• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 211
  • 86
  • 61
  • 46
  • 27
  • 18
  • 15
  • 15
  • 9
  • 6
  • 6
  • 3
  • 3
  • 3
  • 3
  • Tagged with
  • 614
  • 179
  • 139
  • 105
  • 68
  • 57
  • 56
  • 56
  • 56
  • 49
  • 48
  • 45
  • 44
  • 42
  • 40
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

Emergency communications management : analysis and application

Sherbert, Nicole Elizabeth 24 November 2010 (has links)
Adopted in 2003, the National Incident Management System is the nation’s first standardized management system unifying the actions of all levels of governments during a large-scale emergency response. It sets the standard for interagency coordination and communication in the event of an emergency. This professional report seeks to produce a working, NIMS-compliant emergency communication plan for the City of Austin, Texas. The report begins with an explanation of NIMS, focusing on the national protocols for interagency communication and public information. It then presents a case study of emergency communications in practice, examining two firestorms in San Diego County, California that occurred four years apart – prior to and after the County’s implementation of NIMS communications protocols. The report synthesizes best practices in emergency communications – from both NIMS research and the San Diego case study – to create the City of Austin Public Information and Emergency Communication Plan, an operational guide that fully utilizes the tools and organizational structure of all City departments, including the City’s Communications and Public Information Office. / text
132

Vaccination av förskolebarn som inte vill medverka : En kritisk incident studie / Vaccination of preschoolers who resist vaccination : A Critical Incident study

Bjerkander, Matteus, Emanuelsson, Rebecca January 2013 (has links)
Vaccination är en av de mest kostnadseffektiva åtgärderna inom sjukvården. Sveriges vaccinationsprogram innefattar tio sjukdomar och barnets femte dos ges vid fem års ålder. Barn i förskoleåldern befinner sig i ett utvecklingsstadium vilket kan försvåra vaccination. Tidigare studier beskriver svårigheter och den stress sjuksköterskor upplever i samband med vaccination av barn, kunskapsbrist finns däremot kring hur barnen bör hanteras. Syftet med studien var att utifrån betydelsefulla händelser beskriva barnhälsovårdssköterskans (BHVsköterskans) erfarenheter och agerande vid vaccination av förskolebarn som inte vill medverka. Studien utgick från kritisk incident teknik (CIT). Datainsamlingen utfördes i ett landsting i södra Sverige där elva BHV-sköterskor intervjuades. Intervjuerna transkriberades och analyserades. Etiska överväganden gjordes utifrån gällande riktlinjer. I resultatet framkom ett huvudområde avseende BHV-sköterskans erfarenheter, BHV-sköterskans observationer vid vaccination. Två huvudområden framkom angående BHV-sköterskans agerande: BHVsköterskan främjar vaccination och BHV-sköterskan beslutar kring genomförande av vaccination. Slutsatser och implikationer visar att interaktion mellan förskolebarn, föräldrar och BHV-sköterskan är viktigt och leder till en delaktighet och positiva erfarenheter av vaccination. Förslag på praktiskt agerande framkommer vilket kan främja och underlätta vaccination av förskolebarn. / Vaccination is one of the most cost-effective actions in health care. The program for vaccination in Sweden includes ten diseases and the fifth dose is given when children are five years old. Preschoolers are in a development stage that makes vaccination more difficult. Studies describe the difficulties nurses experience in relation to vaccination of children; lack of knowledge is experienced about procedures to handle the situations. The aim of the study was to describe critical incidents by the Primary Child Health Care (PCHC) nurse’s descriptions and actions during vaccination of preschoolers who resist vaccination. Critical Incident Technique was used during the study. Data collection was made in a county council in the south of Sweden. Eleven PCHC nurses were interviewed. The interviews were transcribed and analysed. Ethical considerations based on current guidelines were made. Results revealed one main area about PCHC nurse’s descriptions: The PCHC nurses observations at vaccination. Two main areas were revealed about PCHC nurse’s actions: The PCHC nurse promotes vaccinations and the PCHC nurse makes a decision about implementation of the vaccinations. Conclusions clarify the importance of interaction between preschoolers, parents and the PCHC nurses leading to participation and positive experiences of vaccination. Suggestions for practical action reveal to promote and facilitate vaccination of preschooler.
133

Kravställning på Incidenthanteringssystem / Requirements definition for an Incident Management System

Ahlqvist, Petter, Vagiström, Johan January 2015 (has links)
Användandet av IT relaterade tjänster har ökat kraftigt de senaste åren och visar inga tecken på att avstanna. Men i takt med att användningen ökar så ökar även riskerna, för vad händer egentligen när de IT-tjänster som så många företag och privatpersoner förlitar sig på plötsligt fallerar eller på annat sätt blir oåtkomliga? För att skydda sig mot sådana scenarier så blir det allt vanligare bland företag som driver IT-tjänster att använda sig incidenthantering, vars syfte är att genom fördefinierade processer återställa IT-tjänster till fungerande läge när en incident väl inträffar. För att implementera en incidenthanteringsprocess är det vanligt att verksamheter använder någon form av ramverk eller metod för att underlätta och effektivisera arbetet, i skrivande stund heter de mest använda ramverken ITIL och COBIT. Det är mycket vanligt att en incidenthanteringsprocess i en verksamhet bygger på någon form av system eller applikation vars syfte är att underlätta och effektivisera hanteringen av incidenter, ett sådant system benämns ofta som incidenthanteringssystemet. Trots att ramverk som ITIL och COBIT är använda i stor utsträckning världen över så uppstår det ett problem i att de båda saknar fokus på incidenthanteringssystemet och vad ett sådant system skall klara av. För när ramverken inte tar upp en sådan central del av incidenthanteringsprocessen så innebär det att den implementerande verksamheten själva måste lägga tid och resurser på att reda ut hur ett sådant system skall fungera. Denna studie adresserar problemet med att de vanligast använda ramverken för incidenthantering inte behandlar det, för processen, så centrala incidenthanteringssystemet genom att undersöka och besvara följande forskningsfrågor. Vilka implicita och explicita krav bör ett incidenthanteringssystem uppfylla?  Vilka krav på incidenthanteringssystemet går att utläsa från de mest använda ramverken för incidenthantering?  Hur matchar de framtagna kraven de krav som ställts av en verksamhet ur näringslivet? Denna studie riktar sig framförallt till de verksamheter eller individer som anser sig ha nytta av en sammanställning av de krav som ett incidenthanteringssystem bör uppfylla och kan fungera som ett stöd vid implementering eller inköp av ett nytt incidenthanteringssystem. Genom att identifiera kraven som ställs på ett incidenthanteringssystem utifrån de mest använda ramverken för incidenthantering så bidrar studien med resurser för implementationen av nämnt system drastiskt minskar. Samt genom att presentera ett konkret exempel, fallstudien, och jämföra det med kraven från ramverken bidrar studien med en referenspunkt för verksamheter att utgå ifrån när de implementerar eller köper ett nytt incidenthanteringssystem. / The use of IT-related services has increased massively over the past years and it shows no signs to stop. But alongside the usage increasing the risks also increases, because what will happen when the IT-services that so many rely upon suddenly cease to function, or in other ways become inaccessible? To protect against such scenarios it is increasingly more common for IT-service businesses to use incident management, whose purpose is to recover IT-services to their functional state, using predefined processes, should an event occur. It is common for IT-service businesses when implementing an incident management process to use some kind of framework or method to facilitate and streamline its work process, and as of writing this paper, the most used frameworks are ITIL and COBIT. It is very common for an IT-service business that in the incident management process develop a system or application whose purpose is to facilitate and streamline the incident management, and these are commonly referred to as Incident Management Systems. Even though ITIL and COBIT being widely used worldwide, there are some weaknesses in them, regarding Incident Management Systems, since both of the frameworks lack focus and depth of what an Incident Management System should manage. Such lack of focus and depth of a vital and central part of the Incident Management process, may prove expensive to IT-service businesses since the business needs to investigate what the system needs to manage, and how to manage it. This paper address the problem with ITIL and COBIT lack of focus and depth regarding the central part of the incident management process, the Incident Management System by investigating and reciprocate the following questions. Which implied and explicit requirements should an Incident Management System meet?  Which Incident Management System requirements can be found from the most used frameworks regarding Incident Management?  How well does the identified requirements match those requirements made by a real world company? The target audience for this paper is mainly IT-service business or individuals that considers themselves in need of a compilation of requirements that an Incident Management System should meet and can be used as a supporting tool when implementing or purchasing a new Incident Management System. By identifying requirements that an Incident Management Systems should meet from the most used framework regarding Incident Management, this paper will contribute with means for the implementation of the Incident Management System, reducing the costs for the investigation of demands of such a system. It will also present interested parties with a concrete example, the single case study, to compare with the requirements from the frameworks, contributing with a benchmark for IT-service business to start from when implementing or purchasing an Incident Management System.
134

Batangský incident: Konec tradičního Khamu a počátek expanze dynastie Qing v sichuansko-tibetském pohraničí / The Bathang Incident: The end of thraditional Kham and the beginning of the Qing Dynasty Expansion in Sichuan-Tibetan Frontier

Vařil, Ondřej January 2016 (has links)
The present paper deals with the event known as the Bathang incident, in the Sichuan- Tibetan border area in 1905, during which there was an uprising against the Chinese imperial administration, leading to the murder of Feng Quan, the Assistant High Commissioner to Tibet, and his retinue. In addition to the secondary literature, the paper utilizes mainly Chinese primary sources, along with travelogues and diaries written by Western missionaries and travellers. The initial portion of the first chapter describes the geographical characteristics of the broader area of Kham. Next follows a summary of the historical and political development of the territory, with an emphasis on the development of relations between Kham, Tibet, the Mongols and China, including the internal development and formation of its specific environment and culture. The second chapter turns to Bathang itself. The first subchapter is dedicated to the exceptional natural conditions in Bathang. The second section provides an overview of the historical development of the Bathang area and its gradual integration, first into the Mongol empire and then into the realm of the Qing dynasty. The introduction of the native chieftains system is also described. The third chapter contains an analysis of Bathang's inner power relations, with...
135

What protégés and mentors report helped or hindered the outcomes of mentoring relationships: an adapted critical incident technique study

Buydens, Sarah Louise 04 January 2017 (has links)
How to best conduct a mentoring relationship has been confounded by the lack of a consistent definition of “mentoring” and the scarcity of studies addressing how to achieve a positive outcome. This study contributes new, operationalized definitions of “mentoring,” “mentor,” and “protégé,” and a modified version of the Critical Incident Technique and the Enhanced Critical Incident Technique, called the Adapted Critical Incident Technique (ACIT), which is more consistent with a qualitative methodology. The researcher interviewed 18 self-described mentors and protégés to obtain 207 quotes about what critical behaviours helped or hindered mentoring relationship outcomes. Independent judges confirmed the placement of quotes into 13 categories of behaviours that helped mentors and protégés to reach the mentoring goals and 10 categories of behaviours that hindered the mentoring outcome. The findings contribute to an increased understanding of the foundation upon which mentors and protégés in all fields may potentially build better programs and training under the guise of mentorship. / Graduate / 2018-12-01
136

Možnosti zajištění informační bezpečnosti pomocí definice standardního chování zaměstnanců / Options to ensure information security by defining a standard behavior of employees

Dvořák, Martin January 2009 (has links)
Continually the number of transactions carried out electronically via the internet has grown, as well as the number of users of IT (information technology). In the same way are accruing transactions that may be at risk in terms of information security as well as an increasing number of security incidents threatening financial gain or thefts of sensitive information. Attackers carried out attacks in order to make financial gains using more sophisticated methods, sophisticated not only using information technology but also using social engineering techniques. This growing trend is known about by governments and measures are being taken to help increase the information security of the state. This is evidenced by the fact that the European Parliament recently approved the following Directive Directive of the European parliament and of the council concerning measures to ensure a high common level of network and information security across the Union and the ensuing law on cyber security (Act No. 181/2014 Coll.) adopted by the Parliament of the Czech Republic in the summer of 2014. This act orders organizations which are maintaining critical infrastructure to implement a system to evaluate cybersecurity events (user behavior). So far no unified approach to implement such systems has been defined. Author defines standardized methodology for implementation of systems which evaluate user behavior with focus on optimization of data which these systems have to process to ensure their efficient functionality.
137

Analýza a návrh optimalizace provozu Service Desk s využitím BI / Analysis and optimization of the Service Desk using BI

Gregor, Petr January 2012 (has links)
The objective of this master thesis is to optimize a number of service desk operators in Atos IT Solutions and Services s.r.o. The thesis introduces a general and ITIL methodology definition of the service desk. The practical analysis section covers data mining in order to carry out an analysis and propose measures leading to optimal utilization of service desk employees. The method applied in the thesis allows a creation of service desk services demand predictions for any given period of time.
138

Česko-portugalské a portugalsko-české kulturní standardy / Czech-Portuguese and Portuguese-Czech Cultural Standards

Reicheltová, Kateřina January 2013 (has links)
The aim of the thesis is to reveal Czech-Portuguese and Portuguese-Czech cultural standards by using the method of the in-depth interviews with respective respondents. The thesis is divided into two parts - theoretical and practical. The theoretical part introduces the important concepts underlying the practical part. At the beginning of the practical part, the author describes Portugal, its geographical, demographic, historical, economic, political and social background. The following is also a form of Czech-Portuguese relations since their establishment till the present days. The rest of the practical part is devoted to the methodology used, the target group, the description of interviews done and the research of Czech-Portuguese and Portuguese-Czech cultural standards itself. In conclusion, the author presents some tips and advices for Czechs planning to go to Portugal for private or professional reasons.
139

Sběr indikátorů kompromitace z operačních systémů / Collecting Indicators of Compromise from Operating Systems

Procházka, Jiří January 2019 (has links)
Focus of this thesis is on the design and implementation of an application for gathering indicators of compromise from the systems. In the thesis, there is an introduction to the term indicator of compromise and description of commonly used categories. Next, there is a summary of existing tools with a similar focus. In the thesis, there is a list of some existing formats for sharing of indicators of compromise and selection of format which resulting application uses. After the implementation, application was tested both locally and on infrastructure of cyber exercise.
140

Obfuskace anomálií a bezpečnostních incidentů při provozu DNS / Obfuscation of Anomalies and Security Incidents in DNS Traffic

Štěrba, Ondřej January 2016 (has links)
The work analyze current detection methods of anomalies and security incidents in DNS traffic, and than design new obfuscation techniques which are capable of evading anomaly detection. Network attacks, exploiting the DNS protocol for tunneling of other network traffic, were selected for implementation part of the work. Control of botnet is considered as malicious application of tunneling through the DNS protocol. The main result of the work is to emphasize the necessity of discovering new detection principles of anomalies and security incidents in DNS traffic.

Page generated in 0.0766 seconds