• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2586
  • 1642
  • 1321
  • 1039
  • 381
  • 226
  • 192
  • 138
  • 110
  • 101
  • 101
  • 94
  • 55
  • 49
  • 49
  • Tagged with
  • 9669
  • 1733
  • 1150
  • 1135
  • 1073
  • 1048
  • 769
  • 658
  • 616
  • 599
  • 566
  • 524
  • 488
  • 470
  • 466
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
761

Institutionalizing information security.

Von Solms, Elmarie 04 June 2008 (has links)
Information security has become a much discussed subject all over the world in the last few years. This is because information security is no longer a luxury, but a necessity in all organisations. The securing of information is not an easy task because information security is flexible and always seems to be in a state of development. This means that information security has undergone different development changes due to new technologies in the past few years. Information security became prominent around 50 years ago and had a very strict technical approach. In this approach, industries mainly worked with mainframes, with little or no concept of management aspects such as security policies or awareness programmes. The technical approach thus included little or no management effort in terms of information security. The need to manage information security began when new technologies such as the Internet and the World Wide Web were introduced to the information security environment. This caused information security to shift from the technical to the more managerial approach. The move of information security from the technical to the managerial approach may be identified through different development trends. These development trends have occurred mainly to improve information security management in any organisation. The primary purpose of this dissertation is therefore to identify and investigate different development trends that have an influence on information security, especially from a managerial point of view. / Prof. J.H.P. Eloff
762

La charge tutélaire / The guardianship

Hérin, Claire 08 April 2017 (has links)
Afin de protéger efficacement les personnes vulnérables et conformément au principe de nécessité, le législateur a mis en place divers régimes de protection.Ces régimes diffèrent en fonction de la personne protégée, laquelle peut être soit un mineur soit un majeur. Ils se distinguent également au regard du degré d'altération des facultés personnelles du majeur et du besoin de protection juridique.Il existe ainsi une diversité technique permettant de s'adapter à chaque situation et répondant à la nécessité d'une protection individualisée.Malgré cette diversité, les dispositifs de protection obéissent à un objectif commun, celui de la protection de la personne et de ses biens dans le respect de son autonomie et de ses droits et libertés fondamentaux.Dès lors, une question de pose : la charge tutélaire est-elle une simple appellation employée par le législateur ? Ou bien est-elle une institution juridique rassemblant sur son nom l'ensemble des règles communément applicables aux personnes protégées ?La présente thèse a pour but de démontrer que la charge tutélaire est un organe et une fonction : celle de réaliser l'intérêt de la personne protégée. / Several regimes of protection have been created by the legislator in order to protect vulnerable persons with efficiency and according to the principle of necessity.The choice of the appropriate regime rely on the person to protect, who is either a person of majority age, or a minor, on the degree of alteration of mental capacities of the adult, and on the need of legal protection.Therefore, the legislator has provided a technical diversity that affords an adaptation to any specific situation demanding an individualized protection.Despite this diversity, the regimes of protection respond to a common goal of protection of the person and its property, in respect with a principale of autonomy and fundamental rights.The question remaining is the following : does the guardianship only refer to the legislator ? Or, is it a legal institution gathering all the regulations applying to the persons to be protected ?The author of this thesis demonstrates that the guardianship is an organ and a function, devoted to the interest of the person to be protected.
763

Political parties and the protection of democratic rights of sexual minorities

Brodie, Ipeleng P. January 2020 (has links)
Magister Artium (Development Studies) - MA(DVS) / The protection of sexual minorities’ civil rights and freedoms is paramount in a democratic state considering that these rights are infringed upon on a daily basis through violent crimes such as corrective rape, murder and physical assault. This study intends to establish whether sexual minorities’ democratic rights are being protected and whether political parties are facilitating this process, and if not, why not? In addition, this study will address the question: what is the role of political parties’ in a democratic state, and how do these roles enable the protection of civil rights, inclusivity, and equality? To answer these questions, I will engage in critical discourse analysis of key documents and speeches from the three largest political parties in South Africa: the African National Congress (ANC), the Democratic Alliance (DA), and the Economic Freedom Fighters (EFF).
764

Analysis of homeowners' stormwater management intervention in Gentilly, New Orleans

January 2016 (has links)
0 / SPK / specialcollections@tulane.edu
765

Protective Relaying Student Laboratory

Pretzer, Kenan W 01 May 2017 (has links)
Facing a rapidly-changing power industry, the electrical engineering department at Cal Poly San Luis Obispo proposed Advanced Power Systems Initiatives to better prepare its students for entering the power industry. These initiatives call for the creation of a new laboratory curriculum that uses microprocessor-based relays to reinforce the fundamental concepts of power system protection. This paper summarizes a laboratory system fit for this task and presents a set of proposed laboratory experiments to establish a new laboratory course at Cal Poly. The experiments expose students to the capabilities of industry-standard microprocessor-based relays through hands-on procedures that demonstrate common power system protection schemes. Relays studied in this project support transformer, transmission line, and induction motor protection.
766

Avoiding the Windshield Wiper Effect: A Survey of Operational Meteorologists on the Uncertainty in Hurricane Track Forecasts and Communication

Hyde, James Tupper January 2017 (has links)
The first line of defense for the threat of an oncoming hurricane are meteorologists. From their guidance, warnings are drafted and evacuation plans are made ready. This study explores uncertainty that operational meteorologists encounter with hurricane prediction, and more importantly, how meteorologists translate the uncertainty for the public. The study is based on a web survey of individual meteorologists, in cooperation with the National Weather Association (NWA). The survey received 254 responses with an estimated 18% response rate. Specifically, the study focuses on three key areas: displaying uncertainty in hurricane track forecasts, perceived relationships between the public and the media and message characteristics on various platforms (e.g., television, web, and social media), and reliance on numerical weather prediction in the forecasting process. Results show that tracking graphics are varied between their use and usefulness and meteorologists think that they have a bigger role in information dissemination than previously thought. / National Science Foundation (NSF) Grant CMMI1520338
767

The effect of the consumer protection act on franchise agreements

Du Plessis, B. (Burnadene) January 2013 (has links)
This dissertation discusses the influence of the Consumer Protection Act No 68 of 2008, the “CPA”, on franchise arguments. It is argued that the provisions of the CPA will lead to the consequences of restoring equality between a franchisee and a franchisor. A franchise agreement is viewed as an ordinary commercial contract, governed by the same legal principles as any other contract. In reality franchising is in fact far beyond a simple contract; it is also used as a governing system. The franchisors create structures whereby their franchisees can be controlled. In order to manage franchisee opportunism such as the unauthorized use of intellectual property and addressing under-performance, an inherent power imbalance was present in favour of franchisors. The CPA introduced certain provisions that address the relationship between franchisors and franchisees by prescribing and controlling the rights and obligations of the parties. As a result, a fair structure is created to regulate the franchise relationship between the parties. The promulgation of the CPA is welcomed by this study and it is submitted that the country’s economy as a whole can only benefit from it. / Dissertation (LLM)--University of Pretoria, 2013. / lmchunu2014 / Mercantile Law / unrestricted
768

Evaluation of MIRE Testing Methods for Rating of an Open-Back Active Noise Reduction Headset

Cro, Matthew B. 28 August 1997 (has links)
Active noise reduction was first proposed as a solution for environmental noise over fifty years ago. The use of active noise reduction (ANR) systems, however, was not demonstrated until much later. Recent advances in technology have made the use of active noise reduction systems in personal hearing protection devices (HPDs) practical. Through the use of advanced electronics technology, ANR equipped devices offer the potential to provide increased low frequency attenuation for hearing conservation applications. In order to use ANR equipped devices in an Occupational Safety and Health Administration (OSHA) sanctioned hearing conservation program, a testing standard for ANR equipped HPDs needs to be developed. Existing HPD testing standards offer the most promise for developing an acceptable standard for testing ANR-equipped HPDs. The microphone in real ear (MIRE) testing method is one method that offers a practical method for determining the performance of ANR devices for use in hearing conservation programs. A modified version of this method was successfully used in this study to determine the performance profile of an open-back ANR equipped headset. The results of this and other studies that have used a modified MIRE testing method can be used to support the acceptance of this method as the basis of an approved standard for testing ANR-equipped hearing protection devices. / Master of Science
769

New Data Protection Abstractions for Emerging Mobile and Big Data Workloads

Spahn, Riley Burns January 2020 (has links)
Two recent shifts in computing are challenging the effectiveness of traditional approaches to data protection. Emerging machine learning workloads have complex access patterns and unique leakage characteristics that are not well supported by existing protection approaches. Second, mobile operating systems do not provide sufficient support for fine grained data protection tools forcing users to rely on individual applications to correctly manage and protect data. My thesis is that these emerging workloads have unique characteristics that we can leverage to build new, more effective data protection abstractions. This dissertation presents two new data protection systems for machine learning work-loads and a new system for fine grained data management and protection on mobile devices. First is Sage, a differentially private machine learning platform addressing the two primary challenges of differential privacy: running out of budget and the privacy utility tradeoff. The second system, Pyramid, is the first selective data system. Pyramid leverages count featurization to reduce the amount of data exposed while training classification models by two orders of magnitude. The final system, Pebbles, provides users with logical data objects as a new fine grained data management and protection primitive allowing data management at a higher level of abstraction. Pebbles, leverages high level storage abstractions in mobile operating systems to discover user recognizable application level data objects in unmodified mobile applications.
770

Evaluation de la confiance dans un processus d'authentification / Trust evalution in an authentication process

Hatin, Julien 24 November 2017 (has links)
Dans notre quotidien, le smartphone est devenu un outil indispensable pour effectuer nos tâches courantes. Accéder à des services en ligne depuis son téléphone mobile est devenu une action commune. Afin de s'authentifier à ces services parfois sensibles, la seule protection est généralement l'usage d'un mot de passe. Ces mots de passe pour être robustes doivent être de plus en plus longs. Ceci représente, sur les téléphones mobiles, une contrainte plus forte que pour les ordinateurs de bureau puisque les claviers tactiles disposent de moins de touches. D'autres méthodes d'authentification ont vu le jour sur téléphones mobiles comme la reconnaissance faciale sur les appareils android ou bien l'empreinte digitale qui gagne le marché des smartphones et même le domaine bancaire avec Apple Pay.Afin de simplifier l'authentification, la biométrie prend une part de plus en plus importante dans l'usage des téléphones mobiles. Au delà des capteurs dédiés à l'acquisition de données biométriques, il est aussi possible d'utiliser l'environnement du téléphone mobile pour authentifier les utilisateurs. Si les méthodes d'authentification tendent à se transformer pour devenir de plus en plus transparentes, cela amène deux questions :Comment utiliser ces nouvelles techniques d'authentification dans les processus actuels d'authentification ?Quels impacts ces nouvelles méthodes peuvent avoir sur la vie privée des utilisateurs ?L'objectif de cette thèse est de proposer des méthodes d'authentification transparentes qui soient respectueuses de la vie privée des utilisateurs tout en permettant leur intégration dans les systèmes actuels d'authentification.Dans le manuscrit de thèse, nous abordons ces deux questions en analysant tout d'abord les travaux existants sur la collecte des données permettant l'authentification sur téléphone mobile. Puis, une fois les données collectées, nous verrons les processus permettant la mise en place d'une authentification respectueuse de la vie privée. Enfin, nous évaluons concrètement ces méthodes d'authentification par la réalisation de prototypes à l'échelle industrielle. / In our daily life, the smartphone became an unavoidable tool to perform our common tasks.Accessing to online services from its mobile phone is an usual action.In order to authenticate to those services, that might be sensitive, the one and only protection is usually a password. Those passwords must be longer and longer to stay robust.This is a bigger constraint on mobile phones than on desktop computers.Other authentication solutions are dedicated to smartphones, like facial recognition on android and now Apple smartphones or the fingerprint that conquier new phones.To ease the authentication process, biometrics is more and more often used on mobile phones. In addition to the dedicated biometric sensors, it is also possible to use the phone environement to authenticate users.However, if authentication methods are becoming more and more transparent, it brings two questions:How to integrate those new methods within the actual authentication framework ?What is the impact of those new methods on users' privacy ?The main goal of the phD is to offers privacy compliant transparent authentication methods while integrating them in current authentication systems.In this document, we evaluates those two questions by first analyzing existing works on the data collection for transparent authentication on mobile phones. Then, once the data are collected, we will see wich process can enable the privacy protection. To conclude, we will evaluates concretly those solutions by building industrial prototypes.

Page generated in 0.0933 seconds