• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 60
  • 37
  • 37
  • 17
  • 14
  • 8
  • 8
  • 6
  • 6
  • 5
  • 3
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 241
  • 121
  • 58
  • 37
  • 30
  • 27
  • 26
  • 23
  • 22
  • 22
  • 21
  • 20
  • 18
  • 18
  • 18
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Broken Promises: An Autoethnography of Psychological Contract Breach and Organizational Exit

Herrmann, Andrew F. 06 April 2017 (has links)
No description available.
72

Best Practices to Minimize Data Security Breaches for Increased Business Performance

Kongnso, Fedinand Jaiventume 01 January 2015 (has links)
In the United States, businesses have reported over 2,800 data compromises of an estimated 543 million records, with security breaches costing firms approximately $7.2 million annually. Scholars and industry practitioners have indicated a significant impact of security breaches on consumers and organizations. However, there are limited data on the best practices for minimizing the impact of security breaches on organizational performance. The purpose of this qualitative multicase study was to explore best practices technology leaders use to minimize data security breaches for increased business performance. Systems theory served as the conceptual framework for this study. Fourteen participants were interviewed, including 2 technology executives and 5 technical staff, each from a banking firm in the Northcentral United States and a local government agency in the Southcentral United States. Data from semistructured interviews, in addition to security and privacy policy statements, were analyzed for methodological triangulation. Four major themes emerged: a need for implementation of security awareness education and training to mitigate insider threats, the necessity of consistent organization security policies and procedures, an organizational culture promoting data security awareness, and an organizational commitment to adopt new technologies and innovative processes. The findings may contribute to the body of knowledge regarding best practices technology leaders can use for securing organizational data and contribute to social change since secure organizational data might reduce consumer identity theft.
73

"O, perjured lover, atone! atone!": a legal and cultural history of breach of promise to marry, 1880-1940

Werhnyak, Larissa Marie 15 December 2015 (has links)
Through the 1930s, an American woman suffering a broken engagement had the opportunity to sue her erstwhile suitor for breach of promise to marry. Relying on cultural and legal materials, my dissertation uses this now-obsolete cause of action as a lens through which to examine both shifting norms of gender and class during the period from 1890 to 1940 and the means by which Americans expected legal mechanisms to simultaneously shape and respond to socio-cultural changes.
74

Analysis of flood hazard under consideration of dike breaches

Vorogushyn, Sergiy January 2008 (has links)
River reaches protected by dikes exhibit high damage potential due to strong value accumulation in the hinterland areas. While providing an efficient protection against low magnitude flood events, dikes may fail under the load of extreme water levels and long flood durations. Hazard and risk assessments for river reaches protected by dikes have not adequately considered the fluvial inundation processes up to now. Particularly, the processes of dike failures and their influence on the hinterland inundation and flood wave propagation lack comprehensive consideration. This study focuses on the development and application of a new modelling system which allows a comprehensive flood hazard assessment along diked river reaches under consideration of dike failures. The proposed Inundation Hazard Assessment Model (IHAM) represents a hybrid probabilistic-deterministic model. It comprises three models interactively coupled at runtime. These are: (1) 1D unsteady hydrodynamic model of river channel and floodplain flow between dikes, (2) probabilistic dike breach model which determines possible dike breach locations, breach widths and breach outflow discharges, and (3) 2D raster-based diffusion wave storage cell model of the hinterland areas behind the dikes. Due to the unsteady nature of the 1D and 2D coupled models, the dependence between hydraulic load at various locations along the reach is explicitly considered. The probabilistic dike breach model describes dike failures due to three failure mechanisms: overtopping, piping and slope instability caused by the seepage flow through the dike core (micro-instability). The 2D storage cell model driven by the breach outflow boundary conditions computes an extended spectrum of flood intensity indicators such as water depth, flow velocity, impulse, inundation duration and rate of water rise. IHAM is embedded in a Monte Carlo simulation in order to account for the natural variability of the flood generation processes reflected in the form of input hydrographs and for the randomness of dike failures given by breach locations, times and widths. The model was developed and tested on a ca. 91 km heavily diked river reach on the German part of the Elbe River between gauges Torgau and Vockerode. The reach is characterised by low slope and fairly flat extended hinterland areas. The scenario calculations for the developed synthetic input hydrographs for the main river and tributary were carried out for floods with return periods of T = 100, 200, 500, 1000 a. Based on the modelling results, probabilistic dike hazard maps could be generated that indicate the failure probability of each discretised dike section for every scenario magnitude. In the disaggregated display mode, the dike hazard maps indicate the failure probabilities for each considered breach mechanism. Besides the binary inundation patterns that indicate the probability of raster cells being inundated, IHAM generates probabilistic flood hazard maps. These maps display spatial patterns of the considered flood intensity indicators and their associated return periods. Finally, scenarios of polder deployment for the extreme floods with T = 200, 500, 1000 were simulated with IHAM. The developed IHAM simulation system represents a new scientific tool for studying fluvial inundation dynamics under extreme conditions incorporating effects of technical flood protection measures. With its major outputs in form of novel probabilistic inundation and dike hazard maps, the IHAM system has a high practical value for decision support in flood management. / Entlang eingedeichter Flussabschnitte kann das Hinterland ein hohes Schadenspotential, aufgrund der starken Akkumulation der Werte, aufweisen. Obwohl Deiche einen effizienten Schutz gegen kleinere häufiger auftretende Hochwässer bieten, können sie unter der Last hoher Wasserstände sowie langer Anstaudauer versagen. Gefährdungs- und Risikoabschätzungsmethoden für die eingedeichten Flussstrecken haben bisher die fluvialen Überflutungsprozesse nicht hinreichend berücksichtigt. Besonders, die Prozesse der Deichbrüche und deren Einfluss auf Überflutung im Hinterland und Fortschreiten der Hochwasserwelle verlangen eine umfassende Betrachtung. Die vorliegende Studie setzt ihren Fokus auf die Entwicklung und Anwendung eines neuen Modellierungssystems, das eine umfassende Hochwassergefährdungsanalyse entlang eingedeichter Flussstrecken unter Berücksichtigung von Deichbrüchen ermöglicht. Das vorgeschlagene Inundation Hazard Assessment Model (IHAM) stellt ein hybrides probabilistisch-deterministisches Modell dar. Es besteht aus drei laufzeitgekoppelten Modellen: (1) einem 1D instationären hydrodynamisch-numerischen Modell für den Flussschlauch und die Vorländer zwischen den Deichen, (2) einem probabilistischen Deichbruchmodell, welches die möglichen Bruchstellen, Breschenbreiten und Breschenausflüsse berechnet, und (3) einem 2D raster-basierten Überflutungsmodell für das Hinterland, das auf dem Speiherzellenansatz und der Diffusionswellengleichung basiert ist. Das probabilistische Deichbruchmodell beschreibt Deichbrüche, die infolge von drei Bruchmechanismen auftreten: dem Überströmen, dem Piping im Deichuntergrund und dem Versagen der landseitigen Böschung als Folge des Sickerflusses und der Erosion im Deichkörper (Mikro-Instabilität). Das 2D Speicherzellenmodell, angetrieben durch den Breschenausfluss als Randbedingung, berechnet ein erweitertes Spektrum der Hochwasserintensitätsindikatoren wie: Überflutungstiefe, Fliessgeschwindigkeit, Impuls, Überflutungsdauer und Wasseranstiegsrate. IHAM wird im Rahmen einer Monte Carlo Simulation ausgeführt und berücksichtigt die natürliche Variabilität der Hochwasserentstehungsprozesse, die in der Form der Hydrographen und deren Häufigkeit abgebildet wird, und die Zufälligkeit des Deichversagens, gegeben durch die Lokationen der Bruchstellen, der Zeitpunkte der Brüche und der Breschenbreiten. Das Modell wurde entwickelt und getestet an einem ca. 91 km langen Flussabschnitt. Dieser Flussabschnitt ist durchgängig eingedeicht und befindet sich an der deutschen Elbe zwischen den Pegeln Torgau und Vockerode. Die Szenarioberechnungen wurden von synthetischen Hydrographen für den Hauptstrom und Nebenfluss angetrieben, die für Hochwässer mit Wiederkehrintervallen von 100, 200, 500, und 1000 Jahren entwickelt wurden. Basierend auf den Modellierungsergebnissen wurden probabilistische Deichgefährdungskarten generiert. Sie zeigen die Versagenswahrscheinlichkeiten der diskretisierten Deichabschnitte für jede modellierte Hochwassermagnitude. Die Deichgefährdungskarten im disaggregierten Darstellungsmodus zeigen die Bruchwahrscheinlichkeiten für jeden betrachteten Bruchmechanismus. Neben den binären Überflutungsmustern, die die Wahrscheinlichkeit der Überflutung jeder Rasterzelle im Hinterland zeigen, generiert IHAM probabilistische Hochwassergefährdungskarten. Diese Karten stellen räumliche Muster der in Betracht gezogenen Hochwasserintensitätsindikatoren und entsprechende Jährlichkeiten dar. Schließlich, wurden mit IHAM Szenarien mit Aktivierung vom Polder bei extremen Hochwässern mit Jährlichkeiten von 200, 500, 1000 Jahren simuliert. Das entwickelte IHAM Modellierungssystem stellt ein neues wissenschaftliches Werkzeug für die Untersuchung fluvialer Überflutungsdynamik in extremen Hochwassersituationen unter Berücksichtigung des Einflusses technischer Hochwasserschutzmaßnahmen dar. Das IHAM System hat eine hohe praktische Bedeutung für die Entscheidungsunterstützung im Hochwassermanagement aufgrund der neuartigen Deichbruch- und Hochwassergefährdungskarten, die das Hauptprodukt der Simulationen darstellen.
75

Att bo och arbeta på samma plats : Gränslöst arbete och psykologiska kontrakt

Karlsson, Yvette January 2010 (has links)
To work and live in the same place where ones employer also is the landlord, can create a situation with many special requirements for the individual. Constrains regarding time, space and impact on social life is likely to appear. Based on theory and empirical research about the Boundaryless work and the Psychological contract the purpose of this report is to examine employees who live and work at the same place. This is done by studying the regulation regarding time and space factors and the psychological contracts in expectations and in violation of the psychological contract and the risks associated with this like Locked-in factors. The study includes interviews with managers and employees (n=9). The result shows the difficulties to set standards for the constrains of the factors concerning time and space. The expectations from both employees and the organization goes beyond what can be considered as formal work boundaries. The results are discussed in relation to the risks of stress, health and Lock-in.
76

The Studies in Liability and Compensation for Breach of Contract of International Sale of Goods in China

Wu, Chin-ying 08 September 2009 (has links)
Since the reform and opening up in mainland China from 1978, there is quite a dazzling performance in international trade, it has replaced Japan as the world's third largest trading nation in 2004. She has continued to maintain our largest export market and largest source of trade surplus position. Thus, there is a new term called¡yChiwan¡z, that is, China plus Taiwan ,which Will form a new emerging economies of Asia. Contracts of international sale of goods transaction as a starting point and core. People who contracting a contract with the contracting parties intend to make the realization of their own interests. Whereas a party breaches of contract may make the other party's interests had not been achieved . Compensation for breach of contract is the most common and important method of bearing civil liability now, while damages can be considered as the most important one among those forms of compensation. As a bridge between jurisprudence and practice of compensation for breach of contract, the scope of compensation could be regarded as the core of compensation for breach of contract to certain extent.
77

Remoteness of damage in contract law : an agreement-centred approach / Remoteness of damage in contract law: an agreement-centred approach, with particular reference to English law

Kramer, Adam. January 2000 (has links)
This thesis concerns the legal rules of contractual remoteness: these rules govern the extent of liability that is imposed on a breaching party to compensate for the adverse consequences that the breach causes. It is argued that the allocation of responsibility for such consequences is contained implicitly in the contract: every contract extends beyond its express terms, and the allocation of responsibility for the consequences of breach is one of the matters to which it extends. This latter assertion is supported by the argument that an assumption of responsibility for the consequences of breach is a fundamental part of what it means to make a promise. Hence the rules of remoteness are merely a specialised application of the general legal principles that are used to discover the unexpressed part of an agreement. These legal principles can be seen in operation in the implication of terms and the interpretation of expressed terms.
78

Overtopping Breaching of Rock-Avalanche Dams

Wishart, Jeremy Scott January 2007 (has links)
River blockages formed by rock avalanches appear to pose a higher hazard potential than other landslide dams, given the extreme run-out distances and volumes of rock avalanche deposits. Recent research has identified rock avalanche deposits to have internal sedimentology consisting of a coarse surficial material (carapace) and a finer fragmented interior (body) potentially of critical importance to rock-avalanche dam stability. Physical scale modelling of overtopping failure and breach development in rock avalanche dams was used to quantify the influence of this sedimentology on critical breach parameters, and their prediction using existing embankment dam breach technologies. Results from this study indicate that the time to failure for rock avalanche dams is approximately twice that observed for homogeneous dams due to the armouring properties of the carapace; and that peak discharge is not significantly affected by sedimentology. While application of empirical, parametric, dimensional and physically based models indicated that uncertainty associated with predicted dam break discharges could range from ±19% to ±107%, no modelling technique was able to simulate the armouring phenomenon adequately. Comparison of actual and simulated breach evolution shows linear assumptions of breach depth and width development (as observed in homogeneous dams) to be incorrect. In the context of hazard management, the results suggest that empirical regression relationships should be used for rapid assessment of potential dam break flood magnitude.
79

Psychological contract breach, job satisfaction and turnover intention in the utility industry /|cEugèny Charlene Hennicks

Hennicks, Eugèny Charlene January 2014 (has links)
Globally competitive industries need to keep up with the rigorous technical innovations to ensure that they reach their targets in terms of customer satisfaction. In order to do this, businesses need to ensure that they have the correct skills and capabilities in order to meet their demands. Organisations encounter difficulties as they constantly need to replace lost skills, and once these skills have been replaced, they need to spend additional money to train and equip new employees adequately to perform the jobs that they are employed to do. These days, many companies find themselves in financial turmoil which emerges from large turnover rates. There has been a severe exodus of skilled employees in the utility industry. During the past twelve months, this industry has lost 1 479 critical skills. Scarce skills are expensive to retain and it is important that employee well-being take top priority to keep up with changing labour demographics. This upkeep relates to huge emphasis being placed on customer satisfaction. In order to keep customers happy, companies first need to keep their employees happy. Efforts made by the organisation to improve situational circumstances for its employees, will promote positive individual and organisational outcomes. Two dimensions contribute greatly to a positive employment relationship which is conducive towards promoting positive individual and organisational outcomes, namely a fulfilled psychological contract and fairness in allocating monetary rewards. Money should not be used as a Band-Aid; not everything can be remedied with money. However, money is important, although it is not the most important factor. Fulfilment of the different dimensions of the psychological contract, including, but not limited to opportunities for personal growth and career advancement, and a management-supportive work environment are vital towards establishing and maintaining a positive employment relationship. The aim of the study was to investigate the role of psychological contract breach, job satisfaction and turnover intention in the utility industry and to determine the outcomes thereof. A mixed method approach was used to gather data. In the qualitative study, managers and staff (N = 15) were interviewed and a thematic content analysis was performed. In the second phase of the study, the quantitative part, questionnaires were distributed to employees (N = 251) across all levels of the organisation. The measuring instruments used were the Psychological Contract Inventory, Job Satisfaction Scale and Turnover Intention Scale. The results of Article 1 (Chapter 2) showed that a total of 60% of participants made reference to the importance of money. Emphasis was also placed on other aspects, where 53% of participants made mention of leadership being an important driver of job satisfaction. Other themes also regarded as important toward curbing skills loss were the importance of personal excellence and the need for effective communication as drivers of job satisfaction. Article 2 (Chapter 3) found that a fulfilled balanced psychological contract displayed a strong, positive relationship with job satisfaction and that job satisfaction had a negative impact on turnover intention. These findings support the negative impact of psychological contract breach on job satisfaction and, in relation to this, job dissatisfaction positively impacted turnover intention. It was further found that psychological contract breach of the balanced contract had an indirect positive impact on turnover intent via job satisfaction. Recommendations for future studies were made. / MCom (Labour Relations Management), North-West University, Vaal Triangle Campus, 2014
80

The psychological contract and leadership styles : performance of a semi-professional rugby team / A.J. Grober

Grobler, Alida Jacoba January 2011 (has links)
This dissertation examines the influence of the psychological contract and leadership styles on the perceived performance of semi-professional rugby teams. Little research has connected the psychological contract and sport, and little research has investigated the effect of specific leader behaviours on the performance of sport teams. It was therefore the objective of this dissertation to analyse the content of the psychological contract of rugby team members, and to determine the correlation between the psychological contract and the perceived performance of rugby team members. This dissertation also set out to analyse the content of the preferred leadership style of the team captain and the own leadership style of team members, and to determine the correlation between leadership styles and perceived performance. A longitudinal research design was chosen, along with a non-probability sampling technique. The sample consisted of rugby team members from a prominent rugby-playing university in South Africa. Questionnaires were used to investigate the content of the psychological contract and preferred leadership style and own leadership style, as well as their relationship to perceived performance. The results indicated no correlation between the psychological contract and perceived performance, nor any correlation between leadership styles and perceived performance. A strong correlation, on the other hand, was found between the preferred leadership style of the team captain and the own leadership style of team members. A strong correlation between institute obligations and player obligations was also established. / Thesis (M.Com. (Industrial Sociology))--North-West University, Potchefstroom Campus, 2011.

Page generated in 0.0253 seconds