahl der Elemente und Eigenschaften der Straßen, quantitativ zu bewerten. Bezüglich der Erhebung mentaler Karten wurden zwei Erhebungsmethoden – Rekonstruktion mit Magnetstreifen und verbale Beschreibung – mit blinden Probanden hinsichtlich unterschiedlicher Aspekten untersucht. In zwei weiteren Untersuchungen wurden taktiles Paper-Prototyping und computerbasiertes Prototyping für die frühen Entwicklungsphasen bzw. Labor- und synchroner Remote-Test für die späteren Entwicklungsphasen mit blinden Benutzern verglichen. Dabei wurden die Effektivität der Evaluation, die Erkenntnisse und Erfahrungen der Probanden sowie des Testleiters als Vergleichskriterien in beiden Untersuchungen eingesetzt.
889

Závislost na jehle v souvislosti s psychopatologickými charakteristikami a mírou rizikového chování u injekčních uživatelů drog / Needle fixation in relation to psychopatological characteristics and risk behavior of injecting drug users

Čížkovská, Dominika January 2020 (has links)
Background: At the point, when injecting still seems to be the most common use among problem drug users and there has been no change in the long term, despite the long tradition of harm reduction services in the Czech Republic, it is important to examine the context of this issue and try to understand it more closely, and therefore understanding the phenomenon of needle fixation. Aims: The paper seeks to address whether the risky behaviour level of the needle-fixated drug users differs from those who are not needle-fixated. The second aim is to examine a possible connection between the injecting users psychopathological characteristics and the phenomenon of needle fixation. The third intention of the work is to find out whether and pošibly how the level of risky behaviour differs among needle-fixated drug users in the context of their psychopathological characteristics. Methods: The chosen method of data collection was a battery of questionnaires: IN-COME questionnaire, BBV-TRAQ, SCL-90 and NEFPRO. The battery of the questionnaire was administered with the participation of the researcher. In addition to descriptive statistical methods, the Mann-Whitney test (4 tests), the Chi-square test (11 tests) and the Spearman correlation coefficient were chosen as methods for testing based on research...
890

What externally presented information do VRUs require when interacting with fully Automated Road Transport Systems in shared space?

Merat, Natasha, Louw, Tyron, Madigan, Ruth, Wilbrink, Marc, Schieben, Anna 30 September 2020 (has links)
As the desire for deploying automated (“driverless”) vehicles increases, there is a need to understand how they might communicate with other road users in a mixed traffic, urban, setting. In the absence of an active and responsible human controller in the driving seat, who might currently communicate with other road users in uncertain/conflicting situations, in the future, understanding a driverless car’s behaviour and intentions will need to be relayed via easily comprehensible, intuitive and universally intelligible means, perhaps presented externally via new vehicle interfaces. This paper reports on the results of a questionnaire-based study, delivered to 664 participants, recruited during live demonstrations of an Automated Road Transport Systems (ARTS; SAE Level 4), in three European cities. The questionnaire sought the views of pedestrians and cyclists, focussing on whether respondents felt safe interacting with ARTS in shared space, and also what externally presented travel behaviour information from the ARTS was important to them. Results showed that most pedestrians felt safer when the ARTS were travelling in designated lanes, rather than in shared space, and the majority believed they had priority over the ARTS, in the absence of such infrastructure. Regardless of lane demarcations, all respondents highlighted the importance of receiving some communication information about the behaviour of the ARTS, with acknowledgement of their detection by the vehicle being the most important message. There were no clear patterns across the respondents, regarding preference of modality for these external messages, with cultural and infrastructural differences thought to govern responses. Generally, however, conventional signals (lights and beeps) were preferred to text-based messages and spoken words. The results suggest that until these driverless vehicles are able to provide universally comprehensible externally presented information or messages during interaction with other road users, they are likely to contribute to confusing and conflicting interactions between these actors, especially in a shared space setting, which may, therefore, reduce efficient traffic flow.

Page generated in 0.0736 seconds