• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 19
  • 10
  • 5
  • 4
  • 4
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 61
  • 8
  • 7
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

A Study of Nurses¡¦ Lifelong Learning Behavioral Intention and Satisfaction with Lifelong Learning Passport at a Medical Center

Chen, Hsiang-lan 25 July 2005 (has links)
The research was conducted by stratified random sampling. A structural questionnaire on the basis of the Theory of Planned Behavior (TPB) is designed as study instrument for data collection in this research aimed to study the influential factors on the lifelong learning (LLL) behavioral intention of nursing staff and the satisfaction with LLL passport. Seven hundreds and fifty questionnaires were distributed and 451 copies returned, which made up 60.13% of returning rate. Among the returned questionnaires, 433 were effective samples and returning rate of returning samples was 57.73%. Collected data were computed by SPSS/PC10.0. Computing results shown that average age of subjects was 30.7 and average working seniority of them was 9 years. Research results indicated that there was a positive attitude (with 70.44% of support) towards LLL behavioral intention and 65.75% of overall satisfaction of the implementation of LLL passport. Results also found that, among all of the factors, the participants¡¦ age, working seniority, number of children, job position, educational background, attitude towards LLL, perceived behavioral control, and subjective norm of environmental support including support from administrators, overcoming obstacles from family, support from colleagues and families, and backup from working shift table and manpower positively correlated with their LLL behavioral intention(p<.01). Nevertheless, attribute of working unit was found to have negative correlation with LLL behavioral intention(p<.01). While participants¡¦ job position, educational background, attitude towards LLL, perceived behavioral control, and subjective norm of environmental support consisting of support from nursing unit and administrators, overcoming obstacles from family, and support from colleagues and families indicated positive correlations with satisfaction with LLL passport(p<.01), attribute of working unit revealed negative correlation(p<.01). The above results have verified and echoed Ajzen¡¦s (1985) Theory of Planned Behavior (TPB). The theory was to evaluate one¡¦s behavioral intention based on one¡¦s attitude, perceived behavioral control, and subjective norm. In this study, the perceived behavioral control has the highest influence (84.19%). In addition, there was a positive correlation between nursing staff¡¦s LLL behavioral intention and their satisfaction with LLL passport. Furthermore, by using regression analysis, the results shown that factors such as ¡§support from colleagues and families¡¨, ¡§support from nursing unit and administrators¡¨, and ¡§backup from working shift table and manpower¡¨ could be used as predictors to LLL internal behavioral intention and satisfaction with LLL passport. The overall prediction variance of these three factors reached 34% and ¡§support from colleagues and families¡¨ was the highest (29.5%) among all. In conclusion, except factor of personal characteristics, if working shift and manpower factors could be overcome when nursing staffs are participating in LLL activities, and meanwhile with support of colleagues, families, and administrators, the LLL behavioral intention and satisfaction with LLL passport could be enhanced. The researcher suggested that the results of this study could be used by pertinent units and nursing administrators to build a sound human resources system, establish a learning organization, propel incessant professional development, and help promote nursing staff¡¦s professional accomplishments and competition.
12

Authentifizierungs- und Informationsdienst

Wegener, Jens 27 September 2004 (has links) (PDF)
Es werden Systeme zur Realisierung einer einheitlichen Authentifizierung von Nutzern im Hinblick auf WWW-Anwendungen an der Technischen Universtät Chemnitz und der damit verbundenen Übermittlung von Nutzerdaten untersucht. Shibboleth wird als ein prinzipiell mögliches System zur Lösung dieser Aufgabe in Form eines Tests näher betrachtet.
13

Varianten der Exilerfahrungen in Bertolt Brechts Flüchtlingsgesprächen / The Exile Experience in Bertolt Brecht's "Flüchtlingsgespräche"

JAVORSKÁ, Pavla January 2011 (has links)
The main topic of this diploma thesis is the Exile Experience in Bertolt Brecht?s Flüchtlingsgespräche. On the background of political and social change this thesis deals with the question of exile identity as well as with the relationship to home, in this case Germany. Further on, there is an analysis of the boundary and virtue motif. Finally, this diploma thesis deals with the change in the use of language and analyses images of exile life in the time of World War Two.
14

Securing a wireless local area network : using standard security techniques

Ekström, Dan January 2003 (has links)
Wireless equipment offers several possibilities which make it more attractive than the wired alternative. Meetings or temporary office spaces could be assigned with less consideration of the presence of permanent networking facilities. It also makes it possible for users to create ad-hoc networks simply by being within a certain range of each other, which facilitates information sharing. Since information is broadcasted in the air, it also requires stringent security measures. Vendors of wireless equipment have their non-standard security solutions which lock-in the acquirer. For this purpose I study standard security schemes which could be applied independent of the wireless device manufacturer. The techniques that I have chosen are IPSec, Kerberos and MS Passport. The study describes each technique from the perspectives of manageability, security, performance, compatibility, cost and ease of implementation. The result is a comparison of the studied techniques. I conclude with a recommendation to use a combination of IPSec and Kerberos to enhance the security of a wireless local area network and a reservation towards MS Passport.
15

Vývojové trendy ve světovém a českém pojišťovnictví / Developing trends influencing world insurance market and Czech insurance market

Mišičková, Daniela January 2009 (has links)
Today's globalization leads to a wide range of new developing trends influencing the insurance market. The main one is a variance in the character of risks. The generation of new threats means for insurers to face up a difficultness with an identification of risks and a prediction of future damages. Solutions of a catastrophic impact of damages are hidden in an alternative transfer of risks and a higher level of assurance. The treat of longevity has its own impact, too. Demographic shock caused by a strain of population has turned people in advanced western markets to life-insurance. Mainly, because of a current insufficient set up of pensions systems, people has searched a new possibility how to insure their post-active life. It has enabled a development of life-insurance products focusing on individual clients' needs and providing several components of flexibility and variability. As a next globalization push, I cannot omit concentration and consolidation ongoing nowadays on the insurance market. Rise of giant conglomerates can be seen in the accent of cost reduction, diversification of risks and using enormous financial power. Nevertheless, the main impulse has risen from the still changing clients' needs with the necessity of obtaining complex financial service. Last but not least, I would like to mention the implementation of a regulatory project Solvency II accompanying by IFRS in the field of the insurance market. Their objectives are a reduction of information asymmetry, a higher stability of the insurance market and transparency and comparability of insurers' financial reporting leading to higher clients' protection.
16

Bezpečnost technologie RFID / Security of the RFID Technology

Bořutík, Stanislav January 2013 (has links)
This paper is about security of the RFID systems, attacks on them and countermeasures. Attack to obtain secret key from Mifare Classic card was implemented. Options for eavesdropping RFID communication, security of the NFC technology and biometric passports are descibed too.
17

Studie sanace vybrané stokové sítě / The study of selected rehabilitation of sewer network

Lžičař, Jakub January 2016 (has links)
The diploma thesis deals with sewage systems, evaluation of their technical conditions and various methods of sewage system reconstruction. First chapters provide theoretical background for sewage system reconstruction and contains general information about sewage systems and basic terminology. Next chapters describe the theoretical procedure of elaboration of proposal of existing sewage system remediation including the evaluation of technical conditions of sewage system and the evaluation of individual technical indicators. Then, individual methods of sewage system reconstruction are described. The second part of diploma thesis deals with the case study of sewage system in the village of Mikulovice. The case study is elaborated according to procedure specified in the theoretical part of diploma thesis. The case study includes the passportisation of sewage system and the evaluation of technical conditions of three selected sections. On the grounds of discovered defects, the methods of sewage system reconstruction are designed. Finally, each section of sewage system is evaluated and optimal method for its reconstruction is selected.
18

Föderiertes Identitätsmanagement

Hübner, Uwe 27 April 2004 (has links)
Identities should be established independent of limitations by organization or application. We consider mobile and/or remote users and applications. Essential parts are centralized or distributed identity management systems. / Workshop "Netz- und Service-Infrastrukturen" Wünschenswert ist die Gültigkeit von Identitäten über Organisations- bzw. Applikationsgrenzen hinweg. Dabei werden mobile/entfernte Nutzer und Anwendungen betrachtet. Kernstück bilden zentrale oder verteilte Identitätsverwaltungen.
19

Genealogická štúdia vývoja pasu a jeho používanie na území Slovenskej republiky / Genealogical study of the development of the passport and its use on the territory of the Slovak Republic

Lanková, Janka January 2018 (has links)
Genealogical study of the development of the passport and its use on the territory of the Slovak Republic Author: Bc. Janka Lanková University: Charles University in Prague Thesis Advisor: PhDr. Sarah Komasová Place, year: Prague, 2018 Number of pages: 66 pages Academic Degree: Master degree (Mgr.) Key words: passport, Slovak Republic, development, security, panopticon Abstract The thesis analyzes fundamental functions of passport and its development. Specifically, it elaborates on how passports are used in practice, their symbolism, and mainly what is the link between passport and security. Theory of a significant French philosopher, Michel Foucault, serves as lens the issue is looked through. In other words, the research considers Foucault's theory portrayed in "Discipline and Punish: The Birth of the Prison" as one of the main ideas that has led to the maintenance of order by the sense of constant surveillance. Therefore, primary objective of this thesis is to investigate how passport as the document has developed in the territory of the current Slovak Republic, which of its qualities have changed over time, and why the passport is highly relevant and significant for society as well as a legal system. Michel Foucault claims human nature is conditioned to a better self-reflection when it is under the...
20

Integrating biometric authentication into multiple applications

Breedt, Morne 28 August 2007 (has links)
The Internet has grown from its modest academic beginnings into an important, global communication medium. It has become a significant, intrinsic part of our lives, how we distribute information and how we transact. It is used for a variety of purposes, including: banking; home shopping; commercial trade - using EDI (Electronic Data Interchange); and to gather information for market research and other activities. Owing to its academic origins, the early developers of the Internet did not focus on security. However, now that it has rapidly evolved into an extensively used, global commercial transaction and distribution channel, security has become a big concern. Fortunately, the field of information security has started to evolve in response and is fast becoming an important discipline with a sound theoretical basis. The discipline views the twin processes of identification and authentication as crucial aspects of information security. An individual access attempt must be identifiable prior to access being authorised otherwise system confidentiality cannot be enforced nor integrity safeguarded. Similarly, non-denial becomes impossible to instigate since the system is unable to log an identity against specific transactions. Consequently, identification and authentication should always be viewed as the first step to successfully enforcing information security. The process of identification and authorisation is, in essence, the ability to prove or verify an identity. This is usually accomplished using either one or a combination of the following three traditional identification techniques: something you possess; something you know; or something you are. A critical consideration when designing an application is which identification method, or combination of methods, from the three described above to use. Each method offers its own pros and cons and there are many ways to compare and contrast them. The comparison made in this study identifies biometrics as the best solution in a distributed application environment. There are, however, two over-arching hindrances to its widespread adoption. The first is the environment’s complexity - with multiple applications being accessed by both the public and the private sectors - and the second is that not all biometrics are popular and no single method has universe appeal. The more significant hindrance of the two is the latter, that of acceptance and trust, because it matters little how good or efficient a system is if nobody is willing to use it. This observation suggests that the identification system needs to be made as flexible as possible. In a democratic society, it could be argued that the best way of ensuring the successful adoption of a biometric system would be to allow maximum freedom of choice and let users decide which biometric method they would like to use. Although this approach is likely to go a long way towards solving the acceptance issue, it increases the complexity of the environment significantly. This study attempts to solve this problem by reducing the environment’s complexity while simultaneously ensuring the user retains maximum biometric freedom of choice. This can be achieved by creating a number of central biometric repositories. Each repository would be responsible for maintaining a biometric template data store for a type of biometric. These repositories or “Biometric Authorities” would act as authentication facilitators for a wide variety of applications and free them from that responsibility. / Dissertation (MSc (Computer Engineering))--University of Pretoria, 2005. / Electrical, Electronic and Computer Engineering / MSc / unrestricted

Page generated in 0.079 seconds