• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 14
  • 14
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

An Evaluation of Organizations Servicing Internally Displaced Persons in the Republic of Azerbaijan

Aliyev, Emil Malik 16 September 2002 (has links)
No description available.
12

Secure Management System for UPnP Digital Home Network

Lu, Yu-Chun 16 August 2010 (has links)
The rapid development in wireless network technology, together with the extensive progress in the digital home hardware and software, have allowed every family to enjoy the conveniences of these new technologies. In particular, the UPnP network technologies link various digital home devices together, coming alone with seamless connection and configuration-less environment. These benefits make it very easy for users to enjoy their digital home devices. However, related security issues have begun to surface one after another. Under a UPnP network environment, users¡¦ identity are not distinguished and therefore, they can not authorize the usage of those devices, services and content. Devices with similar types of service and content lack of integration, it is inconvenient when users need to search or access. In addition, there seems to be a lack of proper handling mechanisms when these devices, services, and content encounter anomaly problems and errors. Lastly, family users will also inevitably have connection requirements between homes but unfortunately, the current UPnP network environment is unable to provide convenient and secured home-to-home content exchange mechanisms. To address the issues mentioned above, this study surveyed the UPnP network environment from a fresh perspective. And through virtual resources, central control network framework and fault tolerance design, it further provides abilities to do related resource authentication, authorization, auditing, and fault handling. It also uses PKI framework to provide the authentication and secure connection between homes. Lastly, we designed and implemented a secure Management System for a UPnP digital home network. It provides secure and convenient home network environment that is compatible with UPnP/UPnP AV standards. On the user¡¦s control aspect, we provided user authentication, authorization, and auditing functionalities. On the home resource management aspect, we provided networks, devices, services, and content which can be controlled and managed. And we also provide integrated and customized entries for service and content. We have a management system with smart and user friendly features. On the anomaly management aspect, we provide fault detection, handling, and basic fault tolerance mechanism. Lastly, we provide trusted homes mechanism, supporting secure user roaming outside their homes, allowing content sharing between trusted homes, and ensuring that users roaming in other locations may still access specific content in their homes.
13

The intersection of social networks in a public service model: A case study.

Schultz-Jones, Barbara Ann 12 1900 (has links)
Examining human interaction networks contributes to an understanding of factors that improve and constrain collaboration. This study examined multiple network levels of information exchanges within a public service model designed to strengthen community partnerships by connecting city services to the neighborhoods. The research setting was the Neighbourhood Integrated Service Teams (NIST) program in Vancouver, B.C., Canada. A literature review related information dimensions to the municipal structure, including social network theory, social network analysis, social capital, transactive memory theory, public goods theory, and the information environment of the public administration setting. The research method involved multiple instruments and included surveys of two bounded populations. First, the membership of the NIST program received a survey asking for identification of up to 20 people they contact for NIST-related work. Second, a network component of the NIST program, 23 community centre coordinators in the Parks and Recreation Department, completed a survey designed to identify their information exchanges relating to regular work responsibilities and the infusion of NIST issues. Additionally, 25 semi-structured interviews with the coordinators and other program members, collection of organization documents, field observation, and feedback sessions provided valuable insight into the complexity of the model. This research contributes to the application of social network theory and analysis in information environments and provides insight for public administrators into the operation of the model and reasons for the program's network effectiveness.
14

電子發票未來發展之研究

葉慧容 Unknown Date (has links)
財政部自2000年11月29日頒布「網際網路傳輸統一發票(簡稱電子發票)試辦作業要點」以來,僅有三千多家申請試辦,且應用面仍侷限在B2B 的發票和折讓單e 化,且買方和賣方都必須加入同一加值服務中心,和實務應用面仍有一段距離。 隨著電子商務快速發展,不論是B2B、B2C、或是C2C,均已具一定規模且持續蓬勃發展中,並在資訊流、物流和金流上都已先後導入e 化應用。但統一發票為整個供應鏈流程中的一段,却尚未導入e 化,導入電子發票有助於整個供應鏈的e化,並可以降低整體作業的運作成本。然而,電子發票之應用涉及財稅政策、會計師簽證、電子簽章、認證機制、個人隱私權、公司e化及公司稽核管控等等核心問題,這種種相關因素如何相互配合,才能發揮電子發票之最大綜效,值得進一步探討。 本研究係參考金財通導入捷盟公司的電子發票個案分析,及國內外電子發票之現況,研討電子發票對企業作業流程、加值服務中心之運作、網路安控機制、政府法令規章、稅務行政、會計師查核等等的挑戰,據以提出可能的作業模式與建議,以供相關單位未來推動統一發票全面電子化的參考。 / The e-invoice trial operations are only adopted by 3,000+ enterprises ever since the Ministry of Finance announced the trial operation law of e-invoice communication through Internet on 29 Nov 2000. The application scope is only within the B2B communication of invoice and allowance note between the enterprises and the value added service center. This is a big gap to implement in a multi-to-multi business environment. Transactions of B2B, B2C or C2C have been on-going grew to an economic scale along with the rapid growth of e-commerce development. Electronic techniques have been applied to the information flow, goods delivery flow and cash flow in the supply chain management. However, invoice is part of the supply chain but not yet integrated into the supply chain e-cycle. Implement e-invoice will integrate the electronic system for supply chain and will help to reduce the total operation costs. E-invoice application involves the core issues of such as government’s financial policy, accounting auditing, public key infrastructure, certificate authority, personal privacy, enterprise EAI system and internal auditing. How these factors incorporate with each other to maximize the most e-invoice benefit deserves further study. This study references the BankPro’s e-invoice implementation case and current e-invoice development situation in Taiwan, America and Europe. On such basis, we further discuss the challenges of e-invoice that will be brought to the enterprise operation flow, service value added center, Internet security control, government legal law, taxing administration and accounting auditing etc, so as to provide possible operation model and recommendations to the related units as the reference to implement e-invoice globally in the future.

Page generated in 0.2909 seconds