• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 14
  • 4
  • 1
  • 1
  • Tagged with
  • 21
  • 13
  • 7
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Suppression of osteoblast phenotype in the marrow mesenchymal stem cell by nuclear receptor PPARγ2

Rahman, Sima 27 December 2011 (has links)
No description available.
2

IT-Security Investment Models

Wolff, Janik January 2010 (has links)
No description available.
3

IT-Security Investment Models

Wolff, Janik January 2010 (has links)
No description available.
4

The d/Deaf social worker body as multiplicity: a feminist poststructural autoethnography of deafness and hearing. / Deaf social worker body as multiplicity

Jezewski, Meghan Maria Jadwiga 19 July 2012 (has links)
As a feminist poststructural autoethnography of deafness in social work workplaces, this thesis sets out to map d/Deafness as a cracked subjectivity. Using the work of Rosi Braidotti and Gilles Deleuze and Félix Guattari, I draw out configurations of d/Deafness as lack or cultural minority and split them apart. By positioning d/Deafness on a plane of immanence and employing specificity, I explore d/Deafness as a subjectivity constituted through space, place, time and encounters with other bodies. I argue that the constitution of material and cultural experiences of d/Deafness as specific allows for the articulation of spaces in between Deafness and hearing, disability and ability as spaces in and of themselves in order to think the new as well as to crack up fixed binaries informing traditional notions of what specific bodies can do. / Graduate
5

"Jag drar mig tillbaka i glappet, som också är en spricka" : Ett nomadiskt subjekt blir till i Nina Bouraouis Sauvage

Hedenäs, Malin January 2020 (has links)
In this essay called I withdraw into the gap, which is also a crevice. A nomadic subject comes into being in Nina Bouraoui’s Sauvage, I investigate which aspects in the novel play an important part in relation to the protoganist Alya’s process of becoming a subject in the passage from childhood to adulthood. Through Rosi Braidotti’s theories on the nomadic becoming of a subject I investigate a becoming that is nonunitary, non-linear and constantly changing. This becoming happens in the novel between affects like fear, violence, desire and different experiences of time, and also through a non-chronological narrative and a language which can both deceive, and create the world.       My results show that becoming in Sauvage is about being aware of the outside boundaries and one’s own position in relation to those. For Alya, fear and desire work as transformative and transgressional aspects. In between her affective body and the world which tries to force its boundaries on her, she finds that in between those outside images and her inner affective response, there is a space, a gap, and in the movement between is where she becomes who she is in a process that is a constant negotiation. The subject that emerges in the end of the novel is not a unitary subject, but a nomadic one, that is constantly changing and becoming.
6

Den formlösa kroppen – En väg ut : Kropp, rum och språk i Stina Aronsons Feberboken / The Shapeless Body – A Way Out

Beck-Remnes, Alice January 2020 (has links)
No description available.
7

Unsubstantial Territories : Nomadic Subjectivity as Criticism of Psychoanalysis in Virginia Woolf's The Waves

Belov, Andrey January 2019 (has links)
This essay looks at subjectivity in Virginia Woolf’s The Waves employing a psychoanalytic approach and using the theories of Gilles Deleuze and Félix Guattari. Woolf’s relation to the theories of her contemporary Sigmund Freud was unclear. Psychoanalytic scholarship on Woolf’s writings, nevertheless, established itself in 1980’s as a dominant scholarly topic and has been growing since. However, the rigidity and medicalizing discourse of psychoanalysis make it poorly compatible with Woolf’s feminist, anti-individualist writing. This essay is a reading of The Waves, in which psychoanalytic theory is infused with a Deleuzo-Guattarian approach. The theories of psychoanalyst Jacques Lacan, and especially his concept of the Other, together with Rosi Braidotti’s concept of nomadic subjectivity, are used as relevant tools for thinking about subjectivity in the context of The Waves. The resultant reading is a criticism of psychoanalysis. In this reading, two characters are looked at in detail: Percival and Bernard. Percival emerges as the Lacanian Other, who, situated at the central nexus of power, symbolises the tyrannies of individuality and masculinity. Simultaneously, Percival is detached from the metaphysical world of the novel. His death marks a shift from oppressive individuality towards nomadic subjectivity. For Bernard, nomadic subjectivity is a flight from the dead and stagnating centre towards periphery, where new ethics can be negotiated. The essay concludes with the implications of such reading: the affirmation of nomadic subjectivity makes the Deleuzo-Guattarian approach more relevant in the context of Woolf, whereas psychoanalytic striving towards structure, dualism, and focus on pathology are rejected as incompatible with her texts.
8

Adding value to business performance through cost benefit analyses of information security investments : MBA-thesis in marketing

Cardholm, Lucas January 2007 (has links)
<p>The purpose of this thesis is to present an approach for good practice with regards to using cost benefit analysis (CBA) as a value-adding activity in the information security investment process for large enterprises. The approach is supported by empirical data.</p><p>From a MIO model perspective, this report is focused on the phase of strategic choices regarding organization, i.e. trying to find optimal investments for efficient operations. To assess, improve and monitor the operational effectiveness and management’s internal control environment is essential in today’s business execution. Executive management and boards are increasingly looking for an information security governance framework that encompasses information technology and information security: a single framework through which all information assets and activities within the organisation can be governed, to provide the optimum capability for meeting the organisation’s objectives, in terms of functionality and security.</p><p>The investment decision is one of the most visible and controversial key decisions in an enterprise. Some projects are approved, others are bounced, and the rest enter the organisational equivalent of suspended animation with the dreaded request from the decision makers to “redo the business case” or “provide more information.”</p><p>The concept of cost benefit analyses of information security helps management to make decisions on which initiatives to fund with how much, as there needs to be an approach for measuring and comparing different alternatives and how they meet business objectives of the enterprise. Non-financial metrics are identified using different approaches: governance effectiveness, risk analysis, business case analysis or game theory. The financial performance metrics are driven by the main value disciplines of an enterprise. These lead to the use of formulas enabling the measurement of asset utilisation, profit or growth: ROI (ROIC), NPV, IRR (MIRR), FCF, DCF, Payback Period, TCO, TBO, EVA, and ROSI.</p><p>The author shows research in the field of good corporate governance and the investment approval process, as well as case studies from two multinational enterprises. The case from Motorola demonstrates how IT governance principles are equally applicable to information security governance, while the case from Ericsson demonstrates how an information security investment decision can be supported by performing a cost benefit analysis using traditional marketing approaches of business case analysis (BCA) and standard financial calculations.</p><p>The suggested good practice presented in this thesis is summarised in four steps:</p><p>1. Understand main rationale for the security investment</p><p>2. Identify stakeholders and strategic goals</p><p>3. Perform Cost Benefit Analysis (non-financial and financial performance metrics)</p><p>4. Validate that the results are relevant to stakeholders and strategic goals</p><p>DISCLAIMER</p><p>This report is intended for academic training only and should not be used for any other purposes. The contents are not to be considered legal or otherwise professional advice. No liability is taken, whatsoever, by the author.</p>
9

Adding value to business performance through cost benefit analyses of information security investments : MBA-thesis in marketing

Cardholm, Lucas January 2007 (has links)
The purpose of this thesis is to present an approach for good practice with regards to using cost benefit analysis (CBA) as a value-adding activity in the information security investment process for large enterprises. The approach is supported by empirical data. From a MIO model perspective, this report is focused on the phase of strategic choices regarding organization, i.e. trying to find optimal investments for efficient operations. To assess, improve and monitor the operational effectiveness and management’s internal control environment is essential in today’s business execution. Executive management and boards are increasingly looking for an information security governance framework that encompasses information technology and information security: a single framework through which all information assets and activities within the organisation can be governed, to provide the optimum capability for meeting the organisation’s objectives, in terms of functionality and security. The investment decision is one of the most visible and controversial key decisions in an enterprise. Some projects are approved, others are bounced, and the rest enter the organisational equivalent of suspended animation with the dreaded request from the decision makers to “redo the business case” or “provide more information.” The concept of cost benefit analyses of information security helps management to make decisions on which initiatives to fund with how much, as there needs to be an approach for measuring and comparing different alternatives and how they meet business objectives of the enterprise. Non-financial metrics are identified using different approaches: governance effectiveness, risk analysis, business case analysis or game theory. The financial performance metrics are driven by the main value disciplines of an enterprise. These lead to the use of formulas enabling the measurement of asset utilisation, profit or growth: ROI (ROIC), NPV, IRR (MIRR), FCF, DCF, Payback Period, TCO, TBO, EVA, and ROSI. The author shows research in the field of good corporate governance and the investment approval process, as well as case studies from two multinational enterprises. The case from Motorola demonstrates how IT governance principles are equally applicable to information security governance, while the case from Ericsson demonstrates how an information security investment decision can be supported by performing a cost benefit analysis using traditional marketing approaches of business case analysis (BCA) and standard financial calculations. The suggested good practice presented in this thesis is summarised in four steps: 1. Understand main rationale for the security investment 2. Identify stakeholders and strategic goals 3. Perform Cost Benefit Analysis (non-financial and financial performance metrics) 4. Validate that the results are relevant to stakeholders and strategic goals DISCLAIMER This report is intended for academic training only and should not be used for any other purposes. The contents are not to be considered legal or otherwise professional advice. No liability is taken, whatsoever, by the author.
10

Att bli-nomad och att tänka skillnad : En undersökning av Rosi Braidottis feminina feministiska subjektsfiguration

Stathopoulos, Angelica January 2010 (has links)
This essay investigates the feminist philosophy of Rosi Braidotti with particular focus on the alternative feminine feminist nomadic subject that she creates. I also introduce Braidotti’s theoretical inspiration from Gilles Deleuze and Luce Irigaray. I argue that Braidotti creates an alternative figuration for feminism through synthesizeing Deleuze’s concept of ”becoming” with Irigaray’s sexual difference-theory. Braidotti highlights the importance of understanding the concept of difference differently. She also argues for the difference between subjectivity and identity, for the materialistic foundation of the subject, for the fundamental asymmetry between the sexes and for the nomadic mode of thinking. Braidottis suggests that the way out of the phallogocentric system, which she means we are encapsulated in, consist in working through the images that patriarchy has produced of women, through mimetic repetitons, in order to create new representations of women. I argue that the feminist philosophy of Braidotti is both humble and subversive which makes it an interesting and useful alternative for everyone who is interested in alternative, complex and thrilling ways of theorizing female feminist subjectivity.

Page generated in 0.0194 seconds