• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6562
  • 1927
  • 919
  • 814
  • 686
  • 373
  • 179
  • 161
  • 154
  • 105
  • 93
  • 81
  • 79
  • 77
  • 76
  • Tagged with
  • 14837
  • 2974
  • 2027
  • 1876
  • 1454
  • 1382
  • 1345
  • 1298
  • 1264
  • 1169
  • 1155
  • 1149
  • 1075
  • 1030
  • 952
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
841

An Assessment of Campus Police Departments across Mississippi's Public Community and Junior Colleges

Boggs, Brad D 15 December 2012 (has links)
The purpose of the study was to provide an assessment of campus police departments throughout the 15 public community and junior colleges in Mississippi. This research could provide Mississippi community and junior college administrators the opportunity to observe and appraise the overall safety of their respective campuses in comparison to safety practices of the other campus police departments in the state. This study will lay the foundation for further research of campus police departments and can assist administrators and boards of trustees of Mississippi’s public community and junior colleges with annual and long-range planning efforts. This study included campus police/security departments in all of Mississippi’s public community and junior colleges. Data were collected to provide an overview of police/security departments at Mississippi’s public community and junior colleges. A portion of the study contains information/data gathered from a random sample of students at one rural, public community college in the northern region of Mississippi concerning campus safety and their satisfaction of services provided by campus police. The researcher utilized a mixed-methods design to study existing descriptive information pertaining to the 15 Mississippi public community and junior college campus police departments, existing crime statistics reported by each public community and junior college in Mississippi, and existing data gathered by the Itawamba Community College administration from their students concerning their perception of campus police and safety issues. The researcher created a composite student satisfaction score and utilized a one-way ANOVA to determine the significance level of student perception concerning campus police and safety issues. In answering the research questions, the researcher discovered that Mississippi community and junior college campus police/security reported less favorable attitudes pertaining to funding and staffing their respective departments and positive attitudes pertaining to their ability to attend and provide training opportunities. The researcher found that Mississippi public community and junior college campuses seem to be safe, reporting low crime statistics in the Campus Safety and Security Data Analysis Cutting Tool. Lastly, the researcher discovered that student satisfaction of campus police and safety issues at one rural Northeast Mississippi community college increased from 2007 to 2011.
842

An exploration of the domains of work insecurity /

Milton-Feasby, Christine January 2003 (has links)
No description available.
843

The Dual-Driven Treaty : Examining how the TPNW could contribute to a security culture centered around human security.

Costelius, Beatrice January 2024 (has links)
The TPNW came into force in January 2021, marking a significant departure within the global disarmament regime by advocating for the complete abolition of nuclear weapons. Despite its ambitious goals, the treaty has faced criticism from nuclear weapons states, particularly regarding its suggested lack of international security dimensions. This thesis aims to examine the dual aspects of security and humanitarian concerns within the framework of the TPNW. Using a thematic analysis of documents from the TPNW framework, the research investigates how the treaty’s humanitarian and security-driven sides could contribute to fostering a security culture centered around human security. Drawing upon Mary Kaldor’s definition of the two security cultures liberal peace and geo-politics, the thesis explores how the TPNW could be part of shaping a security culture centered around human security and concludes that the Treaty has the potential to foster such international security culture.
844

Security in Practice: Examining the Collaborative Management of Sensitive Information in Childcare Centers and Physicians' Offices

Vega, Laurian 06 May 2011 (has links)
Traditionally, security has been conceptualized as rules, locks, and passwords. More recently, security research has explored how people interact in secure (or insecure) ways in part of a larger socio-technical system. Socio-technical systems are comprised of people, technology, relationships, and interactions that work together to create safe praxis. Because information systems are not just technical, but also social, the scope of privacy and security concerns must include social and technical factors. Clearly, computer security is enhanced by developments in the technical arena, where researchers are building ever more secure and robust systems to guard the privacy and confidentiality of information. However, when the definition of security is broadened to encompass both human and technical mechanisms, how security is managed with and through the day-to-day social work practices becomes increasingly important. In this dissertation I focus on how sensitive information is collaboratively managed in socio-technical systems by examining two domains: childcare centers and physicians' offices. In childcare centers, workers manage the enrolled children and also the enrolled child's personal information. In physicians' offices, workers manage the patients' health along with the patients' health information. My dissertation presents results from interviews and observations of these locations. The data collected consists of observation notes, interview transcriptions, pictures, and forms. The researchers identified breakdowns related to security and privacy. Using Activity Theory to first structure, categorize, and analyze the observed breakdowns, I used phenomenological methods to understand the context and experience of security and privacy. The outcomes from this work are three themes, along with corresponding future scenarios. The themes discussed are security embodiment, communities of security, and zones of ambiguity. Those themes extend the literature in the areas of usable security, human-computer interaction, and trust. The presentation will use future scenarios to examine the complexity of developing secure systems for the real world. / Ph. D.
845

Security Properties of Virtual Remotes and Spooking their Violations

Joshua David Oetting Majors (18390504) 18 April 2024 (has links)
<p dir="ltr">As Smart TV devices become more prevalent in our lives, it becomes increasingly important to evaluate the security of these devices. In addition to a smart and connected ecosystem through apps, Smart TV devices expose a WiFi remote protocol, that provides a virtual remote capability and allows a WiFi enabled device (e.g. a Smartphone) to control the Smart TV. The WiFi remote protocol might pose certain security risks that are not present in traditional TVs. In this paper, we assess the security of WiFi remote protocols by first identifying the desired security properties so that we achieve the same level of security as in traditional TVs. Our analysis of four popular Smart TV platforms, Android TV, Amazon FireOS, Roku OS, and WebOS (for LG TVs), revealed that <i>all these platforms violate one or more of the identified security properties</i>. To demonstrate the impact of these flaws, we develop Spook, which uses one of the commonly violated properties of a secure WiFi remote protocol to pair an Android mobile as a software remote to an Android TV. Subsequently, we hijack the Android TV device through the device debugger, enabling complete remote control of the device. All our findings have been communicated to the corresponding vendors. Google <i>acknowledged our findings</i> as a security vulnerability, assigned it a CVE, and released patches to the Android TV OS to partially mitigate the attack. We argue that these patches provide a stopgap solution without ensuring that WiFi remote protocol has all the desired security properties. We design and implement a WiFi remote protocol in the Android ecosystem using ARM TrustZone. Our evaluation shows that the proposed defense satisfies all the security properties and ensures that we have the flexibility of virtual remote without compromising security.</p>
846

Sustainability and its impact on Food Security : An overview using Ordinary Least Squares Regression.

Jansén, Leon January 2024 (has links)
No description available.
847

Security By Design

Tanner, M. James 10 August 2009 (has links)
Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not used to be such a prominent issue because computers were not connected 24/7, they used dialup and did not experience the effects from connecting to multiple computers. Today computers connect to high speed Internet and seem useless without access to email, chat, Internet, and videos. This interconnectedness of computers has allowed the security of many computers to be compromised because they have not been programmatically secured. The core component of computer security might best be done through security layers protecting the operating system. For this research, those who work in the computer field were asked to complete a survey. The survey was used to gather information such as the security layers and enhancements implemented on Linux computers and networks their surrounding network. This research is a stepping stone for further research as to what can be done to further improve upon security and its current implementations. / Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today.
848

Buying to Thrive: Exploring the Potential for Market-Based Approaches to Contribute to Increases in Diet Diversity in Mozambique

Agnew, Jessica L. 04 August 2020 (has links)
Globally, more than two billion people suffer from deficiencies in micronutrients that are essential for human health. Low-income populations in low- and middle-income countries are especially vulnerable to these deficiencies. There are three priority interventions used to reduce micronutrient deficiencies and improve overall nutrition status — supplementation, fortification, and diet diversity. As the share of food purchases made by low-income households has been increasing, there is increasing interest in the role the private sector can play in these interventions. Currently, there is little known about the potential for a market-based approach to contribute to improvements in diet diversity. Proven to be one of the most effective ways of improving nutritional status, increasing diet diversification among low-income populations will be essential for reducing micronutrient deficiencies in the long-term. The purpose of this research is to contribute evidence on the potential for a market-based approach to increase diet diversity among low-income households in Mozambique. This research starts by examining the extent to which low-income consumers in Nampula, Mozambique make diverse food purchases and the amount they are willing to pay for such diversity. Since diet diversification is intended to improve health, the connections between individual-level health constructs and diversity of food purchases is subsequently investigated. These studies are then used as the basis for a participatory community-based intervention that explores if health constructs influence modifications in food purchases and the barriers and enabling factors that exist to using the market to increase household diet diversity. The findings of this work reveal that there is potential for markets to contribute to the diversity of foods consumed by low-income households; however, concerted efforts between the private, public, and civil sectors will likely be required for the success and longevity of market-based approaches. / Doctor of Philosophy / Though we usually think of hunger in terms of not getting enough to eat, there is another form, known as 'hidden hunger', which refers to not eating enough of the right types of foods. This results in not getting enough of the nutrients, such as iron or vitamin A, that are essential for human health and development. People living in low- and middle-income countries (LMICs) are especially vulnerable to this type of hunger, as their diet typically is comprised of calorie-rich but nutrient-deficient foods. One of the most effective ways to reduce hidden hunger, is to eat a variety of foods that are rich in micronutrients (e.g., fruits, vegetables, legumes, meat). In LMICs, governmental and non-governmental organizations (NGOs) have created programs to encourage this so-called 'diet diversity' by encouraging households to produce different types of food crops or plant kitchen gardens. These programs have been successful in increasing diet diversity, however, significant portions of the population in LMICs still lack diversity in their diets. We now know that an increasing number of low-income households in LMICs are purchasing at least some of their foods from markets. Thus, there is increasing interest in the role that businesses and food purchases can play in increasing the diversity of the diet among households that may be suffering from hidden hunger. The purpose of this research was to explore this possibility. First, I investigated if low-income consumers are already purchasing diverse foods from the market in Mozambique, and, if they are, how much are they willing to pay for this diversity. Second, I explored how the diversity of these purchases are related to what individuals believe about the connection between diet diversity and health. Then I conducted a community-based intervention, where low-income households participated in a nutrition and food-purchasing education and worked with facilitators to find ways that worked for them to increase the diversity of the foods they purchased from the market. The findings of this study show that it may be possible to use the market and food purchases to increase the diet diversity of low-income households, but that support from governments and NGOs will likely be required in order to be successful in reducing hidden hunger in the long-term.
849

En utforskning av elektronisk dokumentations säkerhet : Tekniska aspekter av digitala signaturer: Utveckling av en prototyp för elektronisk Dokumentations säkerhet / An exploration of electronic documentation security : Technical aspects of digital signatures: Development of a prototype for electronic document security

Kelati, Jonatan January 2024 (has links)
Denna rapport presenterar ett utvecklingsarbete av standardiserade tillvägagångssätt för att bygga ett ramverk för dokumentsignering. Studien fokuserar på tre olika delar av dokumentsigneringen. De tre delarna är identitetsautentisering, signering och verifiering av signering samt versionshantering. Efter att ha utfört en undersökning konstaterades det att den mest lämpliga lösningen för detta system är att använda X.509v3-certifikat som autentiseringsmetod för identiteter, tillsammans med en PKI( Public Key Infrastructure). För signering och verifiering så används digitala signaturer tillsammans med algoritmerna SHA-2 samt RSA, vilket är två välkända och populära tillvägagångsätt i dessa sammanhang. Andra tillvägagångssätt har diskuterats samt framtida utvecklingsmöjligheter och förbättringar. / This report presents an investigation into different standardized approaches to building a framework for document signing. The study focuses on three different parts of document signing. The three parts are identity authentication, signing and verification of signing and version management. Through the investigation of standards in the market, it was found that a solution using X.509v3 certificates as an authentication method for identities together with a PKI (Public Key Infrastructure) was best suited for this system. For signing and verification, digital signatures are used together with the algorithms SHA-2 and RSA, which are two well-known and popular approaches in these contexts. Other approaches have been discussed as well as future development possibilities and improvements. / Datateknik, Dokumenthantering, Säkerhet, Dokumentsäkerhet
850

Quantitative Assessment on Water-Energy-Food Nexus in South Korea / 韓国における水・エネルギー・食料連環の定量分析

Daehan, An 25 March 2024 (has links)
京都大学 / 新制・課程博士 / 博士(地球環境学) / 甲第25466号 / 地環博第252号 / 新制||地環||50(附属図書館) / 京都大学大学院地球環境学舎地球環境学専攻 / (主査)教授 宇佐美 誠, 准教授 TRENCHER Gregory, 教授 竹内 憲司 / 学位規則第4条第1項該当 / Doctor of Global Environmental Studies / Kyoto University / DFAM

Page generated in 0.0712 seconds