• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • 8
  • 4
  • 1
  • 1
  • Tagged with
  • 29
  • 29
  • 10
  • 7
  • 6
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Detecting and resolving redundancies in EP3P policies

Salim, Farzad. January 2006 (has links)
Thesis (M.Comp.Sc.)--University of Wollongong, 2006. / Typescript. Includes bibliographical references: leaf 98-102.
12

Pacific regional order

Peebles, Dave. January 2005 (has links)
Thesis (Ph.D.)--University of Melbourne, Dept. of Criminology, 2005. / Also presented as the author's thesis (Ph.D.)--University of Melbourne, Dept. of Criminology, 2005. Includes bibliographical references and index. Also available in a print form.
13

Avaliação dos resultados do Pacto pela Vida e a dinâmica dos homicídios nos municípios de Pernambuco

OLIVEIRA, Jocsã Carlos Leite de 29 August 2016 (has links)
Submitted by Irene Nascimento (irene.kessia@ufpe.br) on 2017-03-23T18:16:57Z No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) AVALIAÇÃO DOS RESULTADOS DO PACTO PELA VIDA E A DINÂMICA DOS HOMICÍDIOS NOS MUNICÍPIOS DE PERNAMBUCO.pdf: 813607 bytes, checksum: 175b7201c79201fa8956106cc562ac43 (MD5) / Made available in DSpace on 2017-03-23T18:16:57Z (GMT). No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) AVALIAÇÃO DOS RESULTADOS DO PACTO PELA VIDA E A DINÂMICA DOS HOMICÍDIOS NOS MUNICÍPIOS DE PERNAMBUCO.pdf: 813607 bytes, checksum: 175b7201c79201fa8956106cc562ac43 (MD5) Previous issue date: 2016-08-29 / CNPQ / A segurança pública tem se tornado um assunto relevante para a sociedade, dado o aumento das taxas de criminalidade em geral, e dos homicídios em particular, em todo o Brasil desde 1980. Inicialmente, a literatura nacional buscou explicar o fenômeno através de variáveis socioeconômicas, como o aumento da pobreza e da desigualdade social. Posteriormente, variáveis do sistema de segurança pública, como o aprisionamento e o gasto em segurança pública, foram incluídos nas análises. Nos últimos anos, tem crescido a posição que atribui a redução dos homicídios em alguns estados da federação à implantação de políticas de segurança pública. Contudo, estudos de avaliação dessas políticas ainda são escassos. Neste trabalho, buscamos avaliar os resultados alcançados pela política de segurança pública Pacto Pela Vida, implementada no estado de Pernambuco desde o ano de 2007. Inicialmente, fazemos uma exposição das explicações do crime e da segurança pública no Brasil. Apresentamos aspectos gerais da avaliação de políticas públicas e apresentamos o Pacto Pela Vida de Pernambuco: seu histórico, características e resultados alcançados a nível do estado. Posteriormente, analisamos descritivamente a dinâmica dos homicídios nos municípios de Pernambuco. Empregamos um modelo de regressão linear múltipla para testar as relações de associação das variáveis socioeconômicas com a taxa de homicídios. As variáveis socioeconômicas são o Índice Firjan de Desenvolvimento Municipal em suas três dimensões (Emprego&Renda, Educação e Saúde), o log do PIB per capita municipal e o log da densidade populacional. A variável dependente é a taxa de homicídios bayesiana empírica por cem mil habitantes dos municípios de Pernambuco. Testamos a hipótese de que haveria uma associação negativa entre as variáveis socioeconômicas e a taxa de homicídios. Encontramos, na realidade, associação positiva entre as variáveis socioeconômicas e a taxa de homicídios, à exceção do IFDM Educação, que apresentou associação negativa. Descritivamente, observamos a diminuição do número de roubo de automóveis em Pernambuco, assim como a diminuição da taxa de homicídios, embora essa última redução possa ser explicada, parcialmente, pelo aumento dos homicídios ocultos. Nas considerações finais, fazemos uma revisão dos resultados encontrados e apontamos possibilidades de pesquisas futuras. / Public security has become an important issue for society, given the increase in crime rates in general, and in particular homicides in Brazil since 1980. Initially, the national literature sought to explain the phenomenon by socioeconomic variables, such as increased poverty and social inequality. Subsequently, variables of the public security system, such as imprisonment and spending on public safety, were included in the analysis. In recent years, it has grown to position attributed the reduction of homicides in some states of the federation to the implementation of public security policies. However, these policy evaluation studies are still scarce. In this work, we evaluate the results achieved by the public security policy Pact for Life, implemented in the state of Pernambuco since 2007. Initially, we present an exposition of explanations of crime and public security in Brazil. We present general aspects of evaluation of public policies and present the Pact for the Pernambuco life: its history, characteristics and results achieved at the state level. Later, descriptively analyze the dynamics of homicide in the municipalities of Pernambuco. We use a multiple linear regression model to test the association relationship of socioeconomic variables with the homicide rate. Socioeconomic variables are the Municipal Development FIRJAN Index in its three dimensions (Employment & Income, Education and Health), the log of GDP per capita municipal and the log of population density. The dependent variable is the rate of empirical Bayes homicides per hundred thousand inhabitants of the municipalities of Pernambuco. We tested the hypothesis that there would be a negative association between socioeconomic variables and the homicide rate. We find, in fact, a positive association between socioeconomic variables and the homicide rate, except for FMDI Education, which presented a negative association. Descriptively, we observed a decrease in auto theft number in Pernambuco, as well as reducing the homicide rate, although the latter reduction can be explained partly by the increase in hidden homicides. In the final considerations, we review of the results and point out future research possibilities.
14

Social-engineering ett hot mot informationssäkerheten?

Palmqvist, Stefan January 2008 (has links)
<p>Den här rapporten tar upp ett annorlunda hot mot informationssäkerheten, som inte hårdvara</p><p>eller mjukvara kan stoppa. Detta hot kallas för social-engineering, och det som gör detta hot</p><p>farligt är att de anställda och chefer i en organisation, kan hjälpa utövaren av socialengineering</p><p>utan att de själva vet om det.</p><p>Det går inte att förhindra att dessa attacker sker, men man kan förhindra de negativa</p><p>konsekvenserna av en sådan attack. Denna rapport tar upp hur man ska göra för att en</p><p>organisation ska kunna fortsätta med sin verksamhet, efter en attack av social-engineering. I</p><p>värsta fall kan en attack av social-engineering innebära att ett företag aldrig återhämtar sig.</p><p>Detta kan bero på att organisationen har förlorat alla sina kunder, förlorat marknads andelar,</p><p>eller för att de ansvariga och viktiga personerna i organisationen har blivit dömda för</p><p>oaktsamhet och sitter i fängelse.</p><p>Denna rapport ska informera och få er att vara uppmärksamma och medvetna om dessa</p><p>hot, som ni kanske inte vet finns. Ni ska få kunskap och lära er känna igen de olika</p><p>förklädnaderna en utövare av social-engineering antar.</p> / <p>This paper discusses a different threat against information security, which can not be</p><p>prevented by either hardware or software. This Threat is called social engineering and the</p><p>main issue that makes this threat so dangerous is that the victims, like executives and the</p><p>employees in an organization are not aware that they actually helps the practician of social</p><p>engineering.</p><p>These attacks can not be avoided, but there is a way to prevent negative consequences of</p><p>such an attack. This paper discusses how an organization can manage to continue with the</p><p>activity, despite an attack of social engineering. In worse case the scenarios of an attack of</p><p>social engineering can mean that an organization never fully recovers. The different scenarios</p><p>of this can be as following. The organization could lose all the clients, they could have lost</p><p>market share or the responsible important people in the organization could be convicted and</p><p>sent to jail.</p><p>This paper will make you aware of these threats that you might even don’t know exists.</p><p>You will be given the knowledge to be able to recognize de different disguises a practician of</p><p>social engineering can assume.</p>
15

A Constructivist Analysis Of Turkey&#039 / s Foreign And Security Policy In The Post-cold War Era

Ulusoy, Hasan 01 October 2005 (has links) (PDF)
ABSTRACT A CONSTRUCTIVIST ANALYSIS OF TURKEY&rsquo / S FOREIGN AND SECURITY POLICY IN THE POST-COLD WAR ERA Ulusoy, Hasan Ph.D. , Department of International Relations Supervisor : Prof. Dr. H&uuml / seyin Bagci October 2005, 388 pages The thesis is about how the foreign and security policy of Turkey is constructed in a realist world where states follow rationalist policies according to how they see and perceive this world. The main argument is that Turkey&rsquo / s foreign and security policy has shown an unbroken continuity of a pragmatic and consistent nature guided by rationality that functions in conformity with how the state perceives the outside material world, through the lenses forming its own identity. As the focus is on the identity analysis, the thesis has utilized the constructivist approach in its conventional form. Conventional constructivism, which provides not alternative but complementary explanations to the world run by political realism without rejecting the realist-dominated mainstream scholarship, serves to understand how the material world where realist parameters dominate through rationalistic behavior of states is constructed and thus how the foreign polices of states are formulated. It focuses on the examination of the lenses through which states perceive and construct the world outside. These lenses simply shape the identity of the state in question. Building on this theoretical tool, the thesis seeks to provide alternative explanations to the consistency and continuity of Turkish foreign and security policy, in the post-Cold war era till the Iraqi crisis in 2002. It is based on the examination of the lenses forming the identity of the state that has governed the foreign and security policy in general and in respect to the collective identity-building of the state as regards (collective) security in particular. The assertions of the thesis are as follows: contrary to the arguments of mostly critical studies, in the Turkish foreign and security policy there exists no identity crisis despite the plurality of identities stemming from the multi-dimensionalism in this policy. These identities (sub-identities) may differ depending on the composition of ideational and material factors therein. Yet, they exist in harmony with each other under the guidance of the state (upper) identity. Furthermore, in respect of collective security efforts, arguments regarding Turkey as a security consumer causing instability are also related to identity: that is, the lack of sufficient collective identity which leads to such perceptions about Turkey. As to the methodology, the thesis is mainly based on the discourse analysis of the official documents, debates, policy papers on the foreign and security policy, as well as speeches/interviews and articles of state personalities who play roles in this policy. This is because such sources reflect the understanding of both the state organs and state personalities (civil and military officials, statesmen and politicians) about the outside world that shapes the lenses (identities), through which Turkey perceives the world in its foreign and security policy.
16

Enhancing information security in organisations in Qatar

Al-Hamar, Aisha January 2018 (has links)
Due to the universal use of technology and its pervasive connection to the world, organisations have become more exposed to frequent and various threats. Therefore, organisations today are giving more attention to information security as it has become a vital and challenging issue. Many researchers have noted that the significance of information security, particularly information security policies and awareness, is growing due to increasing use of IT and computerization. In the last 15 years, the State of Qatar has witnessed remarkable growth and development of its civilization, having embraced information technology as a base for innovation and success. The country has undergone tremendous improvements in the health care, education and transport sectors. Information technology plays a strategic role in building the country's knowledge-based economy. Due to Qatar s increasing use of the internet and connection to the global environment, it needs to adequately address the global threats arising online. As a result, the scope of this research is to investigate information security in Qatar and in particular the National Information Assurance (NIA) policy. There are many solutions for information security some technical and some non-technical such as policies and making users aware of the dangers. This research focusses on enhancing information security through non-technical solutions. The aim of this research is to improve Qatari organisations information security processes by developing a comprehensive Information Security Management framework that is applicable for implementation of the NIA policy, taking into account Qatar's culture and environment. To achieve the aim of this research, different research methodologies, strategies and data collection methods will be used, such as a literature review, surveys, interviews and case studies. The main findings of this research are that there is insufficient information security awareness in organisations in Qatar and a lack of a security culture, and that the current NIA policy has many barriers that need to be addressed. The barriers include a lack of information security awareness, a lack of dedicated information security staff, and a lack of a security culture. These barriers are addressed by the proposed information security management framework, which is based on four strategic goals: empowering Qataris in the field of information security, enhancing information security awareness and culture, activating the Qatar National Information Assurance policy in real life, and enabling Qatar to become a regional leader in information security. The research also provides an information security awareness programme for employees and university students. At the time of writing this thesis, there are already indications that the research will have a positive impact on information security in Qatar. A significant example is that the information security awareness programme for employees has been approved for implementation at the Ministry of Administrative Development Labour and Social Affairs (ADLSA) in Qatar. In addition, the recommendations proposed have been communicated to the responsible organisations in Qatar, and the author has been informed that each organisation has decided to act upon the recommendations made.
17

Social-engineering ett hot mot informationssäkerheten?

Palmqvist, Stefan January 2008 (has links)
Den här rapporten tar upp ett annorlunda hot mot informationssäkerheten, som inte hårdvara eller mjukvara kan stoppa. Detta hot kallas för social-engineering, och det som gör detta hot farligt är att de anställda och chefer i en organisation, kan hjälpa utövaren av socialengineering utan att de själva vet om det. Det går inte att förhindra att dessa attacker sker, men man kan förhindra de negativa konsekvenserna av en sådan attack. Denna rapport tar upp hur man ska göra för att en organisation ska kunna fortsätta med sin verksamhet, efter en attack av social-engineering. I värsta fall kan en attack av social-engineering innebära att ett företag aldrig återhämtar sig. Detta kan bero på att organisationen har förlorat alla sina kunder, förlorat marknads andelar, eller för att de ansvariga och viktiga personerna i organisationen har blivit dömda för oaktsamhet och sitter i fängelse. Denna rapport ska informera och få er att vara uppmärksamma och medvetna om dessa hot, som ni kanske inte vet finns. Ni ska få kunskap och lära er känna igen de olika förklädnaderna en utövare av social-engineering antar. / This paper discusses a different threat against information security, which can not be prevented by either hardware or software. This Threat is called social engineering and the main issue that makes this threat so dangerous is that the victims, like executives and the employees in an organization are not aware that they actually helps the practician of social engineering. These attacks can not be avoided, but there is a way to prevent negative consequences of such an attack. This paper discusses how an organization can manage to continue with the activity, despite an attack of social engineering. In worse case the scenarios of an attack of social engineering can mean that an organization never fully recovers. The different scenarios of this can be as following. The organization could lose all the clients, they could have lost market share or the responsible important people in the organization could be convicted and sent to jail. This paper will make you aware of these threats that you might even don’t know exists. You will be given the knowledge to be able to recognize de different disguises a practician of social engineering can assume.
18

Dynamická úprava bezpečnostní politiky na platformě Android / Dynamic Security Policy Enforcement on Android

Vančo, Matúš January 2016 (has links)
This work proposes the system for dynamic enforcement of access rights on Android. Each suspicious application can be repackaged by this system, so that the access to selected private data is restricted for the outer world. The system intercepts the system calls using Aurasium framework and adds an innovative approach of tracking the information flows from the privacy-sensitive sources using tainting mechanism without need of administrator rights. There has been designed file-level and data-level taint propagation and policy enforcement based on Android binder.
19

"Disaster, war, conflict, complex emergencies and International public health risks." / "Disaster, war, conflict, complex emergencies and International public health risks."

Quinn V, John Michael January 2017 (has links)
PhD Thesis Abstract: John Michael Quinn V In the 21st century, the prevention of illness, disease and risks to health ushered in public health and medical practice with mixed results. War, hybrid warfare, conflict, complex emergencies and disasters remain significant public health risks and areas of strategic concern; focused epidemiological study in health policy remains elusive. The paradigm shift from major world powers leading global affairs and affecting global health to multiple state and non-state actors vying for power and influence regionally has possibly led to an increase in small scale and low intensity conflict with high morbidity and mortality, including both noncommunicable (NCD) and communicable diseases. The basic research carried out for this PhD project includes: 1) mental health surveys and trauma associated with war; 2) the migration of, and the need for, advanced medical personnel and their services in war and hybrid warfare, including how the negative movement or adverse flow through 'brain drain' of doctors affects disaster; 3) a quantitative study of infectious diseases, health and human security associated with state stability and the mitigation of state failure; 4) a qualitative food security review, the origins of food security and its impact; and 5) the general concepts of...
20

Can Audits be an Effective Method to Improve Information Governance Compliance Objectives?

du Fresne, Andrew J. 29 July 2020 (has links)
No description available.

Page generated in 0.0451 seconds