• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1209
  • 243
  • 106
  • 90
  • 90
  • 85
  • 33
  • 17
  • 15
  • 14
  • 14
  • 13
  • 12
  • 10
  • 10
  • Tagged with
  • 2432
  • 2432
  • 455
  • 368
  • 320
  • 298
  • 214
  • 193
  • 178
  • 167
  • 145
  • 127
  • 121
  • 117
  • 113
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
711

Critical infrastructure protection : how to assess and provide remedy to vulnerabilities in telecom hotels

Ordonez, Michael A. 09 1900 (has links)
CHDS State/Local / America's open society includes a vast array of critical infrastructure and key resources that are vulnerable to terrorist attacks. While it is not possible to protect or eliminate vulnerabilities of all critical infrastructures in the United States, strategic improvements can be made to harden these assets and mitigate any damaging effects if an attack were to occur. Current network assessment methods and protective measures are inadequate. As a consequence, the need for a scientific methodology for implementation of critical infrastructure protection is required. A standardized vulnerability assessment/risk analysis tool needs to be developed and implemented for the Critical Infrastructure Protection Programs to analyze complex networks and examine critical nodes. This will help to prevent, deter, and mitigate the effects against terrorist attack in accordance with HSPD-7. This thesis examines ways that vulnerability analysis is currently conducted and it could be improved to establish an all-encompassing methodology to identify, prioritize, and protect critical infrastructure. By analyzing and research, this thesis recommends that the National Communications System under the DHS establish the required policy initiatives to mandate the National Reliability and Interoperability Council's current and future "best practices," and set a vulnerability assessment/analysis standard based on MBVA and JSIVA methodologies. / Training and Exercise Program Manager, US Northern Command (NorthCom)
712

Supply Side Risks Assessment of the Supply Chain : A case study of the Supply Side Risks Assessment in HUAWEI’s Supply Chain

Feng, Zekang, He, Rui, Zhu, Wen, Amin, Fazal January 2017 (has links)
Research questions 1. What kind of risks in the supply side of HUAWEI supply chain can be identified? 2. How can supply side risks of HUAWEI supply chain be assessed? 3. How can supply side risks of HUAWEI supply chain be mitigated? Purpose This paper describes supply side risks in HUAWEI in China, the types of risks identified, provides guidelines for assessment of these risks and suggestions for mitigation. Methodology In order to answer above research questions empirical data have been collected through observations, interviews at with logistics managers of HUAWEI in China, and from the official documents, annual reports and authentic web pages of the HUAWEI. Theoretical framework has been built through scientific articles, peer reviewed journals, authentic web based documents, and textbooks. The information is then assessed and analyzed, which result in conclusion and recommendations for the company. Conclusion There can be four major risks identified on the supply side. Manufacturing risk, logistics risk, information risk and inventory risk. The manufacturing risk include risks related to production, skill, and quality. The logistics risk further include delivery risk, lead time risk, and transportation risk. Production risk and skill risk are critical and they can be avoided by enhancing risk awareness, evaluating production feasibility, strengthen staff training, investing in high skills, strengthening R&D, and analysis of the external environment. The quality and inbound delivery risks can be reduced through supplier inspection and establishing good supplier relations. Lead time risk and inventory risk can be reduced by vendor based managed inventory system and mass customization. Meanwhile, transportation risk can adopt risk transfer strategy. The information risk can be reduced by increasing information sharing levels and adopting modern communication technologies.
713

Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study

Keating, Corland Gordon 01 January 2014 (has links)
An information system (IS) risk assessment is an important part of any successful security management strategy. Risk assessments help organizations to identify mission-critical IS assets and prioritize risk mitigation efforts. Many risk assessment methodologies, however, are complex and can only be completed successfully by highly qualified and experienced security experts. Small-sized organizations, including small-sized colleges and universities, due to their financial constraints and lack of IS security expertise, are challenged to conduct a risk assessment. Therefore, most small-sized colleges and universities do not perform IS risk assessments, which leaves the institution's data vulnerable to security incursions. The negative consequences of a security breach at these institutions can include a decline in the institution's reputation, loss of financial revenue, and exposure to lawsuits. The goal of this research is to address the challenge of conducting IS risk assessments in small-sized colleges and universities by validating the use of the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro risk assessment methodology at a small-sized university. OCTAVE Allegro is a streamlined risk assessment method created by Carnegie Mellon University's Software Engineering Institute. OCTAVE Allegro has the ability to provide robust risk assessment results, with a relatively small investment in time and resources, even for those organizations that do not have extensive risk management expertise. The successful use of OCTAVE Allegro was validated using a case study that documented the process and outcome of conducting a risk assessment at George Fox University (GFU), a small-sized, private university located in Newberg, Oregon. GFU has the typical constraints of other small-sized universities; it has a relatively small information technology staff with limited expertise in conducting IS risk assessments and lacks a dedicated IS risk manager. Nevertheless, OCTAVE Allegro was relatively easy for GFU staff to understand, provided GFU with the ability to document the security requirements of their IS assets, helped to identify and evaluate IS security concerns, and provided an objective way to prioritize IS security projects. Thus, this research validates that OCTAVE Allegro is an appropriate and effective IS risk assessment method for small-sized colleges and universities.
714

Hedersrelaterat våld : Våld och heder ur socialsekreterares perspektiv / Honor-related violence : Violence and honor from a social worker perspective

Skyrman, Ellinor, Larsson, Micael January 2017 (has links)
The aim of the study is to understand how the construction of honor-related violence is interpreted by the social worker and the individual on the basis of risk assessment and support. The study was conducted using semi-structured interviews and informants consisted of nine social workers at eight interview sessions. All the social workers had expertise in honor-related violence but had different positions as social workers. Some were children administrators and others were adult handlers. The information was processed by the encoding of the text for theoretical concepts. The results showed that it is relevant to make a difference in the risk assessments of honor-related violence compared to other violence. This is because honor-related violence often involves greater restrictions than partner violence. The phenomenon of honor-related violence can include a wide age range and cannot be reduced to the girls and young girls but also affects older women, depending on what context it is interpreted. Furthermore, higher requirements on protection strategies and coordinated action are demanded. The result shows that it differs greatly between municipalities how to work out with honor-related violence. Violence has scales and it may be different how the individual perceives the violence. Honor based repression often leads to very subtle expression control which makes the problem difficult to identify. This as well as the starting point for the analysis assume their own words to be aggravating factors. There could be a conflict of identifying honor-related violence and social secretary's approach to risk assessment and support can be crucial.
715

Project BOOST and Cardiovascular Disease Readmissions in a Rural Acute Care Facility

Armfield, Jennifer, Armfield, Jennifer January 2016 (has links)
Hospital readmissions are a source of reduced payment as mandated by the Centers for Medicare and Medicaid Services as part of the Affordable Care Act (ACA). The number of dollars used for hospital readmissions has sky rocketed above $17 million for heart failure alone. The changes in the ACA reimbursement guidelines has put stress on many hospitals as they are facing reduced income, increased use of resources, and increased length of stay. This project evaluated the implementation of Project BOOST, its components, and their predictability for hospital readmission. Sample groups were evaluated both pre- and post-implementation of Project BOOST, which included individuals aged 18 and older, who were of Anglo, Hispanic or Native American descent, and living in Northern Arizona. A retrospective chart review was performed and descriptive and predictive statistics were used to analyze obtained data. Patients with cardiovascular disease admitted to the study hospital have high risks for readmission, such as problem medications, polypharmacy, psychological Issues, and principal diagnoses. Integrating elements from Project BOOST significantly decreased 30-day hospital readmissions. Data from this study revealed a statistically significant reduction in 30-day hospital readmission rates from 22% in the pre-intervention period to just 4% in the post-intervention period. Patients who did not receive the risk assessment tool were 14 times more likely to be readmitted to the hospital within 30 days of the index hospitalization.
716

Contextualized Risk Assessment in Clinical Practice: Utility of Actuarial, Clinical, and Structured Clinical Approaches to Predictions of Violence.

Jackson, Rebecca L. 08 1900 (has links)
Assessing offenders' risk of future violent behavior continues to be an important yet controversial role of forensic psychologists. A key debate is the relative effectiveness of assessment methods. Specifically, actuarial methods (see Quinsey et al., 1998 for a review) have been compared and contrasted to clinical and structured clinical methods (see e.g. Hart, 1998; Webster et al., 1997). Proponents of each approach argue for its superiority, yet validity studies have made few formal comparisons. In advancing the available research, the present study examines systematically the type of forensic case (i.e., sexual violence versus nonsexual violence) and type of assessment method (i.e., actuarial, structured clinical, and unstructured clinical). As observed by Borum, Otto, and Golding (1993), forensic decision making can also be influenced by the presence of certain extraneous clinical data. To address these issues, psychologists and doctoral students attending the American Psychology Law Society conference were asked to make several ratings regarding the likelihood of future sexual and nonsexual violence based on data derived from actual defendants with known outcomes. Using a mixed factorial design, each of these assessment methods were investigated for its influence on decision-makers regarding likelihood of future violence and sexually violent predator commitments. Finally, the potentially biasing effects of victim impact statements on resultant decisions were also explored.
717

Gestion du risque sécuritaire et prédiction des incidents disciplinaires : la contribution des modèles d'importation, de privation et du LS/CMI

Charton, Thibault January 2008 (has links)
Mémoire numérisé par la Division de la gestion de documents et des archives de l'Université de Montréal.
718

Workforce challenges : 'inclusive design' for organizational sustainability

Hussain, Amjad January 2013 (has links)
Today's challenge for workforce management lies in providing a healthy, safe and productive working culture where people are valued, empowered and respected. Workforce diversity is becoming an essential aspect of the global workforce, and ageing is the most prominent and significant factor in this regard. Diversity brings many opportunities and challenges, as workers with different backgrounds, cultures, working attitudes, behaviours and age work together, and in future, the key to organizational effectiveness and sustainability will heavily depend on developing and sustaining inclusive work environments where people with their differences can co-exist safely and productively. Manufacturing organizations expect the highest levels of productivity and quality, but unfortunately the manufacturing system design process does not take into account human variability issues caused by age, skill, experience, attitude towards work etc. This thesis focuses on proposing an inclusive design methodology to address the design needs of a broader range of the population. However, the promotion and implementation of an inclusive design method is challenging due to the lack of relevant data and lack of relevant tools and methods to help designers. This research aims to support the inclusive design process by providing relevant data and developing new design methodologies. The inclusive design methodology suggested in this thesis is a three step approach for achieving a safe and sustainable work environment for workers, with special concern for older workers. The methodology is based on the provision of relevant human capabilities data, the capture and analysis of difference in human behaviour and the use of this knowledge in a digital human modelling tool. The research is focused on manual assembly through a case study in the furniture manufacturing industry and joint mobility data from a wide-ranging population has been analysed and the task performing strategies and behaviours of workers with different levels of skills have been recorded and analysed. It has been shown that joint mobility significantly decreases with age and disability and that skilful workers are likely to adopt safer and more productive working strategies. A digital human modelling based inclusive design strategy was found to be useful in addressing the design needs of older workers performing manufacturing assembly activities. This strategy validates the concept of using human capabilities data for assessing the level of acceptability of any adopted strategy for older workers, and suggests that the strategies adopted by skilful workers are more likely to be equally acceptable for older and younger workers keeping in view differences in their joint mobility. The overall purpose of this thesis is to present a road map towards the promotion and implementation of the inclusive design method for addressing workforce challenges and in future the same strategies might be implemented within a variety of other industrial applications. The proposed three step inclusive design methodology and getting a reasonable understanding of human variability issues along with the use of human capabilities data (joint mobility in this case) in a human modelling system for design assessment at a pre-design stage can be considered as the major contributions of this research.
719

An Empirical Approach to Evaluating Sufficient Similarity: Utilization of Euclidean Distance As A Similarity Measure

Marshall, Scott 27 May 2010 (has links)
Individuals are exposed to chemical mixtures while carrying out everyday tasks, with unknown risk associated with exposure. Given the number of resulting mixtures it is not economically feasible to identify or characterize all possible mixtures. When complete dose-response data are not available on a (candidate) mixture of concern, EPA guidelines define a similar mixture based on chemical composition, component proportions and expert biological judgment (EPA, 1986, 2000). Current work in this literature is by Feder et al. (2009), evaluating sufficient similarity in exposure to disinfection by-products of water purification using multivariate statistical techniques and traditional hypothesis testing. The work of Stork et al. (2008) introduced the idea of sufficient similarity in dose-response (making a connection between exposure and effect). They developed methods to evaluate sufficient similarity of a fully characterized reference mixture, with dose-response data available, and a candidate mixture with only mixing proportions available. A limitation of the approach is that the two mixtures must contain the same components. It is of interest to determine whether a fully characterized reference mixture (representative of the random process) is sufficiently similar in dose-response to a candidate mixture resulting from a random process. Four similarity measures based on Euclidean distance are developed to aid in the evaluation of sufficient similarity in dose-response, allowing for mixtures to be subsets of each other. If a reference and candidate mixture are concluded to be sufficiently similar in dose-response, inference about the candidate mixture can be based on the reference mixture. An example is presented demonstrating that the benchmark dose (BMD) of the reference mixture can be used as a surrogate measure of BMD for the candidate mixture when the two mixtures are determined to be sufficiently similar in dose-response. Guidelines are developed that enable the researcher to evaluate the performance of the proposed similarity measures.
720

The Effectiveness of a Preventive Recall Strategy in Children Following Dental Rehabilitation Under General Anesthesia

Nordeen, Katherine A 01 January 2015 (has links)
Purpose: This was a pilot study to assess the impact of a preventive strategy following full-mouth dental rehabilitation (FMDR) under general anesthesia in children with early childhood dental caries. Methods: Sixty-six patients completed FMDR and were included in the analysis. At the consultation visit, caries risk assessment (CRA) and dental exam information were recorded, and caregivers completed an oral health knowledge (OHK) questionnaire. Patients returned for a post-surgery and recall visit. Caregivers received oral hygiene instructions in a motivational-interviewing style. Results:At the consultation visit all patients were high risk. At the post-surgery visit, only 47% remained high risk (chi-square P Conclusions: Preliminary data demonstrates that the preventive strategy is effective in reducing CRA level in children following FMDR.

Page generated in 0.1018 seconds