131 |
The characteristics of upper level administrators in state departments of education and the relationship of these characteristics to other state variables /Branson, Gary V. January 1974 (has links)
No description available.
|
132 |
An investigation of issues of privacy, anonymity and multi-factor authentication in an open environmentMiles, Shaun Graeme 20 June 2012 (has links)
This thesis performs an investigation into issues concerning the broad area ofIdentity and Access Management, with a focus on open environments. Through literature research the issues of privacy, anonymity and access control are identified. The issue of privacy is an inherent problem due to the nature of the digital network environment. Information can be duplicated and modified regardless of the wishes and intentions ofthe owner of that information unless proper measures are taken to secure the environment. Once information is published or divulged on the network, there is very little way of controlling the subsequent usage of that information. To address this issue a model for privacy is presented that follows the user centric paradigm of meta-identity. The lack of anonymity, where security measures can be thwarted through the observation of the environment, is a concern for users and systems. By an attacker observing the communication channel and monitoring the interactions between users and systems over a long enough period of time, it is possible to infer knowledge about the users and systems. This knowledge is used to build an identity profile of potential victims to be used in subsequent attacks. To address the problem, mechanisms for providing an acceptable level of anonymity while maintaining adequate accountability (from a legal standpoint) are explored. In terms of access control, the inherent weakness of single factor authentication mechanisms is discussed. The typical mechanism is the user-name and password pair, which provides a single point of failure. By increasing the factors used in authentication, the amount of work required to compromise the system increases non-linearly. Within an open network, several aspects hinder wide scale adoption and use of multi-factor authentication schemes, such as token management and the impact on usability. The framework is developed from a Utopian point of view, with the aim of being applicable to many situations as opposed to a single specific domain. The framework incorporates multi-factor authentication over multiple paths using mobile phones and GSM networks, and explores the usefulness of such an approach. The models are in tum analysed, providing a discussion into the assumptions made and the problems faced by each model. / Adobe Acrobat Pro 9.5.1 / Adobe Acrobat 9.51 Paper Capture Plug-in
|
133 |
Evaluation of the food service for adolescent boys in Mogale Child and Youth Care Centre in Gauteng, South Africa, 2012Aluha, Roselidah Anyango January 2013 (has links)
The study was carried out at the Mogale Child and Youth Care Centre (MCYCC) a privately run institution by Bosasa Operations in partnership with the Gauteng Provincial Departments of Social Development and Health and Social Welfare Department. The facility caters for boys in conflict with law aged 14–18 years, who have been legally placed in the facility as a place of safety by court order. It is expected that the findings and recommendations from this study will be useful in improving the food service standards for such institutions. At the time of this study there were 200 adolescents, 137 were awaiting trial, 55 on the diversion programmes and 8 were serving court sentence at the centre.
The cross sectional study evaluated the food service offered at the MCYCC to establish the nutritional adequacy of the food served. Both qualitative and quantitative research methods were used to collect and analyse data. Out of the 200, 144 answered the customer satisfaction questionnaire and 167 took the BMI test. Observations were done in the kitchen to determine the compliance level to the food and safety regulations.
The analytical results of the responses from the self-administered questionnaire on the customer service satisfaction generated by the SAS software revealed reliable results. The probability, (p-value) from the Chi-square (χ2) test showed that there was a significant difference in response the parameters tested including the overall satisfaction. Body Mass Index (BMI) calculations established different anthropometric patterns of which 1.3% adolescents were found to be obese, 28.2% were overweight, 57% had normal weight while 13.5% were found to be underweight. The Foodfinder 3 software used to evaluate the nutrient composition in a 2-week cycle menu revealed that in most cases both the macronutrients and micronutrients in the menus exceeded the recommended daily allowance (RDA) for the adolescent boys. Food safety and hygiene standards results showed that the unit is compliant with the required standards as it scored 86%; it was colour coded Silver and rated as very good.
All the parameters evaluated scored above average percentage rating the customer satisfaction level for the services offered at the MCYCC are as good. Both underweight and overweight adolescents exist among the adolescents at the centre. The weights from the sample food plates exceeded the RDA of the adolescent boys. The centre’s compliance to health and safety regulations was rated as very good. The authorities in the Gauteng Provincial Departments of Social Development and Health and Social Welfare and Bosasa operation management should make use of this evident information to further improve the food service standards for other such institutions. / Dissertation (MSc)--University of Pretoria, 2014. / gm2015 / School of Health Systems and Public Health (SHSPH) / MSc / Unrestricted
|
134 |
Acceptance of technology, quality, and customer satisfaction with information technology department in a community college: a case studyNwankwo, Charles 28 August 2008 (has links)
Not available / text
|
135 |
Acceptance of technology, quality, and customer satisfaction with information technology department in a community college : a case studyNwankwo, Charles, 1961- 24 August 2011 (has links)
Not available / text
|
136 |
Tapping and assessing practical intelligence: by tacit knowledge test.January 1999 (has links)
Lam Hoi-sze Libby. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1999. / Includes bibliographical references (leaves [108-111]). / Abstracts in English and Chinese; questionnaire in Chinese. / Chapter ´ةŒ --- Introduction / Chapter ´ةŒ --- Study --- p.1 / Chapter - --- Methodology / Chapter - --- Results / Chapter - --- Discussion / Chapter ´ةŒ --- Study --- p.2 / Chapter - --- Methodology / Chapter - --- Results / Chapter - --- Discussion / Chapter ´ةŒ --- General Discussion / Chapter ´ةŒ --- Appendices
|
137 |
A new framework considering uncertainty for facility layout problemOheba, Jamal Bashir January 2012 (has links)
In today’s dynamic environment, where product demands are highly volatile and unstable, the ability to design and operate manufacturing facilities that are robust with respect to uncertainty and variability is becoming increasingly important to the success of any manufacturing firm in order to operate effectively in such an environment. Hence manufacturing facilities must be able to exhibit high levels of robustness and stability in order to deal with changing market demands. In general, Facility Layout Problem (FLP) is concerned with the allocation of the departments or machines in a facility with an objective to minimize the total material handling cost (MHC) of moving the required materials between pairs of departments. Most FLP approaches assume the flow between departments is deterministic, certain and constant over the entire time planning horizon. Changes in product demand and product mix in a dynamic environment invalidate these assumptions. Therefore there is a need for stochastic FLP approaches that aim to assess the impact of uncertainty and accommodate any possible changes in future product demands.This research focuses on stochastic FLP with an objective to present a methodology in the form of a framework that allows the layout designer to incorporate uncertainty in product demands into the design of a facility. In order to accomplish this objective, a measure of impact of this uncertainty is required. Two solution methods for single and multi period stochastic FLPs are presented to quantify the impact of product demand uncertainty to facility layout designs in terms of robustness (MHC) and variability (standard deviation). In the first method, a hybrid (simulation) approach which considers the development of a simulation model and integration of this model with the VIPPLANOPT 2006 algorithm is presented. In the second method, mathematical formulations of analytic robust and stable indices are developed along with the use of VIPPLANOPT for solution procedure. Several case studies are developed along with numerical examples and case studies from the literature are used to demonstrate the proposed methodology and the application of the two methods to address different aspects of stochastic FLP both analytically and via the simulation method. Through experimentation, the proposed framework with solution approaches has proven to be effective in evaluating the robustness and stability of facility layout designs with practical assumptions such as deletion and expansion of departments in a stochastic environment and in applying the analysis results of the analytic and simulation indices to reduce the impact of errors and make better decisions
|
138 |
A review of catastrophe planning for management information systems inHong KongChan, Yuk-wah, Eliza., 陳玉華. January 1989 (has links)
published_or_final_version / Business Administration / Master / Master of Business Administration
|
139 |
DC distribution system for data centerJavanshir, Marjan. January 2007 (has links)
published_or_final_version / abstract / Electrical and Electronic Engineering / Master / Master of Philosophy
|
140 |
METHODOLOGY FOR THE OPTIMIZATION OF RESOURCES IN THE DETECTION OF COMPUTER FRAUD.DUNN, THURMAN STANLEY. January 1982 (has links)
A methodology is proposed for optimizing the allocation of resources in the detection of computer fraud. The methodology consists of four major segments. First, a threat assessment is performed. A general threat assessment is provided which relies upon reported incidents of computer fraud. Then, recognizing the limitations of computer fraud reporting, a specific threat assessment technique is provided which is based entirely on the characteristics of a given computer system. Both the general and specific threat assessment techniques use a matrix approach which evaluates and assigns threat values by type of computer fraud and perpetrator. Second, a Detection Quotient is established which measures the effectiveness of computer fraud detection resource allocation for all of the possible combinations of computer fraud types and perpetrators. However, for many computer systems, the large number of possible resource allocation alternatives results in a Combinatorial Dilemma whereby the phenomenally large number of alternatives precludes comprehensive analysis. This leads to the third major segment of the dissertation, a General Solution to the Combinatorial Dilemma which ensures an alternative very near the optimum while evaluating only an extremely small percentage of possible alternatives. Fourth, a Resource Optimization Model is provided which, beginning with the results of the Threat Assessment, iteratively assigns varying levels of computer fraud detection resources to different fraud type and perpetrator combinations. Using the general solution to the Combinatorial Dilemma and the Detection Quotient as a measure of the effectiveness of each combination, the model produces a statistically defensible near optimum allocation of available resources to computer fraud detection. Also provided are the results of the research into reported cases of fraud in the form of a Typology. This Typology combines frequency of occurrence and dollar impact of reported cases of fraud into a measure of vulnerability for various types of fraud and perpetrator. Finally, an overview of investigative techniques and automated tools for evaluating the propriety of computer systems is provided.
|
Page generated in 0.0503 seconds