• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 138
  • 21
  • 20
  • 7
  • 7
  • 5
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 233
  • 233
  • 56
  • 43
  • 37
  • 33
  • 33
  • 32
  • 29
  • 29
  • 28
  • 27
  • 23
  • 23
  • 19
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

Misdade teen vroue in die Gautengprovinsie

Jooste, Thomas Ignatius Muller 01 January 2002 (has links)
The purpose of this research was to describe and explain crimes against women in the Gauteng Province of South Africa. It was conducted by means of a literature review, followed by empirical research, based on police dockets, against the background of Seligman's theory on learned helplessness. The literature review was used to design a research schedule. The schedule was used for data capturing from police dockets from the Crime Information Analysis Centre (QAQ at their Gauteng Regional office in Johannesburg. From this data, a convenience sample, consisting of 303 cases, was compiled. These cases were reported at the charge offices of Pretoria-Moot Villieria, Pretoria-North, Pretoria-West Eersterust and Hillbrow, for the period between 1 January 1997 and 1 March 1998. Finally, recommendations are made for the design of preventative strategies, and suggestions are made for possible future research. / Die doel van hierdie navorsing was om misdade teen vroue in die Gauteng Provinsie van Suid-Afrika te beskryf en te verklaar. Dit is gedoen aan die hand van literatuurstudie, en is uitgebrei met 'n empiriese ondersoek wat op polisiedossiere ebaseer is, teen die agtergrond van Seligman se teorie van aangeleerde hulpeloosheid. Die literatuurstudie is gebruik om 'n skedule te ontwerp. Die navorsingskedule is gebruik vir datavangs uit polisiedossiere. Die polisiedossiere van die Misdaadinligting-Analisesentrum (MIAS) van Gauteng se streekkantoor in Johannesburg is gebruik vir die samestelling van 'n gerieflikheidsteekproef bestaande uit 303 gevalle. Hierdie gevalle kom uit die aanmeldings by die aanklagkantore van Pretoria-Moot/ Villieria, Pretoria-Noord, Pretoria-Wes, Eersterust en Hillbrow, en wel tussen 1 Januarie 1997 en 1 Maart 1998. Ten slotte word aanbevelings vir die ontwerp van voorkomingstrategie gedoen en voorstelle vir moontlike toekomstige navorsing gemaak. / Criminology / M.A. (Criminology)
202

Bulk unsolicited electronic messages (spam) : a South African perspective

Geissler, Michelle Lara 30 November 2004 (has links)
In the context of the Internet, spam generally refers to unsolicited and unwanted electronic messages, usually transmitted to a large number of recipients. The problem with spam is that almost all of the related costs are shifted onto the recipients, and many of the messages contain objectionable content. Spam has become a significant problem for network administrators, businesses and individual Internet users that threatens to undermine the usefulness of e-mail. Globally, spam spiralled to account for over 60% of all e-mail near the end of 2004. It is a problem that costs the global economy billions of dollars a year in lost productivity, anti-spam measures and computer resources. It has forced governments to enact legislation against the problem and it has prompted the development of numerous technical countermeasures. Spam can only be defeated by a combination of legal measures, informal measures (including self regulation and social norms), technical measures and consumer education. Because spam is a relatively recent and evolving problem, the application of various common law mechanisms are explored, including the law of privacy and the law of nuisance. Various constitutional concerns may also arise in the context of spam, and the right to freedom of expression must be balanced against other competing rights and values, including the right to privacy. Comparative legislation is examined, because it is important to recognise trends in spam legislation in other jurisdictions so as to ensure a measure of interoperability with those laws. The practical difficulties in identifying spammers, and the lack of jurisdiction over offshore offenders affect the practical implementation of the current protection offered by the ECT Act. In conclusion, this thesis identifies the need for direct anti-spam legislation in South Africa, and suggests various clauses that will need to be catered for in the legislation. It is submitted that "opt-in" legislation should be preferred over "opt-out" legislation. It is further submitted that a definition of spam should be based on the volume and indiscriminate nature of the e-mail, and not only on whether the communication was commercial. Therefore, a definition of bulk unsolicited e-mail is proposed. / Criminal & Procedural Law / LLD
203

Customer-based brand equity of the major cellphone network service providers amongst principal estate agents in the Gauteng province of South Africa

Mentz, Hendrik 14 September 2011 (has links)
This study investigates the customer-based brand equity of the major cellphone network service providers (Vodacom, MTN and Cell C) amongst principal estate agents registered with the Estate Agency Affairs Board in Gauteng. Secondary research covered the marketing environment of the major service providers. An extensive study of literature on branding, brand management and brand equity measurement was undertaken. An empirical study was conducted. Telephone interviews were used for initial contact and screening. An invitation to participate in the survey, with a link to a questionnaire, was e-mailed to qualified respondents. Cell C users were excluded from the quantitative analysis. There were several significant findings: Vodacom and MTN users are alike in terms of personal and estate agency-related demographics. With the exception of age and gender, the sample fits the stated descriptors of individuals in the LSM seven to LSM ten groups. Cronbach‘s alpha coefficient confirmed a high level of reliability (0.870) for the summated measurement scale developed as an indicator variable of customer-based brand equity and Vodacom and MTN‘s rating on the summated scale did not differ at a statistically significant level. The service provider used proved to be an important driver of loyalty, but overall satisfaction with the cellphone service does not differ statistically significantly between Vodacom and MTN users. Vodacom has established a much more favourable positioning on the brand association statements evaluated. Factor analysis identified five brand association dimensions that should be considered for measurement of brand associations. Multiple regression analysis identified the brand as a product dimension as the best predictor of customer-based brand equity. Vodacom received more favourable brand performance ratings than MTN. Factor analysis identified six brand performance dimensions that should be considered for inclusion when measuring brand performance. Multiple regression analysis identified the easy to use and one-stop-service dimensions as the best predictors of customer-based brand equity. The customer-based brand equity of the user group is moderate (16 out of 25, or 64%). / Business Management / D. Com. (Business Management)
204

The capability maturity model as a criminal justice process improvement paradigm

Doss, Daniel Adrian 07 1900 (has links)
Background: The administrators, managers, and leaders of criminal justice organizations experience a plethora of processes that impact the strategic, tactical, and operational facets of their respective organizations. Sound processes are central to effectively and efficiently managing criminal justice organizations and for facilitating the optimal operations of the organization. Such management characteristics are necessary to render public services towards the goals of deterring crime and maintaining societal order. Administrating and managing criminal justice organizations involves paradigms that favor process improvement and quality of processes. Existing methods include the Compstat paradigm Total Quality Management, business process management, business process improvement, business process reengineering, standards, legislation, policy, and Six Sigma. However, such paradigms not approach process improvement from the unique perspective of process maturity as a foundational basis. Additionally, no solitary foundational basis exists that uniquely addresses organizational process improvement issues, regarding criminal justice entities, from the perspective of evolutionary process maturation through time. This research examines the potential of adapting the Capability Maturity Model Integrated (CMMi) as a foundational process improvement framework among criminal justice organizations. Within the CMMi framework, process improvement begins from a state of random, ad hoc processes and culminates in a state of highly optimized processes. Through time, process maturation occurs through five primary stages sequentially: 1) random, 2) managed, 3) defined/specific, 4) quantitatively managed, and 5) optimized. This research explores the potential of leveraging the CMMi paradigm as a form of organizational process improvement within the criminal justice domain. Scope of the Study: This research investigated the potential for adapting the Capability Maturity Model (Integrated) (CMMi) within the criminal justice domain. A derivative maturity model framework, the Criminal Justice Maturity Model (CJMM), was crafted using the CMMi concept as its foundational premise. A Likert scale survey was implemented to investigate the perceptions of personnel regarding process improvement initiatives and their work settings. This study was constrained to the criminal justice domains of the states of Alabama and Mississippi. Data processing encompassed demographic descriptions of the survey instrument and the received responses, ANOVA, Chi-Square analysis, and the Cronbach Method. Stratifications involved separating the survey responses into classifications of Alabama versus Mississippi entities, urban versus rural entities, and management versus non-management entities. Findings and Conclusions: The conclusions of this research failed to show that all five levels of the maturity model framework appear to be separately perceived among the respondents. Therefore, per each individual stage of the maturity model framework, this research failed to show conclusively that the complete maturity model framework is adaptable among administrative settings in the criminal justice domain and that process maturity issues among respondent settings are addressed via a process maturity framework. Because this research failed to show the perceived characteristics of all five maturity levels of the maturity model framework separately, it is concluded that the criminal justice administrative settings of the respondents do not conform completely to the tenets of the CMMi paradigm. Future studies were recommended to pursue additional approaches of this research project. This study represents an initial starting point from which several future endeavors may be initiated. / Criminology and Security Science / D.Litt. et Phil. (Police Science)
205

Improving the adoption of cloud computing by Small & Medium Scale Enterprise (SMEs in Nigeria

Young, Destiny Assian 08 1900 (has links)
In a traditional business environment, companies set up their organisation’s IT data infrastructure, install their applications and carry out the maintenance and management of their infrastructures. Whereas Cloud computing removes the need for companies to set up own data centers and run enterprise applications. Cloud computing technology provides businesses with the advantage of on-demand access, agility, scalability, flexibility and reduced cost of computing. An appreciable increase is being observed in the acceptance and migration to this new IT model in developing economies. In Nigeria, it has been observed that there is a somewhat unimpressive rate of adoption of Cloud computing by the microfinance operators. This research investigates the reason for the slow adoption of Cloud computing by SMEs in Nigeria with special consideration to the Microfinance subsector and to develop a model for improving the adoption of cloud computing by microfinance organisations. The research was conducted using a qualitative research design method. Interview was the main data collection instrument and data collected was analysed using thematic content analysis method. The analysis of the study revealed that SMEs in Nigeria, with particular reference to microfinance subsector in Akwa Ibom State are yet fully to embrace cloud technology. It was discovered that most of the SMEs studied, has some level of reservation about cloud computing arising from not having appropriate education and enlightenment about the cloud economic offerings and potentials. From the outcome of the research, the researcher identified that most people’s concerns are as a result of lack of knowledge about cloud computing and so the researcher concluded that appropriate enlightenment by industry stakeholders, cloud service providers, cloud enthusiasts and even the government on the risks and overwhelming economic incentives of cloud computing as well as the provision of a monitored free trial services will encourage the adoption of cloud computing by SMEs. / College of Engineering, Science and Technology / M.Tech. (Information Technology)
206

Managing inclusive education at selected special schools in Pietermaritzburg with special reference to the vocational training of learners

Maniram, Radhika 02 1900 (has links)
There has been a paucity of research concerning vocational training of learners with special education needs. The literature study focused on a vocational training and transition planning programme in the United States of America, which could provide as a useful guide to educators and school managers, when implementing vocational training and transitional planning in South Africa. Research was conducted using semi-structured interviews with educators and principals at special schools, observation of learners whilst performing skills training and documentary analysis, to explore whether learners with barriers to learning are receiving skills training that could position them for employment in the open labour market after they exit school. Findings revealed that principals and educators at special schools are faced with challenges in the learner’s microsystem, exosystem and macrosystem, resulting in the inadequate preparation of learners with special education needs for employment in the open labour market. Based on the findings, recommendations in terms of Bronfenbrenner’s Ecological Systems Theory were made, to increase the opportunity for learners who experience barriers to learning, to be engaged in meaningful employment. / Education Management / M. Ed. (Education Management)
207

Information management : best practices in broad base industries / Trivko Pejanovic

Pejanovic, Trivko January 2006 (has links)
Many organisations recognise the importance of Information Management (IM) and are implementing it into the structure and culture of their organisation and the roles of their managers and employees. More and more, organisations are thinking and operating strategically - their very survival depends on information. Information is the lifeblood of an organisation. An essential part of any business strategy is consideration of how information systems strategy supports change. Experts agree that information management has become a competitive necessity for all types of companies. The organisations that will succeed in the global information environment are those that can identify the value of information. One of the biggest problems facing managers today at all levels is the problem of investing in and using technology efficiently, especially Information Technology (IT). Business intelligence enables organisations to make well informed business decisions and thus can be the source of competitive advantages. This is especially true when companies are able to extrapolate information from indicators in the external environment and make accurate forecasts about future trends or economic conditions. Business intelligence becomes a top initiative and investment priority for Chief lnformation Officers (CIOs) and Chief Executive Officers (CEOs). This dissertation addressed the need to identify the most important information management components as a foundation for the more in-depth discussion on information management principles and best practices in broad base industries. The elements of information management that appear the most frequent in the literature study indicate that authors place high priority on the following components: • Information security • Information management governance • IT standardisation • Regulatory requirements for information management • Business intelligence • Virtual collaboration • Management of service outsourcing • Selection of service providers • Project management • Change management • Risk management • Asset management • Knowledge management • Business processes • Balanced scorecard • Benchmarking • Competitive Intelligence • Business partnering. The empirical study was conducted in six phases. The first phase consisted of establishing a framework of information management best practices in broad base industries and the second phase was to develop a preliminary measuring instrument to investigate the perceptions of the sampling population on information management best practices. Phase three consisted of a pilot study in the development of a questionnaire. Phase four was to investigate perceptions of information management best practices in broad base industries. The analysis model was developed based on the criteria evaluated using advanced statistical procedures. The five most important components of information management that were identified were Business processes, Information security, Business intelligence, Risk management, and Information management governance. The best practices for these five most important components of information management were also identified. The five highest ranking best practices were: Virus control implemented; Information management strategy aligned with business goals; Documented business processes; Risk management framework implemented; and Support and training in place. Phase five was to describe the results of the empirical study for information management best practices in broad base industries, Phase six was to compare the perception what the information management best practices are as perceived by companies from broad base industries. The most uniform perception was identified for the information management component 'Business Intelligence'. On average, it was rated almost equally by all participants. On the other hand, there is a significant difference in perception from all industry segments and the whole industry for 'Risk Management'. / Thesis (M.B.A.)--North-West University, Potchefstroom Campus, 2007.
208

The capability maturity model as a criminal justice process improvement paradigm

Doss, Daniel Adrian 07 1900 (has links)
Background: The administrators, managers, and leaders of criminal justice organizations experience a plethora of processes that impact the strategic, tactical, and operational facets of their respective organizations. Sound processes are central to effectively and efficiently managing criminal justice organizations and for facilitating the optimal operations of the organization. Such management characteristics are necessary to render public services towards the goals of deterring crime and maintaining societal order. Administrating and managing criminal justice organizations involves paradigms that favor process improvement and quality of processes. Existing methods include the Compstat paradigm Total Quality Management, business process management, business process improvement, business process reengineering, standards, legislation, policy, and Six Sigma. However, such paradigms not approach process improvement from the unique perspective of process maturity as a foundational basis. Additionally, no solitary foundational basis exists that uniquely addresses organizational process improvement issues, regarding criminal justice entities, from the perspective of evolutionary process maturation through time. This research examines the potential of adapting the Capability Maturity Model Integrated (CMMi) as a foundational process improvement framework among criminal justice organizations. Within the CMMi framework, process improvement begins from a state of random, ad hoc processes and culminates in a state of highly optimized processes. Through time, process maturation occurs through five primary stages sequentially: 1) random, 2) managed, 3) defined/specific, 4) quantitatively managed, and 5) optimized. This research explores the potential of leveraging the CMMi paradigm as a form of organizational process improvement within the criminal justice domain. Scope of the Study: This research investigated the potential for adapting the Capability Maturity Model (Integrated) (CMMi) within the criminal justice domain. A derivative maturity model framework, the Criminal Justice Maturity Model (CJMM), was crafted using the CMMi concept as its foundational premise. A Likert scale survey was implemented to investigate the perceptions of personnel regarding process improvement initiatives and their work settings. This study was constrained to the criminal justice domains of the states of Alabama and Mississippi. Data processing encompassed demographic descriptions of the survey instrument and the received responses, ANOVA, Chi-Square analysis, and the Cronbach Method. Stratifications involved separating the survey responses into classifications of Alabama versus Mississippi entities, urban versus rural entities, and management versus non-management entities. Findings and Conclusions: The conclusions of this research failed to show that all five levels of the maturity model framework appear to be separately perceived among the respondents. Therefore, per each individual stage of the maturity model framework, this research failed to show conclusively that the complete maturity model framework is adaptable among administrative settings in the criminal justice domain and that process maturity issues among respondent settings are addressed via a process maturity framework. Because this research failed to show the perceived characteristics of all five maturity levels of the maturity model framework separately, it is concluded that the criminal justice administrative settings of the respondents do not conform completely to the tenets of the CMMi paradigm. Future studies were recommended to pursue additional approaches of this research project. This study represents an initial starting point from which several future endeavors may be initiated. / Criminology and Security Science / D. Litt. et Phil. (Police Science)
209

Vývoj a limity autorskoprávní ochrany v globální informační společnosti / The Evolution and the Limits of the Copyright Protection in the Global Information Society

Andruško, Alena January 2017 (has links)
CHARLES UNIVERSITY IN PRAGUE Faculty of Law Institute of Copyright, Industrial Property Rights and Competition Law DOCTORAL DISSERTATION The Evolution and the Limits of the Copyright Protection in the Global Information Society ABSTRACT Author: Mgr. Alena Andruško Supervisor: Prof. JUDr. Dr. iur. h. c. Jan Kříž, CSc. Field of Study: Civil Law Theoretical Legal Science Year: 2015 ABSTRACT Copyright law is one of the branches of law that has become, with the development of the Internet, the center of interest for different types of stakeholders in the global information society. With the evolution of "Web 2.0", sometimes called the "Participative Web", represented by user-generated content (UGC), and also with the evolution of peer-to-peer (P2P) file sharing and recently cyberlockers, the effectiveness of copyright protection online has become a problem where solutions can be found only with difficulty. Online copyright infringement is a complex phenomenon with a multiplicity of contributing factors. To see and understand these factors one must not only know and understand the territorial and international legal rules governing copyright, but also know and understand the online ecosystem in which copyright infringement takes place, which is impossible without knowing the history, evolution and technical...
210

Māori Women and Gambling: Every Day is a War Day!

Morrison, Laurie Elena January 2008 (has links)
This study was concerned with the health implications of new forms of gambling such as casinos, pokie machines and internet gambling for Māori women and their families in Auckland and the Bay of Plenty region of Aotearoa (New Zealand). It set out to discover what culturally appropriate services were available and the extent to which Māori women gamblers were utilising them. The literature documenting Māori perceptions of gambling shows that Māori women gamblers and their partner/whānau members and gambling service providers have been little studied previously. These goals translated into the following specific aims: 1) to study how Māori women problem gamblers, their partner or whānau members and key informants perceived gambling, what it meant to them and why they did it; 2) to investigate the consequences of gambling for Māori women, whānau and service providers in dealing with the effects of gambling; 3) to report on how these three groups dealt with the effects of gambling; and 4) to discover what helped to bring about positive changes for the three groups. All of the aims were achieved. A Māori approach (Kaupapa Māori), combined with a naturalistic approach to data collection, was adopted. Qualitative methods are most appropriate to use when working with some Māori, as there is a growing realisation that research with Māori needs to be interactive. A Māori research procedure modelled on the ritual ceremony of encounter (Pōwhiri) provided an appropriate structure for the development and presentation of the research process. The major focus was on the qualitative data obtained from semi-structured interviews in two locations - Rotorua and Auckland. The interviews were conducted with twenty Māori women gamblers, sixteen whānau members including partners and ten interviews with staff involved in services that provided help for problem gamblers. The three interview schedules were based on a number of broad themes and open-ended questions to obtain meaningful descriptive data. The interviews were audio recorded and used to produce transcripts that were then sent back to the participants for feedback. Qualitative data analysis was conducted on the returned documents. The findings from this study revealed major impacts of the women's socio-economic, familial and societal circumstances on gambling behaviour and its effects, which are areas of concern for mental health professionals and researchers. The mythical Māori canoes on which Māori voyaged from their place of origin (Hawaiiki) to Aotearoa, the Waka, provided an appropriate metaphor to present the interrelationship between the pull and push factors toward gambling, and its implications for society. This is illustrated as a spinning waka, Te Waka Hūrihuri. On the other hand, Te Waka Māia (courageous) demonstrates the relationships between the variables that help Māori women gamblers to cope and helpful strategies found to assist them to modify or stop their gambling behaviour. It is recommended that the government limit the proliferation of gaming venues and continue to encourage development of emerging Māori services. Moreover, a coordinated approach is essential, as Māori women gamblers, partners and whānau members need to heal together for positive outcomes for Māori health development in Aotearoa. The main implication of this study is that a wide range of further research into Māori and gambling is required. Recommendations on ways in which the current delivery of services in Rotorua and Auckland could be improved are: That the Ministry of Health purchase services that establish support groups for Māori people with problem gambling and their whānau, and That non-Māori provider services and organisations support the development of emerging Māori services. Heeding the outcome of this research should help improve New Zealand's existing health policy and capacity for Māori women's health development. It should also enrich our understanding of the adaptation patterns of Māori whānau member/s, and thus should have implications, not only for Māori health policies, but also relevance for the wider field of international cross-comparative research on indigenous gambling and mental health issues. Limitations of this study included a small, localised sample that means the findings can only tentatively be generalised to the wider population of Māori women gamblers. Nonetheless, information gained from the study contributes to understanding of the adaptation patterns of Māori women gamblers, their whānau member/s, and those who are trying to help them. It is hoped that the study will make it at least a little less true that every day is a war day for Māori women and their whānau trying to deal with the problem of gambling.

Page generated in 0.054 seconds