• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 33
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 49
  • 49
  • 10
  • 9
  • 8
  • 7
  • 7
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

The efficacy of Ruta graveolens 6CH together with ergonomic interventions in the work-place in the treatment of computer vision syndrome

Hassim, Zeenat 30 May 2012 (has links)
M.Tech. / As computers become more common in the work environment, more people are developing symptoms linked to long-term computer use. These include visual and eye-related symptoms as well as musculo-skeletal symptoms (Sheedy & Shaw-McMinn, 2003; Yan, Hu, Chen & Lu, 2007). This collection of symptoms is known as Computer Vision Syndrome (CVS). There are various allopathic modes of treatment available which are limited in terms of their long term use and side effects. Yan and colleagues (2007) indicate that a correctly designed, ergonomically efficient work place plays a significant role in limiting the development of CVS symptoms. Depending on the reasons for CVS and the symptoms associated with it, alternative treatment options may be appropriate (Yan, et al., 2007). Homoeopathy offers alternate treatment, however no extensive research has been done on the homoeopathic treatment of this condition. The aim of this study was to determine the efficacy of the homoeopathic remedy Ruta graveolens 6cH together with ergonomic interventions in the work environment in the treatment of Computer Vision Syndrome. This was done by means of a selection questionnaire (APPENDIX B) and a symptom index form (APPENDIX C), rating the severity and frequency of symptoms. This research study is paired to a related study which investigated the efficacy of Ruta graveolens 6cH without ergonomic interventions. These two studies can later be compared to determine whether the remedy Ruta graveolens 6cH by itself is sufficient in treating computer vision syndrome. This study was approved by the Higher Degrees Committee (HDC48/2009) and the Academic Ethics Committee (AEC50/09) at the University of Johannesburg on the 19 June 2009. Thirty one people joined the study. They were recruited by means of flyers and advertisements (APPENDIX E) placed at the University of Johannesburg as well as corporate companies. Participation was voluntary and by means of informed consent (APPENDIX A). Participants were required to fill in a selection questionnaire (APPENDIX B) to see if they qualified for the study. It was a double-blind placebo controlled study in which participants were placed into one of 2 groups. Both groups were required to change the layout of their work environment in order to ensure ergonomic efficiency at their work station (APPENDIX D). Of the two groups, one was dispensed vi the medicated prescription and the other an identically presented unmedicated prescription. Participants were requested to take the medication twice a day for 4 weeks. They were also required to complete a symptom index form (APPENDIX C) on a weekly basis. These forms were collected by the researcher at the end of the four weeks. There was no risk associated with taking the medication. Participants’ right to privacy was adhered to and they were free to withdraw from the study at any time. Of the 31 people who joined the study, 29 completed the study.
32

The efficacy of Ruta graveolens 6cH in the treatment of computer vision syndrome

Du Toit, Chrisna 04 June 2012 (has links)
M. Tech. / The homoeopathic remedy, Ruta graveolens, is used for the treatment of eyestrain and eye related symptoms caused by the over use of the eyes (Kent, 2006). The aim of this study was to determine the efficacy of the homoeopathic remedy Ruta graveolens 6cH in the treatment of Computer Vision Syndrome. This study can be compared to related studies by means of the symptom index form (Appendix C). This double-blind study included thirty participants between the ages of 20 and 35. The participants had to be regular users of a visual display terminal for a minimum of three hours per day. The participants also had to experience at least two or more eye or vision related symptoms due to VDT use for at least one month prior to the start of the study. During the first consultation, each participant was tested for any refractive errors by a qualified optometrist. The participants were divided into two groups of fifteen each. One group received the remedy, Ruta graveolens 6cH, while the other group received the placebo. The participants were required to take four pillules twice a day for the duration of the study. The data was statistically analysed by means of the Mann-Whitney u Test, Friedman Analysis of Variance by Ranks Test and Wilcoxon Signed-Rank Test. Crosstabs were used to check for confounding variables. The two groups, the placebo and the treatment group were tested against each other. The findings from the data illustrated that in the treatment group there was a statistically significant improvement in the severity of symptoms in seven of the fourteen symptoms over the duration of the study, while five of the fourteen symptoms of the placebo group had a statistically significant improvement in severity over the four week period. Overall the severity of the treatment group had an improvement of 42% compared to the 28% improvement of the placebo group. Both groups showed a reduction of the frequency of symptoms over the duration of the study.
33

A study of South African computer usersʹ password usage habits and attitude towards password security

Friedman, Brandon January 2014 (has links)
The challenge of having to create and remember a secure password for each user account has become a problem for many computer users and can lead to bad password management practices. Simpler and less secure passwords are often selected and are regularly reused across multiple user accounts. Computer users within corporations and institutions are subject to password policies, policies which require users to create passwords of a specified length and composition and change passwords regularly. These policies often prevent users from reusing previous selected passwords. Security vendors and professionals have sought to improve or even replace password authentication. Technologies such as multi-factor authentication and single sign-on have been developed to complement or even replace password authentication. The objective of the study was to investigate the password habits of South African computer and internet users. The aim was to assess their attitudes toward password security, to determine whether password policies affect the manner in which they manage their passwords and to investigate their exposure to alternate authentication technologies. The results from the online survey demonstrated that password practices of the participants across their professional and personal contexts were generally insecure. Participants often used shorter, simpler and ultimately less secure passwords. Participants would try to memorise all of their passwords or reuse the same password on most of their accounts. Many participants had not received any security awareness training, and additional security technologies (such as multi-factor authentication or password managers) were seldom used or provided to them. The password policies encountered by the participants in their organisations did little towards encouraging the users to apply more secure password practices. Users lack the knowledge and understanding about password security as they had received little or no training pertaining to it.
34

The Recognition of Icons Among Four Groups of Computer Users

Henry, Jo-Ann Theresa Juchniewicz 12 1900 (has links)
One idea common in the computer industry today is that by the time a technological innovation reaches the mass market it is already obsolete. News of recent technological developments race quickly through the computer industry, creating large scale competition among various businesses for the dollars of both educational institutions and industries. In an effort to produce sophisticated and powerful software readily accessible to users whose area of expertise is not programming, software developers have increasingly turned toward the simplest form of language and concept representation--the icon. As icons become increasingly sophisticated and their function grows, so will their availability in various interfaces. The number of users who operate them will also increase. Advanced help systems and animation will assist in relieving some difficulties while creating others. In either case, icon recognizability will be a crucial factor for anyone (novice or expert) who will use them. The purpose of this study was to verify whether all users unfamiliar with a graphical user interface (GUI) system, specifically icons, will require assistance with 40' "W those icons that are unrecognizable in either form or function. Based on the results of this study, an icon recognizability does exist among different groups of computer users. This recognizability is based upon the experience of the users and not upon the type of software they may use most often.
35

A CyberCIEGE scenario illustrating multilevel secrecy issues in an air operations center environment

Meyer, Marc K. 06 1900 (has links)
Approved for public release; distribution is unlimited / CyberCIEGE provides an addition to traditional Information Assurance (IA) education in the form of an interactive, entertaining, commercial-grade PC-based computer game. Educational objectives are contained in scenarios that serve to teach particular IA concepts. The details of a scenario are contained in a Scenario Definition File (SDF), which is written in the CyberCIEGE Scenario Definition Language. This language is rich enough to express a range of information security policies and operational data access requirements, resulting in a nearly limitless pool of possible scenarios. This thesis developed a playable scenario illustrating confidentiality protection concepts in an open storage environment modeled after an Air Operations Center. Educational goals include physical protection of high value assets and use of strong authentication policies to protect moderate value assets. The major work of this thesis was designing an SDF to reflect a military information security policy and work flow environment contained in the educational goals. The confirmation of the proper operation of selected aspects of the CyberCIEGE game engine, and the assurance that the SDF confronts the player with the security trade-offs occurred through the application of a testing methodology. The creation of detailed solutions and incorrect gameplay examples constitute this testing process. / Captain, United States Air Force
36

CyberCIEGE scenario illustrating secrecy issues through mandatory and discretionary access control policies in a multi-level security network

LaMore, Robert L. 06 1900 (has links)
Approved for public release, distribution is unlimited / User training in computer and network security is crucial to the survival of modern networks, yet the methods employed to train users often seem ineffective. One possible reason is that users are not fully engaged during these training sessions and thus they tend to forget the lessons being taught. The CyberCIEGE game introduces a new method of training in computer and network security. The player engages in a simulation-based network security game, that reflects real-world security principles. Each time the CyberCIEGE game runs, it loads a Scenario Definition File (SDF) written to teach specific security concepts. This thesis developed such a scenario definition file for the CyberCIEGE game. The educational purpose of the scenario is to illustrate secrecy issues in the context of mandatory and discretionary access control in a multilevel networked environment. The primary work of this thesis was to construct the scenario definition file such that playing the resulting game would achieve this educational purpose. This thesis also resulted in the construction of scenario definition files to test the CyberCIEGE game engine for expected results. These tests resulted in several recommendations for improvement in the game engine. / First Lieutenant, United States Air Force
37

Database training for novice end users : a design research approach : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Information Systems at Massey University, Albany, New Zealand

Blakey, Jeremy Peter January 2008 (has links)
Of all of the desktop software available, that for the implementation of a database is some of the most complex. With the increasing number of computer users having access to this sophisticated software, but with no obvious way to learn the rudiments of data modelling for the implementation of a database, there is a need for a simple, convenient method to improve their understanding. The research described in this thesis represents the first steps in the development of a tool to accomplish this improvement. In a preliminary study using empirical research a conceptual model was used to improve novice end users’ understanding of the relational concepts of data organisation and the use of a database software package. The results showed that no conclusions could be drawn about either the artefact used or the method of evaluation. Following the lead of researchers in the fields of both education and information systems, a design research process was developed, consisting of the construction and evaluation of a training artefact. A combination of design research and a design experiment was used in the main study described in this thesis. New to research in information systems, design research is a methodology or set of analytical techniques and perspectives, and this was used to develop a process (development of an artefact) and a product (the artefact itself). The artefact, once developed, needed to be evaluated for its effectiveness, and this was done using a design experiment. The experiment involved exposing the artefact to a small group of end users in a realistic setting and defining a process for the evaluation of the artefact. The artefact was the tool that would facilitate the improvement of the understanding of data modelling, the vital precursor to the development of a database. The research was conducted among a group of novice end users who were exposed to the artefact, facilitated by an independent person. In order to assess whether there was any improvement in the novices’ understanding of relational data modelling and database concepts, they then completed a post-test. Results confirmed that the artefact, trialled through one iteration, was successful in improving the understanding of these novice end users in the area of data modelling. The combination of design research and design experiment as described above gave rise to a new methodology, called experimental design research at this early juncture. The successful outcome of this research will lead to further iterations of the design research methodology, leading in turn to the further development of the artefact which will be both useful and accessible to novice users of personal computers and database software. This research has made the following original contributions. Firstly, the use of the design research methodology for the development of the artefact, which proved successful in improving novice users’ understanding of relational data structures. Secondly, the novel use of a design experiment in an information systems project, which was used to evaluate the success of the artefact. And finally, the combination of the developed artefact followed by its successful evaluation using a design experiment resulted in the hybrid experimental design research methodology. The success of the implementation of the experimental design research methodology in this information systems project shows much promise for its successful application to similar projects.
38

Work related neck pain amongst university administrative staff

Panwalkar, Shilpa January 2008 (has links)
<p>This study aimed at identifying the factors contributing towards work related neck pain amongst university administrative staff, its impact on everyday life activities and in turn its prevalence. A quantitative descriptive cross sectional study design was used amongst the administrative staff at the University of The Western Cape, South Africa. Data collection was carried out with the help of a questionnaire which was administered by the researcher in person. Data was analysed with both descriptive and inferential statistics using SPSS and SAS for windows. Chi-square test and logistic regression analysis was done. The results of this study revealed a very high prevalence of work related neck pain amongst university administrative staff. </p>
39

Work related neck pain amongst university administrative staff

Panwalkar, Shilpa January 2008 (has links)
<p>This study aimed at identifying the factors contributing towards work related neck pain amongst university administrative staff, its impact on everyday life activities and in turn its prevalence. A quantitative descriptive cross sectional study design was used amongst the administrative staff at the University of The Western Cape, South Africa. Data collection was carried out with the help of a questionnaire which was administered by the researcher in person. Data was analysed with both descriptive and inferential statistics using SPSS and SAS for windows. Chi-square test and logistic regression analysis was done. The results of this study revealed a very high prevalence of work related neck pain amongst university administrative staff. </p>
40

Work related neck pain amongst university administrative staff

Panwalkar, Shilpa January 2008 (has links)
Magister Scientiae (Physiotherapy) - MSc(Physio) / This study aimed at identifying the factors contributing towards work related neck pain amongst university administrative staff, its impact on everyday life activities and in turn its prevalence. A quantitative descriptive cross sectional study design was used amongst the administrative staff at the University of The Western Cape, South Africa. Data collection was carried out with the help of a questionnaire which was administered by the researcher in person. Data was analysed with both descriptive and inferential statistics using SPSS and SAS for windows. Chi-square test and logistic regression analysis was done. The results of this study revealed a very high prevalence of work related neck pain amongst university administrative staff. / South Africa

Page generated in 0.1051 seconds