• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 21
  • 12
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 56
  • 56
  • 20
  • 13
  • 12
  • 11
  • 10
  • 10
  • 10
  • 10
  • 10
  • 8
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Design and Evaluation of Cooperative Location Verification Protocol for Vehicular Ad-Hoc Networks

Zhang, Pengfei 16 March 2012 (has links)
Vehicular ad hoc networks (VANETs) have attracted much attention over the last few years. VANETs own several significant characteristics, such as the high-rate changing topology led by velocity of vehicles, time-and-location critical safety applications, and Global Positioning System (GPS) devices. In VANETs, as vehicle movement is usually restricted in just bidirectional movements along the roads and streets, geographical location information becomes very useful. In addition, many studies show that position-based routing protocol is a more promising routing strategy for VANETs; therefore security and verification of location information are necessary to be researched. In this thesis, a location verification approach, namely the Cooperative Location Verification (CLV) protocol, is proposed, aiming to prevent position-spoofing attacks on VANETs. The CLV basically uses two vehicles, a Verifier and a Cooperator, to verify the claimed position of a vehicle (Prover), according to two challenge-response procedures. Additionally, the security analysis of the CLV is presented. In order to enhance the CLV by reduce the network overhead, a reputation management system is designed. It utilizes the verification results of the CLV application and maintain every vehicle's reliability in the network. In addition, the solution to sparse networks is briefly discussed. In the simulation, the results show that the proposed CLV performs better than another location verification algorithm, namely the Secure Location Verification (SLV). And the effectiveness of the reputation management system is also demonstrated.
2

Design and Evaluation of Cooperative Location Verification Protocol for Vehicular Ad-Hoc Networks

Zhang, Pengfei 16 March 2012 (has links)
Vehicular ad hoc networks (VANETs) have attracted much attention over the last few years. VANETs own several significant characteristics, such as the high-rate changing topology led by velocity of vehicles, time-and-location critical safety applications, and Global Positioning System (GPS) devices. In VANETs, as vehicle movement is usually restricted in just bidirectional movements along the roads and streets, geographical location information becomes very useful. In addition, many studies show that position-based routing protocol is a more promising routing strategy for VANETs; therefore security and verification of location information are necessary to be researched. In this thesis, a location verification approach, namely the Cooperative Location Verification (CLV) protocol, is proposed, aiming to prevent position-spoofing attacks on VANETs. The CLV basically uses two vehicles, a Verifier and a Cooperator, to verify the claimed position of a vehicle (Prover), according to two challenge-response procedures. Additionally, the security analysis of the CLV is presented. In order to enhance the CLV by reduce the network overhead, a reputation management system is designed. It utilizes the verification results of the CLV application and maintain every vehicle's reliability in the network. In addition, the solution to sparse networks is briefly discussed. In the simulation, the results show that the proposed CLV performs better than another location verification algorithm, namely the Secure Location Verification (SLV). And the effectiveness of the reputation management system is also demonstrated.
3

Design and Evaluation of Cooperative Location Verification Protocol for Vehicular Ad-Hoc Networks

Zhang, Pengfei 16 March 2012 (has links)
Vehicular ad hoc networks (VANETs) have attracted much attention over the last few years. VANETs own several significant characteristics, such as the high-rate changing topology led by velocity of vehicles, time-and-location critical safety applications, and Global Positioning System (GPS) devices. In VANETs, as vehicle movement is usually restricted in just bidirectional movements along the roads and streets, geographical location information becomes very useful. In addition, many studies show that position-based routing protocol is a more promising routing strategy for VANETs; therefore security and verification of location information are necessary to be researched. In this thesis, a location verification approach, namely the Cooperative Location Verification (CLV) protocol, is proposed, aiming to prevent position-spoofing attacks on VANETs. The CLV basically uses two vehicles, a Verifier and a Cooperator, to verify the claimed position of a vehicle (Prover), according to two challenge-response procedures. Additionally, the security analysis of the CLV is presented. In order to enhance the CLV by reduce the network overhead, a reputation management system is designed. It utilizes the verification results of the CLV application and maintain every vehicle's reliability in the network. In addition, the solution to sparse networks is briefly discussed. In the simulation, the results show that the proposed CLV performs better than another location verification algorithm, namely the Secure Location Verification (SLV). And the effectiveness of the reputation management system is also demonstrated.
4

Design and Evaluation of Cooperative Location Verification Protocol for Vehicular Ad-Hoc Networks

Zhang, Pengfei January 2012 (has links)
Vehicular ad hoc networks (VANETs) have attracted much attention over the last few years. VANETs own several significant characteristics, such as the high-rate changing topology led by velocity of vehicles, time-and-location critical safety applications, and Global Positioning System (GPS) devices. In VANETs, as vehicle movement is usually restricted in just bidirectional movements along the roads and streets, geographical location information becomes very useful. In addition, many studies show that position-based routing protocol is a more promising routing strategy for VANETs; therefore security and verification of location information are necessary to be researched. In this thesis, a location verification approach, namely the Cooperative Location Verification (CLV) protocol, is proposed, aiming to prevent position-spoofing attacks on VANETs. The CLV basically uses two vehicles, a Verifier and a Cooperator, to verify the claimed position of a vehicle (Prover), according to two challenge-response procedures. Additionally, the security analysis of the CLV is presented. In order to enhance the CLV by reduce the network overhead, a reputation management system is designed. It utilizes the verification results of the CLV application and maintain every vehicle's reliability in the network. In addition, the solution to sparse networks is briefly discussed. In the simulation, the results show that the proposed CLV performs better than another location verification algorithm, namely the Secure Location Verification (SLV). And the effectiveness of the reputation management system is also demonstrated.
5

Communicating - what and to whom? : A Qualitative Study of Stadium's CSR Practice and External Communication

Muhic, Esma, Lundberg, Sofia January 2016 (has links)
This report discusses the subject of corporate social responsibility (CSR) and CSR communication at Stadium. The study’s purpose is to study the role of sustainability in corporate social responsibility. This is executed through studying how Stadium chooses to communicate their sustainability practices externally. Furthermore, the report studies if and how Stadium’s CSR message reaches student consumers, and how it affects their opinions and consumer behavior. The gathered material is analyzed through the concept of CSR, reputation management and stakeholder theory. Our result shows that Stadium utilizes CSR as a business strategy, wants to contribute to a better society as well as gaining a more positive reputation. Stadium communicate the same sustainability information through the same communication channels to all stakeholders.We found that the student consumers are not reached by Stadium’s sustainability communication, and this is a contributing factor to why their opinions and consumer behavior at Stadium is unaffected. However, differences of opinion about whether sustainability practices affect the students’ view of Stadium arose - some would be affected by more sustainability information and for some it is rather a matter of price when making a purchase. The students believe that they would be better reached by Stadium’s sustainability message if it was communicated in stores. The report shows that sustainability is important for student consumers and also that inadequate communication decreases their opportunity to shop sustainably. It is less likely that a company’s reputation is affected in a positive way if sustainability is not adequately communicated / Uppsatsen behandlar företags sociala ansvar (CSR) och CSR-kommunikation på Stadium. Studiens syfte är att undersöka vilken roll hållbarhet har inom CSR. Detta görs genom att undersöka hur Stadium väljer att kommunicera sitt CSR-arbete externt, med fokus på hållbarhetsaspekten. Vidare undersöker studien huruvida Stadiums budskap når konsumentgruppen studenter och hur det i så fall påverkar konsumenternas åsikter och köpbeteende. Syftet uppnås genom att besvara tre frågeställningar med hjälp av intervjuer med representanter från Stadium samt student-fokusgupper. Det insamlade materialet från intervjuer och fokusgrupper analyseras utifrån CSR-konceptet, reputation management och stakeholder theory. Resultatet av undersökningen påvisar att Stadium vill bidra till ett bättre samhälle samt använder CSR som företagsstrategi, och vill att CSR-arbetet skall påverka sitt anseende positivt. Stadium kommunicerar samma hållbarhetinformation genom samma kommunikationskanaler till alla Stadiums intressenter (ex. genom hemsidan).Vidare framkom att studentkonsumenterna inte nås av Stadiums hållbarhetskommunikation, och att detta är en bidragande faktor till varför deras åsikter och köpbeteende på Stadium inte påverkas. Dock framkommer delade meningar huruvida studenternas syn på Stadium och beteende påverkas av hållbarhetsarbete - vissa skulle påverkas genom att få mer information och för vissa är det en prisfråga huruvida man handlar hållbart eller ej. Studenterna anser att de skulle nås bättre om hållbarhetsarbetet kommunicerades ut i butiksmiljön. Avslutningsvis visar studien på att hållbarhet är viktigt för studentkonsumenterna men att bristande kommunikation minskar deras möjlighet att handla hållbart. Det är mindre troligt att ett företags anseende påverkas positivt om hållbarhet inte kommuniceras tillräckligt.
6

Newspapers' Representations of Corporate Mass Layoffs

Pace, Andrea Lynn 01 January 2010 (has links)
Due to rising unemployment levels, researchers have begun to investigate how corporations handle layoffs and how they could manage them better in the future. Public relations practitioners can use this type of research to help organizations learn how to best maintain their images, reputations and productivity amid mass layoffs. When an organization conducts mass layoffs, its actions become both a current event and a public issue that is frequently discussed in newspaper articles. In order for downsizing organizations to be aware of the public?s perceptions of their layoff procedures, they should be aware of how the news media represents them. This study used a content analysis of different newspaper articles to determine how three downsizing organizations (General Motors, Caterpillar, and Boeing) were portrayed in the midst of mass layoffs. This study examined a sample of newspaper articles from two nationally-distributed daily newspapers (The New York Times and The Washington Post). It also included articles from daily newspaper that were located in the cities where the layoffs took place (The Detroit News, The Chicago Tribune, and The Seattle Times). The findings did not show that the newspapers? articles about the layoffs tended to be more prominent in the regional publications than in the national publications. While the articles were often prominently placed in the newspapers, the layoffs were not typically the primary focus of the articles. The reporters frequently included details of the layoffs, such as the number of layoff victims, in their articles. They also frequently included attributions of blame for the layoff decisions. The articles, however, rarely discussed socially responsible actions made on behalf of the downsizing companies.
7

Reputation-based Trust Management in Peer-to-Peer File Sharing Systems

Mekouar, Loubna January 2010 (has links)
Trust is required in file sharing peer-to-peer (P2P) systems to achieve better cooperation among peers and reduce malicious uploads. In reputation-based P2P systems, reputation is used to build trust among peers based on their past transactions and feedbacks from other peers. In these systems, reputable peers will usually be selected to upload requested files, decreasing significantly malicious uploads in the system. This thesis surveys different reputation management systems with a focus on reputation based P2P systems. We breakdown a typical reputation system into functional components. We discuss each component and present proposed solutions from the literature. Different reputation-based systems are described and analyzed. Each proposed scheme presents a particular perspective in addressing peers’ reputation. This thesis also presents a novel trust management framework and associated schemes for partially decentralized file sharing P2P systems. We address trust according to three identified dimensions: Authentic Behavior, Credibility Behavior and Contribution Behavior. Within our trust management framework, we proposed several algorithms for reputation management. In particular, we proposed algorithms to detect malicious peers that send inauthentic files, and liar peers that send wrong feedbacks. Reputable peers need to be motivated to upload authentic files by increasing the benefits received from the system. In addition, free riders need to contribute positively to the system. These peers are consuming resources without uploading to others. To provide the right incentives for peers, we develop a novel service differentiation scheme based on peers’ contribution rather than peers’ reputation. The proposed scheme protects the system against free-riders and malicious peers and reduces the service provided to them. In this thesis, we also propose a novel recommender framework for partially decentralized file sharing P2P systems. We take advantage from the partial search process used in these systems to explore the relationships between peers. The proposed recommender system does not require any additional effort from the users since implicit rating is used. The recommender system also does not suffer from the problems that affect traditional collaborative filtering schemes like the Cold start, the Data sparseness and the Popularity effect. Over all, our unified approach to trust management and recommendations allows for better system health and increased user satisfaction.
8

Reputation-based Trust Management in Peer-to-Peer File Sharing Systems

Mekouar, Loubna January 2010 (has links)
Trust is required in file sharing peer-to-peer (P2P) systems to achieve better cooperation among peers and reduce malicious uploads. In reputation-based P2P systems, reputation is used to build trust among peers based on their past transactions and feedbacks from other peers. In these systems, reputable peers will usually be selected to upload requested files, decreasing significantly malicious uploads in the system. This thesis surveys different reputation management systems with a focus on reputation based P2P systems. We breakdown a typical reputation system into functional components. We discuss each component and present proposed solutions from the literature. Different reputation-based systems are described and analyzed. Each proposed scheme presents a particular perspective in addressing peers’ reputation. This thesis also presents a novel trust management framework and associated schemes for partially decentralized file sharing P2P systems. We address trust according to three identified dimensions: Authentic Behavior, Credibility Behavior and Contribution Behavior. Within our trust management framework, we proposed several algorithms for reputation management. In particular, we proposed algorithms to detect malicious peers that send inauthentic files, and liar peers that send wrong feedbacks. Reputable peers need to be motivated to upload authentic files by increasing the benefits received from the system. In addition, free riders need to contribute positively to the system. These peers are consuming resources without uploading to others. To provide the right incentives for peers, we develop a novel service differentiation scheme based on peers’ contribution rather than peers’ reputation. The proposed scheme protects the system against free-riders and malicious peers and reduces the service provided to them. In this thesis, we also propose a novel recommender framework for partially decentralized file sharing P2P systems. We take advantage from the partial search process used in these systems to explore the relationships between peers. The proposed recommender system does not require any additional effort from the users since implicit rating is used. The recommender system also does not suffer from the problems that affect traditional collaborative filtering schemes like the Cold start, the Data sparseness and the Popularity effect. Over all, our unified approach to trust management and recommendations allows for better system health and increased user satisfaction.
9

Do we have a common interest? : Cultivating relationships or spreading information; a study of Strategic Political Communication on Facebook.

Rembe Mc Hugh, Sean, Gibbs Sjödin, Amanda January 2015 (has links)
Title: Do we have a common interest? - Cultivating relationships or spreading information; a study of Strategic Political Communication on Facebook. Authors: Amanda Gibbs Sjödin & Sean Rembe Mc Hugh Course: Medie- och Kommunikationsvetenskap C, Bachelor Thesis Paper, 15hp, HT 2014. Words: 16 027 This essay aims to examine the level of relationship cultivation strategies in Swedish campaign communication. The progress in political communication emphasizes aspects of public relations such as relationship marketing . We will combine theories regarding relationship marketing with the new possibilities created for campaign communication by the emergence of web 2.0. The popular social media platforms which exist within web 2.0 give campaigns well suited means to easily facilitate input, inspire dialogue and cultivate relationships. We aim to answer the following question; Which strategic components do the parties apply in their Facebook communication? Do the parties differ in their use of communicative tools? In order to answer this question we have operationalized theories in political communication, reputation management and relationship marketing. This operationalizing resulted in eight variables. We conducted a quantitative content analysis by measuring the presence of our variables in each Facebook post made by each party on their Facebook page during the final month of the 2014 election.. The results show that both parties utilize these strategies and in a similar way but that there is a difference in how much. The Feminist Initiative had a higher overall usage but the strategy common interest was used to a high level by both parties, this shows that the parties mainly stress shared values and ideology in their communication.
10

A change in focus to stakeholder engagement and reputation management aligned to King III recommendations

Leuner, Julia Bouie 30 April 2011 (has links)
As the King III code has been described as the future of corporate governance the question has to be asked whether corporate South Africa is able to translate this international best practice document into best practice implementation. The purpose of this research was to assess how companies and industry experts have interpreted the requirements of King III – Governing Stakeholder Relationships – and to see if there was a change in focus by companies and their boards ‘to stakeholder engagement and reputation management’. Through qualitative interviews the objective of the research was to: • find out to what extent companies had adopted the recommendations on governing stakeholder relationship (King III); • confer with industry experts as to what companies are expected to report on when they adopt King III principles on governing stakeholder relationships; and • ascertain if there was a common understanding of the adoption of King III – Governing Stakeholder Relationships – from a company and industry perspective? For business leaders who have accepted that the sustainability of the system depends on delivering wealth creation and economic return for shareholders and stakeholders, sustainably and responsibly and who have placed stakeholder trust at the heart of their companies’ strategy adopting governing stakeholder relationship – governance element eight – recommendations is in synch. Copyright / Dissertation (MBA)--University of Pretoria, 2010. / Gordon Institute of Business Science (GIBS) / unrestricted

Page generated in 0.1436 seconds