• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 208
  • 30
  • 30
  • 28
  • 22
  • 20
  • 6
  • 6
  • 6
  • 5
  • 5
  • 4
  • 3
  • 2
  • 2
  • Tagged with
  • 478
  • 140
  • 114
  • 64
  • 58
  • 56
  • 51
  • 50
  • 50
  • 48
  • 42
  • 40
  • 38
  • 37
  • 36
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
271

Slum Areas and Insecure Tenure in Urban Sub-Saharan Africa : A Conceptual Review of African Best Practices

Berger, Tania January 2006 (has links)
<p>Urbanisation processes in developing countries are resulting in a rapidly increasing proportion of habitants living in urban slum areas. In the international development debate the lack of tenure security for slum dwellers in developing countries is considered to be an essentially important problem. Within the framework of the UN Millennium Development Programme the necessity of efforts towards increased tenure security for marginalised urban residents was agreed upon. Sub-Saharan Africa is the region where the overall progress towards improved living conditions for slum area residents is showing the least positive results. This paper investigates the occurrence of activities in the region which show an ambition of improving tenure security for people living in urban slum areas. It does so by examining cases submitted from African countries to the UN-HABITAT database of best international practices in the improvement of living conditions.</p>
272

Slum Areas and Insecure Tenure in Urban Sub-Saharan Africa : A Conceptual Review of African Best Practices

Berger, Tania January 2006 (has links)
Urbanisation processes in developing countries are resulting in a rapidly increasing proportion of habitants living in urban slum areas. In the international development debate the lack of tenure security for slum dwellers in developing countries is considered to be an essentially important problem. Within the framework of the UN Millennium Development Programme the necessity of efforts towards increased tenure security for marginalised urban residents was agreed upon. Sub-Saharan Africa is the region where the overall progress towards improved living conditions for slum area residents is showing the least positive results. This paper investigates the occurrence of activities in the region which show an ambition of improving tenure security for people living in urban slum areas. It does so by examining cases submitted from African countries to the UN-HABITAT database of best international practices in the improvement of living conditions.
273

Anknytning och Idrott : trygg-bas script och möjligt sporttävlingsscript hos idrottsaktiva skolbarn och samband med föräldrainvolvering i barnets idrott

Sörlie, Anita A. January 2013 (has links)
Trygg-bas scripts är mentala anknytningsrepresentationer som bildas och utvecklas hos individen utifrån dess samvaro med anknytningsperson(er). Studiens syfte var att undersöka förekomst av idrottsrelaterade (tävlings) script och sambandet mellan trygg-bas styrka i barnens eventuella sporttävlingsscript, trygg-bas generellt och koherens i barnets anknytningsrepresentation. Dessutom söktes förståelse för barns och föräldrars involvering och upplevelse av barnets idrottsaktivitet. Föräldrapress undersöktes från både barn- och föräldraperspektiv. Slutligen diskuterades samband mellan barnets anknytning och föräldrapress. Barnen testades för scriptkunskap (Secure Base Script Test, SBST; Psouni &amp; Apetroaia, 2011), samt blev intervjuade (Friends and Family Interview, FFI; Steele &amp; Steele, 2005). Idrottsenkäter besvarades av barn och föräldrar. Idrottsaktiva skolbarn i åldern 9-12 år (N = 86) och föräldrar (N = 74) deltog. Nivåerna av föräldrapress är låga, dock något högre sett från barnens perspektiv. Signifikanta, negativa korrelationer mellan trygg anknytning och föräldrapress rapporteras. Föräldrarnas sensitivitet och/eller barnens balanserade emotionssystem kan vara förklaringar. Samband mellan barnens generella trygg-bas scripts och ett sporttävlingsscript rapporteras. Scriptkunskap för att tackla sporttävlingar var högre för trygga än för otrygga barn (F(1,40) = 5.05, p = .03, partiell η2 = .11). Vilket tyder på att tryggt anknutna barn har en trygg-bas kunskap som är nyttig i idrottssituationer, vilket framhäver anknytningsteorins relevans för sportpsykologi. / Secure base scripts are mental attachment representations that develop in the individual during interactions with caregiver(s). In the study we assessed the importance of attachment representation coherence, scripted attachment knowledge and, for children’s scripted knowledge of coping in a sports competition. Besides, a sport enquiry investigating children’s and parental involvement and experience in the child’s sports activities. Parental pressure from both the child and parents perspective was evaluated. Finally, any connection between the child’s attachment and parental pressure was discussed. Children were interviewed (Friends and Family Interview, FFI; Steele &amp; Steele, 2005) and, tested for scripted attachment knowledge (Secure Base Script Test, SBST; Psouni &amp; Apetroaia, 2011). Sports questionnaires were answered by children and parents. School children active in sport, 9-12 years (N = 86) and parents (N = 74) participated. The level of parental pressure is low seen from both the child and parents perspective, anyhow, the children reporting a slightly higher level of pressure. Significant, negative correlations between secure attachment and parental pressure are reported. Parental sensitivity and/or the secure children’s balanced emotional system might be explanations. Scripted knowledge of coping in sports competitions predicted by children’s scripted attachment knowledge (SBST) is reported. Scripted knowledge of coping in sports competitions was higher for Secure than for Insecure children (F(1,40) = 5.05, p = .03, partial η2 = .11). Our findings suggest that securely attached children have an overarching secure base knowledge which is particularly useful in sports situations, thereby highlighting the relevance of attachment theory for sports education and sports psychology.
274

Forging the Civil Rights Frontier: How Truman's Committee Set the Liberal Agenda for Reform 1947-1965

Riehm, Edith S 05 May 2012 (has links)
At the close of 1946, a year marked by domestic white-on-black violence, Harry S. Truman, in a dramatic move, established the President’s Committee on Civil Rights (PCCR). Five years before, his predecessor Franklin D. Roosevelt had formed the Fair Employment Practices Committee (FEPC), under pressure from civil rights groups mobilized against racial discrimination in the defense industry. The FEPC was the first major federal civil rights legislation since Reconstruction. However, when race riots later erupted in cities across the country in 1943, Roosevelt ignored his staff's recommendation to appoint a national race relations committee. Instead, he agreed to a “maypole” committee, which was, in actuality, a decentralized network of individuals, including Philleo Nash, whose purpose was to anticipate and diffuse urban racial tensions in order to avert further race riots. Superficially, Truman's PCCR seemed to resemble Roosevelt's rather conservative race relations strategy of appointing a committee rather than taking direct action under the authority of the federal government. But, as this project will argue, Truman's PCCR represented a major, historical change in the approach to civil rights that would have a profound effect on activists, such as Dorothy Tilly and Frank Porter Graham, and the movement itself. Where FDR's committees were created to avoid further racial confrontations, Truman’s committee invited and ignited controversy. Its groundbreaking report, To Secure These Rights (TSTR), unequivocally declared the federal government as the guardian of all Americans’ civil rights. In essence, Truman’s PCCR elevated the civil rights dialogue to a national level by recasting the civil rights issue as an American problem rather than just a black-American problem. Moreover, TSTR attacked segregation directly, and challenged the federal government to take the lead by immediately desegregating the armed services. These radical recommendations came only six years after a reluctant FDR formed the FEPC and six and one-half years before the Unites States’ Supreme Court’s landmark ruling, Brown v. the Board of Education of Topeka, Kansas and the ensuing backlash. Thus, Truman’s PCCR and TSTR, in 1947, forged a new “civil rights frontier.”
275

A model to prepare and secure an implementation of a performance measurement system : A case study

Wieslander, Ida January 2008 (has links)
What you do not measure you cannot control and what you do not control you cannot improve, implies that measurement is a pre-requisite for improvements. Especially for Small and Medium Sized Enterprises (SME) an implementation of a Performance Measurement System is mostly critical in terms of the fact that SMEs often is restricted of limited resources, lack of strategic thinking, lack of formal planning, as well as a reactive mentality. A model to prepare and secure an implementation of a performance measurement system at SMEs, has been developed, tested and validated through a single case study at a small enterprise, that is a well-renowned refiner of castings. The model is constituted by phases and steps supporting the advantages as well as over bridges the most common disadvantages for SMEs. The significant advantages on behalf of SMEs; loose structure, informal operating practices and lack of bureaucracy are reinforced by integrating the project and especially the output such as specification of requirements, new routines, improvement groups and forums within the organisation and in turn over bridge the disadvantages of limited resources and lack of formal planning. Identification and prioritisation of strategic objectives is the first step and creates a foundation of a continuous strategic thinking, which often SMEs are lacking, and in turn navigate the company in the right direction in order to maximise the utilisation of resources and consequently increase the profitability. / Vad som inte mäts kan inte kontrolleras och vad som inte kontrolleras kan inte förbättras, indikerar att mätning är en förutsättning för att åstadkomma förbättringar. Implementation av ett driftsuppföljningssystem är särskilt kritiskt på ett små och medelstora företag (SMEs) då dessa ofta är hindrade av begränsade resurser, bristfälligt strategiskt tänkande, otillräcklig formell planering, men även av en reaktiv mentalitet. En modell för att förbereda och säkra en implementation av ett driftsuppföljningssystem har utvecklats, testats och validerats genom en enskild fallstudie på ett mindre företag som bearbetar gjutgods. Modellen består av faser och steg som stödjer fördelarna med SMEs, men samtidigt överbrygger de vanligaste negativa kännetecken för SMEs. Fördelarna; lös struktur, informella operativa aktiviteter och brist på byråkrati är förstärkta genom att integrera projektet och speciellt resultaten såsom kravspecifikation, nya rutiner, förbättringsgrupper och forums i organisationen and därmed även överbrygga nackdelarna såsom begränsade resurser och bristfällig formell planering. Identifikation och prioritering av de strategiska målen är det första steget i modell för att skapa en grund för ett ständigt strategiskt tänkande, som ofta är bristfälligt på SMEs, och till följd därav styra företaget i rätt riktning och därmed maximera utnyttjandet av befintliga resurser och följaktligen öka lönsamheten.
276

Efficient Authentication, Node Clone Detection, and Secure Data Aggregation for Sensor Networks

Li, Zhijun January 2010 (has links)
Sensor networks are innovative wireless networks consisting of a large number of low-cost, resource-constrained sensor nodes that collect, process, and transmit data in a distributed and collaborative way. There are numerous applications for wireless sensor networks, and security is vital for many of them. However, sensor nodes suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the lack of infrastructure, all of which impose formidable security challenges and call for innovative approaches. In this thesis, we present our research results on three important aspects of securing sensor networks: lightweight entity authentication, distributed node clone detection, and secure data aggregation. As the technical core of our lightweight authentication proposals, a special type of circulant matrix named circulant-P2 matrix is introduced. We prove the linear independence of matrix vectors, present efficient algorithms on matrix operations, and explore other important properties. By combining circulant-P2 matrix with the learning parity with noise problem, we develop two one-way authentication protocols: the innovative LCMQ protocol, which is provably secure against all probabilistic polynomial-time attacks and provides remarkable performance on almost all metrics except one mild requirement for the verifier's computational capacity, and the HB$^C$ protocol, which utilizes the conventional HB-like authentication structure to preserve the bit-operation only computation requirement for both participants and consumes less key storage than previous HB-like protocols without sacrificing other performance. Moreover, two enhancement mechanisms are provided to protect the HB-like protocols from known attacks and to improve performance. For both protocols, practical parameters for different security levels are recommended. In addition, we build a framework to extend enhanced HB-like protocols to mutual authentication in a communication-efficient fashion. Node clone attack, that is, the attempt by adversaries to add one or more nodes to the network by cloning captured nodes, imposes a severe threat to wireless sensor networks. To cope with it, we propose two distributed detection protocols with difference tradeoffs on network conditions and performance. The first one is based on distributed hash table, by which a fully decentralized, key-based caching and checking system is constructed to deterministically catch cloned nodes in general sensor networks. The protocol performance of efficient storage consumption and high security level is theoretically deducted through a probability model, and the resulting equations, with necessary adjustments for real application, are supported by the simulations. The other is the randomly directed exploration protocol, which presents notable communication performance and minimal storage consumption by an elegant probabilistic directed forwarding technique along with random initial direction and border determination. The extensive experimental results uphold the protocol design and show its efficiency on communication overhead and satisfactory detection probability. Data aggregation is an inherent requirement for many sensor network applications, but designing secure mechanisms for data aggregation is very challenging because the aggregation nature that requires intermediate nodes to process and change messages, and the security objective to prevent malicious manipulation, conflict with each other to a great extent. To fulfill different challenges of secure data aggregation, we present two types of approaches. The first is to provide cryptographic integrity mechanisms for general data aggregation. Based on recent developments of homomorphic primitives, we propose three integrity schemes: a concrete homomorphic MAC construction, homomorphic hash plus aggregate MAC, and homomorphic hash with identity-based aggregate signature, which provide different tradeoffs on security assumption, communication payload, and computation cost. The other is a substantial data aggregation scheme that is suitable for a specific and popular class of aggregation applications, embedded with built-in security techniques that effectively defeat outside and inside attacks. Its foundation is a new data structure---secure Bloom filter, which combines HMAC with Bloom filter. The secure Bloom filter is naturally compatible with aggregation and has reliable security properties. We systematically analyze the scheme's performance and run extensive simulations on different network scenarios for evaluation. The simulation results demonstrate that the scheme presents good performance on security, communication cost, and balance.
277

The Psychometric Qualities Of The Knowledge Of Secure Base Script-prompt Word Outline Method: Multi-sample Evaluation Of The Validity And The Reliability

Anafarta, Meltem 01 September 2007 (has links) (PDF)
Attachment theory which emphasizes the importance of the mother infant bond and its&rsquo / crucial role in determining multiple cognitive, emotional, and behavioral factors later in life, is gaining popularity in all domains of psychology. However, both in terms of conceptualization and methods of assessment, there is no consensus among the domains and this debate encourages researchers to develop new assessment methods to resolve the issue. The current study focused on the Turkish adaptation of the most recently developed unobtrusive measure of attachment: The Knowledge of Secure Base Script-Prompt Word Outline Method (KSBS) which aims to assess the degree of knowledge about the secure base script. For this purpose, four different studies were conducted each of which assesses the reliability and the validity of KSBS with varying samples and certain premises of the attachment theory were tested to validate KSBS. Accordingly, internal consistency, test-retest reliability and interrater reliability of KSBS was established. Addittionally, discriminant validity of KSBS was established presenting no relation with intelligence and certain socio-demographic variables as gender, age, education, and marital status. Also, consistent with the premises of the attachment theory, results revealed that among surgery patients the ones with lower KSBS score would display more state anxiety after the surgery than the ones with higher KSBS score. Similarly, psychiatric patients were shown to have considerably lower KSBS score than a control group with no psychiatric history. Lastly, the present study found that KSBS is correlated with perceived social support and coping strategies. Specifically, positive correlation was found between KSBS and perceived social support from friends, family, and significant others, and problem solving coping. Negative correlation was found between the helplessness and KSBS score. The expected and unexpected results of the study were discussed within the relevant literature, shortcomings of the current study, clinical implications and suggestions for future research were proposed.
278

Semantic view re-creation for the secure monitoring of virtual machines

Carbone, Martim 28 June 2012 (has links)
The insecurity of modern-day software has created the need for security monitoring applications. Two serious deficiencies are commonly found in these applications. First, the absence of isolation from the system being monitored allows malicious software to tamper with them. Second, the lack of secure and reliable monitoring primitives in the operating system makes them easy to be evaded. A technique known as Virtual Machine Introspection attempts to solve these problems by leveraging the isolation and mediation properties of full-system virtualization. A problem known as semantic gap, however, occurs as a result of the low-level separation enforced by the hypervisor. This thesis proposes and investigates novel techniques to overcome the semantic gap, advancing the state-of-the-art on the syntactic and semantic view re-creation for applications that conduct passive and active monitoring of virtual machines. First, we propose a new technique for reconstructing a syntactic view of the guest OS kernel's heap state by applying a combination of static code and dynamic memory analysis. Our key contribution is the accuracy and completeness of our analysis. We also propose a new technique that allows out-of-VM applications to invoke and securely execute API functions inside the monitored guest's kernel, eliminating the need for the application to know details of the guest's internals. Our key contribution is the ability to overcome the semantic gap in a robust and secure manner. Finally, we propose a new virtualization-based event monitoring technique based on the interception of kernel data modifications. Our key contribution is the ability to monitor operating system events in a general and secure fashion.
279

Safety, Security, and Semantic Aspects of Equation-Based Object-Oriented Languages and Environments

Broman, David January 2007 (has links)
<p>During the last two decades, the interest for computer aided modeling and simulation of complex physical systems has witnessed a significant growth. The recent possibility to create acausal models, using components from different domains (e.g., electrical, mechanical, and hydraulic) enables new opportunities. Modelica is one of the most prominent equation-based object-oriented (EOO) languages that support such capabilities, including the ability to simulate both continuous- and discrete-time models, as well as mixed hybrid models. However, there are still many remaining challenges when it comes to language safety and simulation security. The problem area concerns detecting modeling errors at an early stage, so that faults can be isolated and resolved. Furthermore, to give guarantees for the absence of faults in models, the need for precise language specifications is vital, both regarding type systems and dynamic semantics.</p><p>This thesis includes five papers related to these topics. The first paper describes the informal concept of types in the Modelica language, and proposes a new concrete syntax for more precise type definitions. The second paper provides a new approach for detecting over- and under-constrained systems of equations in EOO languages, based on a concept called structural constraint delta. That approach makes use of type checking and a type inference algorithm. The third paper outlines a strategy for using abstract syntax as a middle-way between a formal and informal language specification. The fourth paper suggests and evaluates an approach for secure distributed co-simulation over wide area networks. The final paper outlines a new formal operational semantics for describing physical connections, which is based on the untyped lambda calculus. A kernel language is defined, in which real physical models are constructed and simulated.</p> / Report code: LIU-TEK-LIC-2007:46. On the day of the defence date the status of article IV was: In Progress; The status of article V was: Manuscript.
280

A model to prepare and secure an implementation of a performance measurement system : A case study

Wieslander, Ida January 2008 (has links)
<p>What you do not measure you cannot control and what you do not control you cannot improve, implies that measurement is a pre-requisite for improvements. Especially for Small and Medium Sized Enterprises (SME) an implementation of a Performance Measurement System is mostly critical in terms of the fact that SMEs often is restricted of limited resources, lack of strategic thinking, lack of formal planning, as well as a reactive mentality. A model to prepare and secure an implementation of a performance measurement system at SMEs, has been developed, tested and validated through a single case study at a small enterprise, that is a well-renowned refiner of castings. The model is constituted by phases and steps supporting the advantages as well as over bridges the most common disadvantages for SMEs. The significant advantages on behalf of SMEs; loose structure, informal operating practices and lack of bureaucracy are reinforced by integrating the project and especially the output such as specification of requirements, new routines, improvement groups and forums within the organisation and in turn over bridge the disadvantages of limited resources and lack of formal planning. Identification and prioritisation of strategic objectives is the first step and creates a foundation of a continuous strategic thinking, which often SMEs are lacking, and in turn navigate the company in the right direction in order to maximise the utilisation of resources and consequently increase the profitability.</p> / <p>Vad som inte mäts kan inte kontrolleras och vad som inte kontrolleras kan inte förbättras, indikerar att mätning är en förutsättning för att åstadkomma förbättringar. Implementation av ett driftsuppföljningssystem är särskilt kritiskt på ett små och medelstora företag (SMEs) då dessa ofta är hindrade av begränsade resurser, bristfälligt strategiskt tänkande, otillräcklig formell planering, men även av en reaktiv mentalitet. En modell för att förbereda och säkra en implementation av ett driftsuppföljningssystem har utvecklats, testats och validerats genom en enskild fallstudie på ett mindre företag som bearbetar gjutgods. Modellen består av faser och steg som stödjer fördelarna med SMEs, men samtidigt överbrygger de vanligaste negativa kännetecken för SMEs. Fördelarna; lös struktur, informella operativa aktiviteter och brist på byråkrati är förstärkta genom att integrera projektet och speciellt resultaten såsom kravspecifikation, nya rutiner, förbättringsgrupper och forums i organisationen and därmed även överbrygga nackdelarna såsom begränsade resurser och bristfällig formell planering. Identifikation och prioritering av de strategiska målen är det första steget i modell för att skapa en grund för ett ständigt strategiskt tänkande, som ofta är bristfälligt på SMEs, och till följd därav styra företaget i rätt riktning och därmed maximera utnyttjandet av befintliga resurser och följaktligen öka lönsamheten.</p>

Page generated in 0.11 seconds