• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 12
  • 5
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 34
  • 7
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Emotional Exhaustion and Its Role in Service Sabotage among Boundary Spanners

Edmondson, Diane R 18 November 2008 (has links)
The purpose of this dissertation is to investigate how emotional exhaustion (EE) impacts a boundary spanning employee's usage of service sabotage behaviors (SSB). This dissertation also investigates how perceived organizational support (POS) and perceived supervisory support (PSS) alleviate a boundary spanning employee's EE and SSB. Furthermore, this dissertation examines how extraversion (EXT) and imagination (IMAG) moderates the relationship between POS and SSB and between PSS and SSB. A boundary spanning employee is any organizational employee who "engages in job-related interactions with a person who is considered part of the environment, who is not a member of the organization" (Robertson 1995, p. 75). These employees are important as research has shown that consumers use the attitudes and behaviors of these employees to positively or negatively impact their perceptions of the service encounter (e.g. Bitner 1990; Bowen and Schneider 1985; Pugh 2001). SSB are overt or covert behaviors which negatively affect the relationship between the organization and the customer (Harris and Ogbonna 2006, 2002). Rather than the boundary spanning employee engaging in negative behaviors towards other employees or the organization as a whole, SSB are acted upon the customer. EE occurs when an employee believes they are overextended by their work (Maslach and Jackson 1981). Boundary spanning employees are forced to display organizationally desired emotions even when encountering negative customers (Cordes and Dougherty 1993; Mulki, Jaramillo and Locander 2006). This interaction between the customer and employee may result in discontent and the employee may engage in SSB as a way to show this discontent. A boundary spanner's EE is hypothesized to positively impact SSB; therefore, it is important to investigate what will reduce or mitigate a boundary spanner's EE. Two constructs that are hypothesized to reduce both EE and SSB are POS and PSS. In order to test the hypotheses developed in this dissertation, 490 non-management retail sales and customer service employees across a variety of organizations were sampled. Results found that EE positively impacts SSB. EE also partially mediates the relationship between POS and SSB. The hypotheses associated with PSS, EXT and IMAG were not supported.
22

Adaptive Camera Tamper Detection For Video Surveillance

Saglam, Ali 01 June 2009 (has links) (PDF)
Criminals often resort to camera tampering to prevent capture of their actions. Many surveillance systems left unattended and videos surveillance system operators lose their concentration after a short period of time. Many important Real-time automated detection of video camera tampering cases is important for timely warning of the operators. Tampering can be defined as deliberate physical actions on a video surveillance camera and is generally done by obstructing the camera view by a foreign object, displacing the camera and changing the focus of the camera lens. In automated camera tamper detection systems, low false alarm rates are important as reliability of these systems is compromised by unnecessary alarms and consequently the operators start ignoring the warnings. We propose adaptive algorithms to detect and identify such cases with low false alarms rates in typical surveillance scenarios where there is significant activity in the scene. We also give brief information about the camera tampering detection algorithms in the literature. In this thesis we compare performance of the proposed algorithms to the algorithms in the literature by experimenting them with a set of test videos.
23

Motivace, projevy a cíle culture jammingu v českém prostředí / Motivation, strategies and goals of culture jamming in czech surroundings

Benešová, Zuzana January 2017 (has links)
The phenomenon of culture jamming is not so well known in the Czech Republic. So I decided to focus on defining this term, which is sometimes translated as cultural sabotage. At the beginning of this dissertation work, I try to introduce important theories that are related to the central concept. I also focus on how culture jamming most often express and what forms are most common. In the part of examples of culture jamming in the world, I try to describe the important foreign culture jamming's groups, including demonstrations of their actions and performances. In the same way I map the Czech culture jamming groups. For a better illustration and approximation of the concept, the whole of this theoretical part is supplemented with a picture attachment. Part of the dissertation work is also a research part, which focuses on the mapping of culture jamming in the Czech Republic. Above all, I try to find out what are the motivations, speeches and goals of Czech cultural saboteurs.
24

Attachment and Covert Relational Aggression in Marriagewith Shame as a Potential Moderating Variable: A Two Wave Panel Study

Clifford, Charity Elaine 29 June 2013 (has links) (PDF)
Using a two-wave APIM Structural Equation Model, this study investigated how husband and wife attachment styles predict husband and wife covert relational aggression one year later with husband and wife shame as potential moderating variables. Data was taken from 308 married couples in waves three and four of the Flourishing Families project using self-report and partner report of spouse questionnaires. Findings showed that an individual's attachment insecurity predicts their use of relational aggression. Wives' relational aggression is predicted by an increase in husbands' relational aggression. An increase in wives' insecure attachment had less of an impact on husbands' relationally aggressive behavior. Shame predicts the use of relational aggression. Shame moderates some of the actor and partner relationships, showing that in certain cases, as shame increases the relationship between attachment strategy and relational aggression also increases. Clinicians are advised to assess and treat partners as a couple as one partner's attachment and shame may affect the other's behavior, and those high in shame and insecure attachment are more likely to use covert relational aggression.
25

Development of a framework for Integrated Oil and gas Pipeline Monitoring and Incident Mitigation System (IOPMIMS)

Johnson, Chukwuemeka Eze January 2017 (has links)
The problem of Third Party Interference (TPI) on Oil and Gas Pipelines is on the rise across the world. TPI is not only common in developing countries but is now occasionally experienced in developed countries including Germany and the UK. The risks posed by these third-party activities on Oil and Gas pipelines are enormous and could be measured in terms of financial costs, environmental damages as well as health and safety implications. The quest for an end to these malicious activities has triggered a lot of studies into the root causes of pipeline TPI, other causes of pipeline failure, risks associated with pipeline failure and their mitigation measures. However, despite the significance of the effects of TPI, very little has been done to proffer an enduring solution through research. This research therefore aims at developing a framework for integrated oil and gas pipeline monitoring and incident mitigation system through integration of various wireless sensors for effective monitoring of oil and gas pipelines. Having identified the existing gaps in literature as lack of reliable, accurate and standard method for oil and gas pipeline risk assessment model, the study undertook a quantitative approach to develop an effective Quantitative Risk Assessment (QRA) model for pipelines. The QRA model developed benchmarks pipeline risk assessment and gives the parameters with which standard QRA could be measured. The research findings indicate that risk associated with Nigerian Pipeline system is in the intolerable region whereas TPI is an increasing menace across the globe. Further findings show that Support Vector Machine (SVM) gave the best performance with 91.2% accuracy while Neural Networks (NN) and Decision Tree (DT) gave 63% and 57% accuracies respectively in terms of pipeline failure mode prediction accuracies. It was recommended that operators should draw out Pipeline Integrity Management (PIM) programs and store pipeline data in a format that captures number of fatalities, property damages and costs as well as volume of oil or gas spilled to ensure that accurate data is obtainable for improved PIM. In conclusion, having achieved its aim and objectives evidenced by the framework, model developed, and the recommendations presented, the research has contributed in no small measure to providing a solution to pipeline incidences.
26

Cybercrimes / Delitos Informáticos

Villavicencio Terreros, Felipe A. 12 April 2018 (has links)
In recent times, due to the development of information technology,a new form of crime called informational crimes has developed. in relation to this new type of crime, a special criminal law was issued, whose purpose is to prevent and punish illegal activities that affect computer systems and datas, secret communications, and other legal goods that are affected withthis type of crime, such as equity, public faith and sexual freedom. / En los últimos tiempos, producto del desarrollo de las tecnologías informáticas se ha ido desarrollando una nueva forma de criminalidad denominada delitos informativos. en relación a esta nueva forma delictiva, se ha emitido una Ley penal especial cuya finalidad es prevenir y sancionar las conductas ilícitas que afectan los sistemas y datos informáticos, así como el secreto de las comunicaciones, y los demás bienes jurídicos que resulten afectados con esta modalidad delictiva, como son el patrimonio, la fe pública y la libertad sexual.
27

Politický terorismus a guerilla na příkladě odbojové skupiny bratří Mašínů / Political terrorism and guerrilla: example of Brothers Mašín resistance group

Kuna, František January 2013 (has links)
The aim of work is to aply theory of political terorism and guerrilla to Brother's Masin resistence group activities. This work offers a new view to research issues of Brother's Masin resistence group. Besides the theory of political terorism and guerila we have to account contemporary context. Each group action will be assign to one of the theory. Masin's father had a great influence to resistence group activity. He has to have his own place in this work. It is also necessary to introduce historical context of the time and give the most important reasons to the group activities. Because it is important to look at the contemporary context we have to describe what Czechoslovakia, East German and West German press wrote about it. In conclusion are the most important facts about theory of political terorism and guerrilla. To this theories will be assigned each resistence group activities. The conclusion provides an overview of Brother's Masin resistence group activities using theory of political terorism and guerrilla.
28

Downsized Survivors: Areas of Loss and Work Behaviors

Schaeffer, Cyndi J. 13 March 2012 (has links)
No description available.
29

The Argus: Mandela, the Rivonia Trial, life or death? / Mandela: the Rivonia Trial, life or death?

Cruywagen, Dennis, Drysdale, Andrew 07 February 1990 (has links)
The Rivonia treason trial started on October 9, 1963, the same day that former Cape Town coloured singer Danny Williams made front page headlines by marrying a white girl in London. Those were the days when apartheid, not as “reformed” as it is today, was rigorously applied by the National Party government. Love, sex and marriage across the colour line were forbidden. Crooner Williams, 31, then riding the crest of the pop wave with his ballad “Moon River”, took his vows with Bobbi Carole, who married him against the wishes of her parents. Williams, fearing persecution, told an interviewer he would not be welcome in South Africa again. But most prominent by far on the front page that day was the Rivonia treason trial. A report from Pretoria — following the style of the times — said: “Eleven men — four whites, one Indian and six Natives — went on trial in the Supreme Court here today before Mr Justice Quartus de Wet (Judge President of the Transvaal) on charges of sabotage and of offences under the Suppression of Communism Act and of contravening the Criminal Law Amendment Act.” / Supplement to The Argus, Wednesday February 7 1990 / Exclusive Part 2
30

Försämrade materialegenskaper i aluminiumkonstruktioner - Liquid Metal Embrittlement inducerat av gallium / Deteriorated material properties of aluminium structures – Liquid Metal Embrittlement induced by gallium

Theorin, Anders January 2016 (has links)
Denna studie undersöker möjligheten att påverka fientliga konstruktioner genom användandet av en effektiv metod, som kan medge en liten risk att upptäckas. Den tänkta påverkan uppnås genom fenomenet Liquid Metal Embrittlement (LME), med vilken höghållfasta metaller kan påverkas så mycket att de kollapsar av sin egenvikt. Uppsatsen studerar LME på ett ofta använt konstruktionsmaterial både civilt som militärt. Ett experiment genomfördes i syfte att undersöka effekterna av LME på en aluminiumlegering, där en aluminiumdetalj exponerades för metallen gallium. Förförsök genomfördes i syfte att undersöka inom vilka tidsförhållanden LME uppstod och experimentets exponeringstider planerades därefter. Efter varje exponeringstid genomfördes ett dragprov för att påvisa en minskad hållfasthet och seghet hos aluminiumet. Resultatet blev en stor minskning av hållfasthet och seghet, där hållfastheten sänktes till 20% av referensvärdet och segheten till 1% av referensvärdet, även om resultatet var spritt. / The possibility to damage enemy constructions using an efficient method, which might permit a low risk of detection, is studied in this thesis. This damage is based on the phenomena Liquid Metal Embrittlement (LME) with which high strength metals can be affected so much that they collapse under their own weight. This thesis studies this effect in a material often used for various constructions, both civilian and military. An experiment was conducted in order to evaluate the effects of LME on an aluminium alloy by exposing the aluminium to the metal known as gallium. A pre-experiment was made in order to determine how the time of exposure affected the LME-process and time-periods were decided accordingly. At each of the timeperiods a yield test was conducted in order to measure losses in strength and elasticity of the aluminium. It was shown that a great reduction in strength and elasticity occurred, where the strength was reduced to 20% of the reference sample and elasticity to 1% of the reference sample.

Page generated in 0.0431 seconds