• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 232
  • 150
  • 128
  • 84
  • 44
  • 40
  • 37
  • 21
  • 14
  • 13
  • 12
  • 12
  • 11
  • 5
  • 5
  • Tagged with
  • 854
  • 125
  • 107
  • 104
  • 95
  • 92
  • 81
  • 81
  • 78
  • 77
  • 73
  • 65
  • 62
  • 59
  • 59
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
391

<em>El Arado</em> : Breaking Ground for Payment for Environmental Services Based on Opportunity Costs of Conservation in Ecuador

Moore, Chela 28 July 2004 (has links)
No description available.
392

Internal stakeholder perceptions of intercollegiate athletic reform: a focus group examination

Harrison, Todd M. 18 June 2004 (has links)
No description available.
393

Essays on Down Payment Constraint, House Price and Young People's Homeownership Behavior

Wang, Xun 01 September 2010 (has links)
No description available.
394

Investigating the role and scale of transactions costs of incentive-based programs for provision of environmental services in developing countries

Ortega Pacheco, Daniel Vicente January 2010 (has links)
No description available.
395

En studie om privatpersoners säkerhetsmedvetande gällande internetköp

Rydvall, Simon, Ahmed, Sakeria Kaysa January 2022 (has links)
Denna studie syftar till att utveckla kunskapen kring de hot som finns på internet, samt att förstå privatpersoners säkerhetsmedvetande vid internettransaktioner. För att uppfylla detta syfte besvarar studien följande tre frågor: hur hanteras privatpersoners kreditkort på internet? hur ser privatpersoners säkerhetsmedvetande ut? och vad gör e-handelsföretag för att skydda privatpersoners data och kreditupplysningar? Datainsamlingen har genomförts med hjälp av en enkätundersökning, två telefonintervjuer samt en litteraturstudie. Enkätundersökningen genomfördes digitalt och riktade sig till studenter på Högskolan Dalarna i åldersgruppen 18–42+. Telefonintervjuerna genomfördes med två dagligvaruhandlare som även bedriver e-handel och intervjuerna var semistrukturerade till sin karaktär. Litteraturstudien genomfördes i syfte att skapa en teoretisk bakgrund till ämnet, som sedan applicerades på resultatet i analysen. Resultatet av denna studie visar att de undersökta företagen som bedriver e-handel gör sitt främsta för att upprätthålla säkerhet gällande e-handel. Studien visar även att den undersökta målgruppen har ett starkt säkerhetsmedvetande.
396

Rewarding altruism: addressing the issue of payments for volunteers in public health initiatives

South, J., Purcell, M.E., Branney, Peter, Gamsu, M., White, J. 16 December 2013 (has links)
No / Lay involvement in public health programmes occurs through formalised lay health worker (LHW) and other volunteer roles. Whether such participation should be supported, or indeed rewarded, by payment is a critical question. With reference to policy in England, UK, this paper argues how framing citizen involvement in health only as time freely given does not account for the complexities of practice, nor intrinsic motivations. The paper reports results on payment drawn from a study of approaches to support lay people in public health roles, conducted in England, 2007e9. The first phase of the study comprised a scoping review of 224 publications, three public hearings and a register of projects. Findings revealed the diversity of approaches to payment, but also the contested nature of the topic. The second phase investigated programme support matters in five case studies of public health projects, which were selected primarily to reflect role types. All five projects involved volunteers, with two utilising forms of payment to support engagement. Interviews were conducted with a sample of project staff, LHWs (paid and unpaid), external partners and service users. Drawing on both lay and professional perspectives, the paper explores how payment relates to social context as well as various motivations for giving, receiving or declining financial support. The findings show that personal costs are not always absorbed, and that there is a potential conflict between financial support, whether sessional payment or expenses, and welfare benefits. In identifying some of the advantages and disadvantages of payment, the paper highlights the complexity of an issue often addressed only superficially. It concludes that, in order to support citizen involvement, fairness and value should be considered alongside pragmatic matters of programme management; however policy conflicts need to be resolved to ensure that employment and welfare rights are maintained. / National Institute for Health Research Service Delivery and Organisation Programme (project number 08/1716/206).
397

From Theory to Practice: Deployment-grade Tools and Methodologies for Software Security

Rahaman, Sazzadur 25 August 2020 (has links)
Following proper guidelines and recommendations are crucial in software security, which is mostly obstructed by accidental human errors. Automatic screening tools have great potentials to reduce the gap between the theory and the practice. However, the goal of scalable automated code screening is largely hindered by the practical difficulty of reducing false positives without compromising analysis quality. To enable compile-time security checking of cryptographic vulnerabilities, I developed highly precise static analysis tools (CryptoGuard and TaintCrypt) that developers can use routinely. The main technical enabler for CryptoGuard is a set of detection algorithms that refine program slices by leveraging language-specific insights, where TaintCrypt relies on symbolic execution-based path-sensitive analysis to reduce false positives. Both CryptoGuard and TaintCrypt uncovered numerous vulnerabilities in real-world software, which proves the effectiveness. Oracle has implemented our cryptographic code screening algorithms for Java in its internal code analysis platform, Parfait, and detected numerous vulnerabilities that were previously unknown. I also designed a specification language named SpanL to easily express rules for automated code screening. SpanL enables domain experts to create domain-specific security checking. Unfortunately, tools and guidelines are not sufficient to ensure baseline security in internet-wide ecosystems. I found that the lack of proper compliance checking induced a huge gap in the payment card industry (PCI) ecosystem. I showed that none of the PCI scanners (out of 6), we tested are fully compliant with the guidelines, issuing certificates to merchants that still have major vulnerabilities. Consequently, 86% (out of 1,203) of the e-commerce websites we tested, are non-compliant. To improve the testbeds in the light of our work, the PCI Security Council shared a copy of our PCI measurement paper to the dedicated companies that host, manage, and maintain the PCI certification testbeds. / Doctor of Philosophy / Automatic screening tools have great potentials to reduce the gap between the theory and the practice of software security. However, the goal of scalable automated code screening is largely hindered by the practical difficulty of reducing false positives without compromising analysis quality. To enable compile-time security checking of cryptographic vulnerabilities, I developed highly precise static analysis tools (CryptoGuard and TaintCrypt) that developers can use routinely. Both CryptoGuard and TaintCrypt uncovered numerous vulnerabilities in real-world software, which proves the effectiveness. Oracle has implemented our cryptographic code screening algorithms for Java in its internal code analysis platform, Parfait, and detected numerous vulnerabilities that were previously unknown. I also designed a specification language named SpanL to easily express rules for automated code screening. SpanL enables domain experts to create domain-specific security checking. Unfortunately, tools and guidelines are not sufficient to ensure baseline security in internet-wide ecosystems. I found that the lack of proper compliance checking induced a huge gap in the payment card industry (PCI) ecosystem. I showed that none of the PCI scanners (out of 6), we tested are fully compliant with the guidelines, issuing certificates to merchants that still have major vulnerabilities. Consequently, 86% (out of 1,203) of the e-commerce websites we tested, are non-compliant. To improve the testbeds in the light of our work, the PCI Security Council shared a copy of our PCI measurement paper to the dedicated companies that host the PCI certification testbeds.
398

The Commodification of Nature: Power/Knowledge and REDD+ in Costa Rica

Mosley, Evan Christopher 29 June 2018 (has links)
Reducing Emissions from Deforestation and forest Degradation (REDD+) is a global carbon trading program intent on mitigating or reversing carbon emissions from forestry in the global south. REDD+ was negotiated at the 2005 United Nations Framework Convention on Climate Change (UNFCCC) and is coordinated by the Forest Carbon Partnership Facility (FCPF), administered by the World Bank Group. In this project, I explore REDD+ activity in Costa Rica, drawing on Michel Foucault's concept of governmentality. Costa Rica became a participant in the Forest Carbon Partnership Facility in July of 2008. Since then, indigenous peoples throughout the country have contested the program. This project is a single-case study of the Bribri contestation of REDD+ schemes, one of the larger indigenous communities in Costa Rica. Bribri argue that REDD+ disrespects their worldview and further endangers their local rights to land and forestry. This project argues that REDD+ and Bribri have different perceptions of nature, enabling disagreement on REDD+ goals. Whereas REDD+ perceives nature as commodifiable for the purposes of neoliberal climate policies, Bribri express a spiritual, harmonious relationship with nature. I conclude by noting that REDD+ can pose negative implications for indigenous life and culture. This is not only because REDD+ draws external and domestic actors to land and forestry for incentive-based purposes. But also because REDD+ defines 'rightful behavior' among forestry resources, challenging indigenous conceptions of environmental management. However, the Bribri are resisting REDD+ imposition and, particularly, the program's external governing of indigenous behavior amongst forests. / Master of Arts
399

Trade credit terms: asymmetric information and price discrimination evidence from three continents

Pike, Richard H., Lamminmäki, D., Cravens, K., Cheng, N.S. January 2005 (has links)
No / Trade credit terms offer firms contractual solutions to informational asymmetries between buyers and sellers. The credit period permits buyers to reduce uncertainty concerning product quality prior to payment, while the seller can reduce uncertainty concerning buyer payment intentions by prescribing payment before/on delivery or through two¿part payment terms and other mechanisms. Variation in trade credit terms also offers firms price discriminating opportunities. This study, drawing on the responses of 700 large firms in the US, UK and Australia, explores trade credit terms through the twin objectives of reducing information asymmetries and discriminatory pricing. Support is found for both theories.
400

Critical success factors of the digital payment infrastructure for developing economies

Singh, N.K., Sahu, G.P., Rana, Nripendra P., Patil, P.P., Gupta, B. 25 September 2020 (has links)
Yes / This paper studies the Critical Success Factors’ (CSFs) for the adoption of Digital Payment System in India. There are few studies about the literature on CSFs for the adoption of the digital payment system in the Indian context. This study is an attempt to cover this gap. In this study, we reviewed the theories for adoption model at the individual level used in Information System (IS) and discussed four technology model including “Technology Acceptance Model” (TAM). Ten factors have been identified with extensive literature review and review of selected models namely; Perceived Ease of Use, Perceived functional benefits, Awareness, Availability of Resources, Government as a policy maker, Performance Expectancy, Social Influence, Price Value, Experience & Habit, and Risk-taking ability. An expert from academic industry has been taken as a reviewer or consultant of the selected variables. The CSFs may ensure that they are the predictors and the important factors for adoption of digital payments system in India. The study mainly uses the deductive approach to consider the primary and secondary sources of data. The analyses of these models take into account through Interpretive Structural Modeling (ISM) methodology and develop a model for effective adoption of Digital Payment System in India. The paper also makes future recommendations for further research studies.

Page generated in 0.0191 seconds