• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 1
  • Tagged with
  • 5
  • 5
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Alternative to Proctoring in Introductory Statistics Community College Courses

Feinman, Lena 01 January 2018 (has links)
The credibility of unsupervised exams, one of the biggest challenges of e-learning, is currently maintained by proctoring. However, little has been done to determine whether expensive and inconvenient proctoring is necessary. The purpose of this quantitative study was to determine whether the use of security mechanisms, based on the taxonomy of cheating reduction techniques rooted in the fraud triangle theory, can be an effective alternative to proctoring. A quasi-experimental 1 group sequential design was used to answer the research questions whether the format, proctored versus unproctored, order in which the exams are administered, course delivery mode, and instructor make a difference in student performance. The archival scores of 850 Californian community college students on 2 sets of equivalent proctored and unproctored web-based exams in face-to-face, hybrid, and online introductory statistics courses taught by 7 instructors were compared. The format effect was tested with repeated-measures ANOVA; the order, course delivery mode and instructor effects were tested with mixed ANOVA. No significant difference in scores in Set 1, and significantly lower scores on unproctored exams in Set 2 indicated that the used security mechanisms allowed for maintaining the credibility of the exams without proctoring. There was no significant difference in scores across the course delivery modes in both sets and instructors in Set 2, but significant order effect was observed. Further research on order effect was recommended. With the use of the utilized security mechanisms education will get an inexpensive and convenient way to increase the credibility of unsupervised web-based exams, and the society will gain more online college graduates with credentials that reflect their knowledge.
2

Work-related low back pain among clinical nurses in Tanzania.

Mwilila, Mary Chandeu. January 2008 (has links)
<p>Low back pain (LBP) is a significant problem among the nursing population worldwide. Manual lifting and shifting of heavy objects and patients are primary contributing factors. Nurses are supposed to be knowledgeable about the risk factors and preventive measures and effectively apply it into practice to prevent them from sustaining back injuries. Strategies to reducing the incidences of LBP in nurses have been previously implemented but with little outcomes. The purpose of this study was to explore the relationship between occupational risk factors and the prevalence of LBP in nurses at MOI, Tanzania. Therefore, the study examined / the prevalence of LBP amongst nurses, work-related risk factors contributing to LBP, knowledge and effectiveness of back care techniques, and barriers to effective back care techniques in clinical nurses.</p>
3

Work-related low back pain among clinical nurses in Tanzania.

Mwilila, Mary Chandeu. January 2008 (has links)
<p>Low back pain (LBP) is a significant problem among the nursing population worldwide. Manual lifting and shifting of heavy objects and patients are primary contributing factors. Nurses are supposed to be knowledgeable about the risk factors and preventive measures and effectively apply it into practice to prevent them from sustaining back injuries. Strategies to reducing the incidences of LBP in nurses have been previously implemented but with little outcomes. The purpose of this study was to explore the relationship between occupational risk factors and the prevalence of LBP in nurses at MOI, Tanzania. Therefore, the study examined / the prevalence of LBP amongst nurses, work-related risk factors contributing to LBP, knowledge and effectiveness of back care techniques, and barriers to effective back care techniques in clinical nurses.</p>
4

Work-related low back pain among clinical nurses in Tanzania

Mwilila, Mary Chandeu January 2008 (has links)
Magister Scientiae (Physiotherapy) - MSc(Physio) / Low back pain (LBP) is a significant problem among the nursing population worldwide. Manual lifting and shifting of heavy objects and patients are primary contributing factors. Nurses are supposed to be knowledgeable about the risk factors and preventive measures and effectively apply it into practice to prevent them from sustaining back injuries. Strategies to reducing the incidences of LBP in nurses have been previously implemented but with little outcomes. The purpose of this study was to explore the relationship between occupational risk factors and the prevalence of LBP in nurses at MOI, Tanzania. Therefore, the study examined; the prevalence of LBP amongst nurses, work-related risk factors contributing to LBP, knowledge and effectiveness of back care techniques, and barriers to effective back care techniques in clinical nurses. / South Africa
5

Säkerheten i webbapplikationer mot SQL- injektionsattacker : En studie av tekniker, säkerhetspåverkan och förekommande skyddslösningar

Hanna Malko, Ranim January 2023 (has links)
Web applications constitute an essential part of our daily lives, providing us access to significant online services and information. Despite their advantages, they are also vulnerable to security threats, particularly SQL injection attacks. SQL injection is a vulnerability that arises when an attacker inserts malicious SQL queries through user input parameters in a web application. This attack can have severe consequences, such as exposing sensitive information. The purpose of this study is to investigate and analyze the security of web applications against SQL injection attacks. This is achieved by examining SQL injection techniques, their impact on security and integrity, as well as the most common protective solutions. The goal of the study is to enhance and improve the security of applications and protect users from potential security risks. To achieve this, a combination of literature study and practical investigations is conducted. A literature review is performed to identify SQL injection techniques, security risks, and the most prevalent protective solutions. Subsequently, these factors are evaluated and analyzed to determine the effectiveness of the techniques using the penetration testing tool SQLmap. The results of the study indicate that the most common and effective attack techniques are Inband SQL injection and Inferential SQL injection. These techniques can have severe implications for users, businesses, and society at large, such as unauthorized access to protected data, data manipulation in databases, and the compromise of confidentiality and data integrity. To safeguard against such attacks, it is crucial to employ defensive coding practices, including the use of prepared statements with parameterized queries and input validation. However, manual implementation remains challenging. A combination of automated prevention techniques and best coding practices should be employed to ensure a reliable database protected against SQL injections, even concerning stored procedures that are difficult to prevent with existing automated prevention techniques. / Webbapplikationer utgör en viktig del av vårt dagliga liv och ger oss tillgång till betydelsefulla onlinetjänster och information. Trots deras fördelar är de också sårbara för säkerhetshot, särskilt SQL-injektionsattacker. SQL-injektion är en sårbarhet som uppstår när en angripare infogar skadliga SQL-frågor genom användarens inmatningsparametrar i en webbapplikation. Attacken medför allvarliga konsekvenser, såsom exponering av känslig information. Syftet med denna studie är att undersöka och analysera säkerheten i webbapplikationer mot SQL-injektionsattacker. Detta genomförs genom att undersöka SQL-injektionstekniker, deras påverkan på säkerhet och integritet, samt de vanligaste skyddslösningarna. Målet med studien är att öka och förbättra säkerheten hos applikationer samt skydda användarna från potentiella säkerhetsrisker. För att åstadkomma detta genomförs en kombination av litteraturstudier och praktiska undersökningar. En litteraturstudie genomförs för att identifiera SQL-injektionstekniker, säkerhetsrisker och de vanligast förekommande skyddslösningarna. Därefter utvärderas och analyseras dessa faktorer för att kunna fastställa effektiviteten hos teknikerna genom användning av penetrationstestningsverktyget SQLmap. Resultaten av studien visar att de vanligaste och mest effektiva attackteknikerna är Inband SQL-injektion och Inferential SQL-injektion. Dessa tekniker kan få allvarliga konsekvenser för användare, företag och samhället i stort, såsom åtkomst till skyddade data, manipulering av data i databasen och förlust av sekretess och dataintegritet. För att skydda mot sådana attacker är det avgörande att använda defensiva kodningsmetoder, inklusive användning av förberedda satser med parametriserade frågor och indatavalidering. Trots detta utgör manuell implementering en utmaning. En kombination av automatiserade förebyggande tekniker och bästa kod-praxis bör användas för att säkerställa en pålitlig databas som är skyddade mot SQL-injektioner, även när det gäller lagrade procedurer som är svåra att förhindra med befintliga automatiserade förebyggande tekniker.

Page generated in 0.127 seconds