• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 67
  • 5
  • 4
  • 3
  • 2
  • Tagged with
  • 85
  • 85
  • 85
  • 40
  • 33
  • 27
  • 14
  • 13
  • 13
  • 12
  • 12
  • 12
  • 11
  • 10
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

The licence as a mechanism to improve performance : the case of Cell C

Dippenaar, Jacques Roché 11 1900 (has links)
The licence is a regulatory tool that regulatory use to assist in their regulatory functions. Licences restricts operator’s’ functions, but also serve as a guideline of acceptable conduct because a licence is a legally binding document containing prescribed conditions that the licencee must meet. If the licencee does not comply with these prescribed obligations and requirements, the licence may be revoked or the licencee may be penalized (Bladwin & Cave 1999). However, in order fro the mechanism of issuing a licence to be an effective mechanism of regulation, the regulator needs to regulate effectively in order to ensure that the licencee’s performance is of acceptable standard. The purpose of this study is to investigate the relationship between issuing a licence and the licencee’s performance; to investigate whether the performance indicators, as defined by ICASA, are adequate, and to develop appropriate performance indicators in order to evaluate Cell C’s performance. Issuing a licence to licencee does not guarantee that the performance of the licencee, such as Cell C, will be effective. Thus, the licencee needs to be evaluated. The case study design has been used for this project. The methodology includes in-dept interviews, documentary analysis, and implementation evaluation research. The report concludes that Cell C has met its licence obligations, that licencing is coupled with effective mechanisms to ensure that the licencee complies with performance requirements, but that, in order for the licencee to improve its performance, effective regulatory intervention is needed. / Communication Science / MA (International Communication)
72

Towards a unified fraud management and digital forensic framework for mobile applications

Bopape, Rudy Katlego 06 1900 (has links)
Historically, progress in technology development has continually created new opportunities for criminal activities which, in turn, have triggered the need for the development of new security-sensitive systems. Organisations are now adopting mobile technologies for numerous applications to capitalise on the mobile revolution. They are now able to increase their operational efficiency as well as responsiveness and competitiveness and, most importantly, can now meet new, growing customers’ demands. However, although mobile technologies and applications present many new opportunities, they also present challenges. Threats to mobile phone applications are always on the rise and, therefore, compel organisations to invest money and time, among other technical controls, in an attempt to protect them from incurring losses. The computerisation of core activities (such as mobile banking in the banking industry, for example) has effectively exposed organisations to a host of complex fraud challenges that they have to deal with in addition to their core business of providing services to their end consumers. Fraudsters are able to use mobile devices to remotely access enterprise applications and subsequently perform fraudulent transactions. When this occurs, it is important to effectively investigate and manage the cause and findings, as well as to prevent any future similar attacks. Unfortunately, clients and consumers of these organisations are often ignorant of the risks to their assets and the consequences of the compromises that might occur. Organisations are therefore obliged, at least, to put in place measures that will not only minimise fraud but also be capable of detecting and preventing further similar incidents. The goal of this research was to develop a unified fraud management and digital forensic framework to improve the security of Information Technology (IT) processes and operations in organisations that make available mobile phone applications to their clients for business purposes. The research was motivated not only by the increasing reliance of organisations on mobile applications to service their customers but also by the fact that digital forensics and fraud management are often considered to be separate entities at an organisational level. This study proposes a unified approach to fraud management and digital forensic analysis to simultaneously manage and investigate fraud that occurs through the use of mobile phone applications. The unified Fraud Management and Digital Forensic (FMDF) framework is designed to (a) determine the suspicious degree of fraudulent transactions and (b) at the same time, to feed into a process that facilitates the investigation of incidents. A survey was conducted with subject matter experts in the banking environment. Data was generated through a participatory self-administered online questionnaire. Collected data was then presented, analysed and interpreted quantitatively and qualitatively. The study found that there was a general understanding of the common fraud management methodologies and approaches throughout the banking industry and the use thereof. However, while many of the respondents indicated that fraud detection was an integral part of their processes, they take a rather reactive approach when it comes to fraud management and digital forensics. Part of the reason for the reactive approach is that many investigations are conducted in silos, with no central knowledge repository where previous cases can be retrieved for comparative purposes. Therefore, confidentiality, integrity and availability of data are critical for continued business operations. To mitigate the pending risks, the study proposed a new way of thinking that combines both components of fraud management and digital forensics for an optimised approach to managing security in mobile applications. The research concluded that the unified FMDF approach was considered to be helpful and valuable to professionals who participated in the survey. Although the case study focused on the banking industry, the study appears to be instrumental in informing other types of organisations that make available the use of mobile applications for their clients in fraud risk awareness and risk management in general. / Computing / M. Sc. (Computing)
73

Essays in development macroeconomics

Walker, Sébastien January 2015 (has links)
No description available.
74

Infants' Perceptions of Mothers' Phone Use: Is Mothers' Phone Use Generating the Still Face Effect?

Kildare, Cory A. 05 1900 (has links)
Using a modified still-face procedure the present study explores 3-6-month-old infants' behavioral and physiological responses to mothers' screen distractions during mother-infant interactions. In the modified phone still-face procedure the neutral face of the traditional still face procedure was replaced with mothers' texting on their mobile phones. Infants' cortisol stress responses to mothers' device use were assessed through the collection of 3 infant saliva samples. Infants' behavioral responses including facial expressions, vocalizations, gaze and self-comforting behaviors were also explored. All mother-infant interactions were videoed recorded and coded for analysis. Thirty-four mother-infant dyads participated, average ages for mothers was 29 years and 4.4 months for infants. As predicted, infants demonstrated the changes in affect associated with the still-face effect, with significant differences in positive and negative affect during the play phases and the phone still face phase. As a whole, infants did not respond with increased cortisol responses, however, when individual differences were explored 47% responded with increased stress during mothers' phone distractions. Mother's frequency and attitudes towards device use were also assessed but were unrelated to infant responses. Implications and directions for future research are discussed.
75

Distracted generation (?) : technology use, texting and driving in South Africa

Kgasago, Tshepho Justice January 2017 (has links)
Thesis (M.A. (Communication Studies)) -- University of Limpopo, 2017 / The use of communication technologies has brought changes to our daily ways of doing things. Youth use technology for different purposes at different locations. As technology grows everyday with various advantages, its benefits come along with some disadvantages. Road accidents are one of the major problems that South Africa experiences. The focus of this study was to explore the danger of texting and driving and its potentials for road accidents. This research focused on the negative impact of technology, mainly technological distraction, while driving. Broadly, this research looks at the social and cultural impact of texting and mobility, with specific focus on distracted driving. This study is significant in the social analysis of technology use and distraction; this significance is made more important considering that there is very limited study of this social issue in South Africa. The always-available communication culture (such as texting while driving) should be viewed as a problematic phenomenal. For data collection, the researcher conducted a survey with adults and youth drivers to explore the perceptions and attitudes of drivers towards cell phone use, texting and driving. The researcher also conducted roadside observations of drivers to investigate the occurrence of distracted driving due to technology use, and interviews were conducted with Traffic Officers to share their professional experience on observing incidences of texting and driving. The study reveals that technology use, texting and driving is a common problem among young drivers, while adults tend to be more careful and engage less in this activity. Aspect of the findings of the study shows that 60% of drivers report that they have sent a text while driving. Moreover, the study explores ways of curbing cell phone use texting and driving on South African roads. There should be more research on distracted driving and technology use, so that more suggestions on how to curb technology use while driving can be offered
76

Independent component analysis based interference reduction in cellular systems with co-channel interference

Kostanic, Ivica Nikola 01 April 2003 (has links)
No description available.
77

Análise de eficiência energética para algumas redes sem fio de curto e de longo alcance

Kakitani, Marcos Tomio 01 August 2014 (has links)
CAPES / Neste trabalho é realizada a análise da eficiência energética para algumas redes sem fio de curto alcance, como as redes de sensores sem fio, e algumas redes sem fio de longo alcance, como as redes de telefonia celular. Na análise de sensores sem fio são empregados esquemas de transmissão cooperativos e não-cooperativos, considerando que um canal de retorno pode estar disponível ou não. Para a análise de redes celulares, considera-se o uso de técnicas de transmissão com múltiplas antenas, modelos realistas de consumo de potência, além de um modelo de custos para a análise financeira de diferentes projetos de redes. São consideradas nas análises do desempenho de eficiência energética restrições como uma probabilidade de outage e uma vazão fim-a-fim alvos ao sistema. Os resultados obtidos indicam os esquemas de transmissão e projetos de redes mais eficientes para diferentes condições. Além disso, o planejamento dos direcionamentos para os trabalhos futuros é apresentado. / The energy efficiency analysis for some short-range wireless networks, such as wireless sensor networks, and for some long-range wireless networks, such as cellular networks is performed in this work. For the wireless sensor networks analysis, non-cooperative and cooperative transmission schemes (considering that a return channel is available or not) are employed. Multiple antennas transmission schemes, realistic power consumption models, and a cost model for different system designs are considered for the cellular networks analysis. We consider that the system is under constraints such as a target end-to-end outage probability and a target end-to-throughput. The results show the most efficient transmission schemes and network designs under different system conditions. The future works plans are also detailed.
78

Análise de eficiência energética para algumas redes sem fio de curto e de longo alcance

Kakitani, Marcos Tomio 01 August 2014 (has links)
CAPES / Neste trabalho é realizada a análise da eficiência energética para algumas redes sem fio de curto alcance, como as redes de sensores sem fio, e algumas redes sem fio de longo alcance, como as redes de telefonia celular. Na análise de sensores sem fio são empregados esquemas de transmissão cooperativos e não-cooperativos, considerando que um canal de retorno pode estar disponível ou não. Para a análise de redes celulares, considera-se o uso de técnicas de transmissão com múltiplas antenas, modelos realistas de consumo de potência, além de um modelo de custos para a análise financeira de diferentes projetos de redes. São consideradas nas análises do desempenho de eficiência energética restrições como uma probabilidade de outage e uma vazão fim-a-fim alvos ao sistema. Os resultados obtidos indicam os esquemas de transmissão e projetos de redes mais eficientes para diferentes condições. Além disso, o planejamento dos direcionamentos para os trabalhos futuros é apresentado. / The energy efficiency analysis for some short-range wireless networks, such as wireless sensor networks, and for some long-range wireless networks, such as cellular networks is performed in this work. For the wireless sensor networks analysis, non-cooperative and cooperative transmission schemes (considering that a return channel is available or not) are employed. Multiple antennas transmission schemes, realistic power consumption models, and a cost model for different system designs are considered for the cellular networks analysis. We consider that the system is under constraints such as a target end-to-end outage probability and a target end-to-throughput. The results show the most efficient transmission schemes and network designs under different system conditions. The future works plans are also detailed.
79

Mobile phones interaction techniques for second economy people

Edim, Azom Emmanuel January 2010 (has links)
Second economy people in developing countries are people living in communities that are underserved in terms of basic amenities and social services. Due to literacy challenges and user accessibility problems in rural communities, it is often difficult to design user interfaces that conform to the capabilities and cultural experiences of low-literacy rural community users. Rural community users are technologically illiterate and lack the knowledge of the potential of information and communication technologies. In order to embrace new technology, users will need to perceive the user interface and application as useful and easy to interact with. This requires proper understanding of the users and their socio-cultural environment. This will enable the interfaces and interactions to conform to their behaviours, motivations as well as cultural experiences and preferences and thus enhance usability and user experience. Mobile phones have the potential to increase access to information and provide a platform for economic development in rural communities. Rural communities have economic potential in terms of agriculture and micro-enterprises. Information technology can be used to enhance socio-economic activities and improve rural livelihood. We conducted a study to design user interfaces for a mobile commerce application for micro-entrepreneurs in a rural community in South Africa. The aim of the study was to design mobile interfaces and interaction techniques that are easy to use and meet the cultural preferences and experiences of users who have little to no previous experience of mobile commerce technology. And also to explore the potentials of information technologies rural community users, and bring mobile added value services to rural micro-entrepreneurs. We applied a user-centred design approach in Dwesa community and used qualitative and quantitative research methods to collect data for the design of the user interfaces (graphic user interface and voice user interface) and mobile commerce application. We identified and used several interface elements to design and finally evaluate the graphical user interface. The statistics analysis of the evaluation results show that the users in the community have positive perception of the usefulness of the application, the ease of use and intention to use the application. Community users with no prior experience with this technology were able to learn and understand the interface, recorded minimum errors and a high level of v precision during task performance when they interacted with the shop-owner graphic user interface. The voice user interface designed in this study consists of two flavours (dual tone multi-frequency input and voice input) for rural users. The evaluation results show that community users recorded higher tasks successes and minimum errors with the dual tone multi-frequency input interface than the voice only input interface. Also, a higher percentage of users prefer the dual tone multi-frequency input interface. The t-Test statistical analysis performed on the tasks completion times and error rate show that there was significant statistical difference between the dual tone multi-frequency input interface and the voice input interface. The interfaces were easy to learn, understand and use. Properly designed user interfaces that meet the experience and capabilities of low-literacy users in rural areas will improve usability and users‟ experiences. Adaptation of interfaces to users‟ culture and preferences will enhance information services accessibility among different user groups in different regions. This will promote technology acceptance in rural communities for socio-economic benefits. The user interfaces presented in this study can be adapted to different cultures to provide similar services for marginalised communities in developing countries
80

Quadri-dimensional approach for data analytics in mobile networks

Minerve, Mampaka Maluambanzila 10 1900 (has links)
The telecommunication market is growing at a very fast pace with the evolution of new technologies to support high speed throughput and the availability of a wide range of services and applications in the mobile networks. This has led to a need for communication service providers (CSPs) to shift their focus from network elements monitoring towards services monitoring and subscribers’ satisfaction by introducing the service quality management (SQM) and the customer experience management (CEM) that require fast responses to reduce the time to find and solve network problems, to ensure efficiency and proactive maintenance, to improve the quality of service (QoS) and the quality of experience (QoE) of the subscribers. While both the SQM and the CEM demand multiple information from different interfaces, managing multiple data sources adds an extra layer of complexity with the collection of data. While several studies and researches have been conducted for data analytics in mobile networks, most of them did not consider analytics based on the four dimensions involved in the mobile networks environment which are the subscriber, the handset, the service and the network element with multiple interface correlation. The main objective of this research was to develop mobile network analytics models applied to the 3G packet-switched domain by analysing data from the radio network with the Iub interface and the core network with the Gn interface to provide a fast root cause analysis (RCA) approach considering the four dimensions involved in the mobile networks. This was achieved by using the latest computer engineering advancements which are Big Data platforms and data mining techniques through machine learning algorithms. / Electrical and Mining Engineering / M. Tech. (Electrical Engineering)

Page generated in 0.1119 seconds