• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 20
  • 18
  • 12
  • 9
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 77
  • 13
  • 13
  • 12
  • 12
  • 11
  • 9
  • 9
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Inovace využití cenové diskriminace v prostředí internetu

Mádle, Martin January 2013 (has links)
No description available.
2

A Software Development Model for Building Security into Applications for the Android Platform

Ivancic, Christopher Patrick 14 August 2015 (has links)
The popularity of smart phones has risen throughout the years since first introduced. With the popularity of the devices growing so too has the number of malicious applications flooding the devices’ marketplaces. With more usage there becomes a larger target for malware and exploitation creation. As threats to these devices continue to grow there is a constant need for security to safeguard against these threats. Some attempts to protect smart phones involve building software to analyze applications running on the devices. This attempt has cut back on the amount of malicious software on the marketplace. These attempts however only catch malicious applications after they have been running. This dissertation presents the Secure Android Development Model. The goal of this model is to contribute to security of these devices by having a development model that implicitly builds security into applications. The model ensures a minimal amount of open permissions thus limiting the number of attack vectors that malicious software can make on the devices. By following the model, developers will have all information available during development to make appropriate security decisions in their applications.
3

Proactivity Permission: Why Are Some Employees Allowed to Act Proactively While Others Are Not?

Akben, Mustafa, 0000-0001-7382-9184 January 2022 (has links)
Proactive behaviors are defined as employees’ future-oriented, agentic behaviors that aim to improve workplace conditions. Recent research alludes that employee perceptions of whether they have permission to act proactively may influence their actions. With these ideas in mind, this dissertation introduces the concept of proactivity permission, which is defined as the perception of the extent to which an employee is allowed to perform proactive actions at work. Using a multilevel research design with 501 employees from 112 work groups, I examined the effects of employee and supervisor personality characteristics, relational factors, and contextual factors on proactivity permission. Findings indicate that employee personality characteristics (i.e., psychological entitlement and psychological reactance) positively influence employee proactivity permission beliefs, whereas supervisor personality characteristics (i.e., social dominance orientation and rule-based reasoning) negatively influence proactivity permission judgments of supervisors. The quality of relationships (LMX) between a focal employee and his/her supervisor positively affects both employee proactivity permission and supervisor proactivity permission judgments, while workplace contextual factors (e.g., organizational rule formalization, rule consistency, and normative tightness) are relatively distal to, and play a minor role in, proactivity permission. Additionally, this dissertation finds that employees who believe they have permission to act proactively engage in proactive behaviors to a greater extent, and that supervisors are more supportive toward the proactive behaviors of those employees who they perceive to have greater permission to act proactively. In all, this dissertation offers important contributions to theory and research on employee proactivity and suggests several practical recommendations for managers and organizations who are interested in fostering greater proactivity in the workplace. / Business Administration/Human Resource Management
4

Advertisement to Mobile Phones, Success or Failure? : : A STUDY OF SWEDISH YOUTHS ACCEPTANCE TOWARDS RECEIVING MOBILE ADVERTISEMENT

Olofsson, Anton, Pietz, Michal January 2009 (has links)
<p>The great technological development under the last decade has given the organizations new possibilities to market them self. Mobiles phones, smart phones and the new ultraportable laptops which make it possible to for organizations to send advertisement consumers 24/7. This has led to a steady increase in research during the last decade concerning mobile advertising. The research has mainly been focused on how problems with negative attitudes towards mobile advertising can be changed in to positive ones. Mobile advertising suffers from the same problems as several recently introduced marketing channels have done e.g. ecommerce like trust, privacy and risks. Beside the negative aspects, mobile advertising research has focused on identifying factors that will stimuli consumer willingness to receive mobile advertisement and identified a target group for this marketing channel. The target group has been identified to be young adults in the ages of 18-35. We will in our research´focus on this area about this different problem factors with mobile advertising and try to find which factors that are most important and affecting consumers attitudes towards mobile advertising we further want to develop ideas for how marketers can construct mobile advertising so that consumers accept it as a marketing channels. To examine this, quantitative method was used with a sample of 198 15-19 year old high school students in Umea responding to our survey. The sample was chosen because we believe that this age group will be the ones that are the target for mobile advertisers when the business have picked up more speed in a few years time. This group has also been identified by other researchers as an interesting segment to investigate. We have a positivistic approach to the study and therefore we have worked out six hypotheses that will be tested and then compared with our theoretical framework using a deductive method.</p><p>Our findings confirmed five out of six hypotheses. Consumers are negatively affected by factors as risk, lack of trust and privacy. The attitudes can change towards more positive ones if consumers perceive the advertisement relevant, entertaining, valuable functional and if they get some form of incentives for receiving advertisement. The hypothesis that we were not able to confirm concerned the consumer factors where only three of five factors were significant in our tests.</p>
5

Advertisement to Mobile Phones, Success or Failure? : : A STUDY OF SWEDISH YOUTHS ACCEPTANCE TOWARDS RECEIVING MOBILE ADVERTISEMENT

Olofsson, Anton, Pietz, Michal January 2009 (has links)
The great technological development under the last decade has given the organizations new possibilities to market them self. Mobiles phones, smart phones and the new ultraportable laptops which make it possible to for organizations to send advertisement consumers 24/7. This has led to a steady increase in research during the last decade concerning mobile advertising. The research has mainly been focused on how problems with negative attitudes towards mobile advertising can be changed in to positive ones. Mobile advertising suffers from the same problems as several recently introduced marketing channels have done e.g. ecommerce like trust, privacy and risks. Beside the negative aspects, mobile advertising research has focused on identifying factors that will stimuli consumer willingness to receive mobile advertisement and identified a target group for this marketing channel. The target group has been identified to be young adults in the ages of 18-35. We will in our research´focus on this area about this different problem factors with mobile advertising and try to find which factors that are most important and affecting consumers attitudes towards mobile advertising we further want to develop ideas for how marketers can construct mobile advertising so that consumers accept it as a marketing channels. To examine this, quantitative method was used with a sample of 198 15-19 year old high school students in Umea responding to our survey. The sample was chosen because we believe that this age group will be the ones that are the target for mobile advertisers when the business have picked up more speed in a few years time. This group has also been identified by other researchers as an interesting segment to investigate. We have a positivistic approach to the study and therefore we have worked out six hypotheses that will be tested and then compared with our theoretical framework using a deductive method. Our findings confirmed five out of six hypotheses. Consumers are negatively affected by factors as risk, lack of trust and privacy. The attitudes can change towards more positive ones if consumers perceive the advertisement relevant, entertaining, valuable functional and if they get some form of incentives for receiving advertisement. The hypothesis that we were not able to confirm concerned the consumer factors where only three of five factors were significant in our tests.
6

A PERMISSION SYSTEM FOR CARBAPENEM USE REDUCED INCIDENCE OF DRUG-RESISTANT BACTERIA AND COST OF ANTIMICROBIALS AT A GENERAL HOSPITAL IN JAPAN

NABESHIMA, TOSHITAKA, MOURI, AKIHIRO, KOSEKI, TAKENAO, NARUSAWA, SHIHO, NISHIYAMA, HIDEKI, MAMIYA, TAKAYOSHI, IKEDA, YOSHIAKI 02 1900 (has links)
No description available.
7

A Study on the Consumer Attitude Toward Mobile Advertising

Tsang, Monlan 24 July 2002 (has links)
none
8

An Empirical Examination of the Effects of Permission, Interactivity, Vividness and Personalisation on Consumer Attitudes toward E-mail Marketing

Maneesoonthorn, Chadinee, Pear January 2006 (has links)
The major objective of this study is to explore empirically the effects of permission, interactivity, vividness and personalisation upon attitude, behavioural intention and recommendation to e-mail marketing (the latter two variables being proxies for behaviour). The proposed model is based on the integrated framework of Fishbein and Ajzen's Theory of Reasoned Action (TRA), Triadis's Theory of Planned Behaviour (TPB) and Rettie's 2002 Basic E-mail Response Process Model. For data collection, qualitative and quantitative studies were used. The qualitative results from four semi-structured interviews reveal New Zealand enterprises' strong trust in permission-based e-mail marketing and how they implement it as one of their marketing strategies. The quantitative component presents and empirically tests the proposed model in terms of a personalisation (presence/absence), interactivity (low/high) and vividness (low/medium/high) (2*2*3) between-subjects factorial design, where subjects were exposed to an e-mail advertisement for a mobile phone. From 650 responses collected by clicking on an e-mail link through an online web survey, the data was analysed with analysis of covariance (ANCOVA). Based on strong suggestions in the literature and findings in the qualitative study on the importance of permission-based marketing, attitude toward permission e-mail was examined as one of the dependent variables in the quantitative study. Results reveal similarities and differences in the effects of interactivity, vividness and personalisation respectively between the low and high attitude toward permission based e-mail marketing groups. Although significant effects of interactivity on attitude and behavioural intention were observed, the nature of those effects proved contrary to the author's expectation. In terms of vividness, results showed significant effects on attitude and behavioural intention in both groups as anticipated. Conversely, personalisation was shown to have no effect on attitude and behavioural intention in any group, however, a positive effect on response rates was indicated. Two three-way interaction effects between interactivity, vividness and personalisation on attitude toward brand and friend recommendation were found only in the high group. This study strongly encourages e-mail marketers to respect their customers' privacy and to employ a permission-based marketing concept within their business strategy. The design of the e-mail (moderate to high vividness) and personalisation (use of recipient's name) are indicated to have a positive impact on the effectiveness of an e-mail ad. Future research should examine a permission-based marketing construct as a longitudinal study, and investigate personalisation at a higher level (based on recipients' preferences).
9

Helping Smartphone Users Manage their Privacy through Nudges

Almuhimedi, Hazim 01 December 2017 (has links)
The two major smartphone platforms (Android and iOS) have more than two mil- lion mobile applications (apps) available from their respective app stores, and each store has seen more than 50 billion apps downloaded. Although apps provide desired functionality by accessing users’ personal information, they also access personal information for other purposes (e.g., advertising or profiling) that users may or may not desire. Users can exercise control over how apps access their personal information through permission managers. However, a permission manager alone might not be sufficient to help users manage their app privacy because: (1) privacy is typically a secondary task and thus users might not be motivated enough to take advantage of the permission manager’s functionality, and (2) even when using the permission manager, users often make suboptimal privacy decisions due to hurdles in decision making such as incomplete information, bounded rationality, and cognitive and behavioral biases. To address these two challenges, the theoretical framework of this dissertation is the concept of nudges: “soft paternalistic” behavioral interventions that do not restrict choice but account for decision making hurdles. Specifically, I designed app privacy nudges that primarily address the incomplete information hurdle. The nudges aim to help users make better privacy decisions by (1) increasing users’ awareness of privacy risks associated with apps, and (2) temporarily making privacy the primary task to motivate users to review and adjust their app settings. I evaluated app privacy nudges in three user studies. All three studies showed that app privacy nudges are indeed a promising approach to help users manage their privacy. App privacy nudges increased users’ awareness of privacy risks associated with apps on their phones, switched users’ attention to privacy management, and motivated users to review their app privacy settings. Additionally, the second study suggested that not all app privacy nudge contents equally help users manage their privacy. Rather, more effective nudge contents informed users of: (1) contexts in which their personal information has been accessed, (2) purposes for apps’ accessing their personal information, and (3) potential implications of secondary usage of users’ personal information. The third study showed that user engagement with nudges decreases as users receive repeated nudges. Nonetheless, the results of the third experiment also showed that users are more likely to engage with repeated nudges (1) if users have engaged with previous nudges, (2) if repeated nudges contain new in- formation (e.g., additional apps, not shown in earlier nudges, that accessed sensitive resources), or (3) if the nudge contents of repeated nudges resonate with users. The results of this dissertation suggest that mobile operating system providers should enrich their systems with app privacy nudges to assist users in managing their privacy. Additionally, the lessons learned in this dissertation may inform designing privacy nudges in emerging areas such as the Internet of Things.
10

Revisiting the Evolution of Android Permissions

Lu, Can January 2018 (has links)
No description available.

Page generated in 0.2513 seconds