• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6562
  • 1927
  • 919
  • 814
  • 686
  • 373
  • 179
  • 161
  • 154
  • 105
  • 93
  • 81
  • 79
  • 77
  • 76
  • Tagged with
  • 14837
  • 2974
  • 2027
  • 1876
  • 1454
  • 1382
  • 1345
  • 1298
  • 1264
  • 1169
  • 1155
  • 1149
  • 1075
  • 1030
  • 952
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
871

Exploiting Bluetooth Low Energy Pairing Vulnerability in Telemedicine

Zegeye, Wondimu K. 10 1900 (has links)
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV / Telemetry has potentially large contributions to future medical applications. In the past decade wireless devices have invaded the medical area with a wide range of capability as components of a wireless personal area network (WPAN) and Wireless Body Area Network (WBAN). These applications in medical telemetry are not only improving the quality of life of patients and doctor-patient efficiency, but also enabling medical personnel to monitor patients remotely and give them timely health information, reminders, and support-potentially extending the reach of health care by making it available anywhere, anytime. This paper exploits the pairing vulnerability in Bluetooth Low energy (Bluetooth Smart) for HealthCare devices used in medical telemetry applications and demonstrates the key role security plays in telemetry.
872

An inquiry into some of the reasons for the necessity and delays in the implementation of a contributory social security scheme in HongKong

Tso, Yeung, Arthur., 曹讓. January 1982 (has links)
published_or_final_version / Social Work / Master / Master of Social Work
873

Social security for rural China

Chung, Kim-wah., 鍾劍華. January 2004 (has links)
published_or_final_version / Social Work and Social Administration / Doctoral / Doctor of Philosophy
874

Risk management initiatives for post 9/11 maritime security

Metaparti, Satya Prakash. January 2009 (has links)
published_or_final_version / Asian Studies / Doctoral / Doctor of Philosophy
875

What is your password? : Assessing information security awareness among employees in an organisation

Turesson, Michael, Koroliov, Vadim, Brolin, Ola January 2009 (has links)
<p>The development of Information and Communication Technologies has opened up a large pool of possibilities for any and every business actor. These possibilities have brought up new vulnerabilities as well. Information security has become an inherent part of any organization. Companies and organizations invest significant amount of resources in IT security solutions, usually omitting the weakest link of the defense - the people.</p><p>The research intended to study and evaluate the information security awareness level of employees in a public organization which preferred to remain anonymous. This study is based on a mixed-methods approach. A survey was built up and performed, basing on the interview of the employees and the IT Security Chief. The interview intended to give a general picture of the attitude, knowledge and behavior the employees towards information security and its constituent aspects.</p><p>The results of the survey show that the information security awareness at this particular organization has an average performance based on the grading scale determined by the management of the company. Generally speaking, half of the information security focus areas show underdeveloped sense of awareness among employees, whereas the other focus areas are close to perfect. In terms of information security, the research indicates that there is a gap between the employees' theoretical condition and their day to day be-havior. In other words, the theoretical and practical preparation of the employees does not provide an appropriate information security awareness behavior. Some of the reasons for unsecure behavior were complex and sophisticated security designs including passwords; another problem was inherent in the work design which imposed the use of multiple systems and applications in the daily work.</p><p>In the end, the research suggests some recommendations for improvement, as well as practices to sustain a desirable level of information security awareness level. The overall information security awareness program required immediate improvements in order to boost the positive attitude and behavior of employees towards information security, as well as enrich the knowledge of information security in general.</p>
876

Proprietary interests in commercial transactions

Worthington, Sarah Elizabeth January 1995 (has links)
No description available.
877

The properties of revision of earnings forecasts by financial analysts : Canadian evidence

Hennessey, Sean Michael January 1993 (has links)
No description available.
878

The Soviet-Finnish War of 1939-1940

Dyke, Carl Van January 1994 (has links)
No description available.
879

The executive role of the European Commission in the external relations of the European Union

Melis, Demetrios George January 1999 (has links)
No description available.
880

Turning points in Social Security: Explaining legislative change, 1935-1985.

Tynes, Sheryl Renee. January 1988 (has links)
This work is a sociological analysis of factors that led to the political success of old-age insurance in the United States from 1935-1985. Archival documents, the Congressional Record, House Ways and Means and Senate Finance Committee Hearings, and secondary sources were used to piece together the social and political history of the program. The historical record was assessed in light of the pluralist, neo-Marxist and neo-Weberian theoretical frameworks typically utilized to study political change. Two key arguments are put forth. First, analyses that focus on the long-term process of social and political change are required to distinguish between the unique and the general. Other works that focus on isolated time periods cannot make these distinctions. It is also through longitudinal analysis that causality can be determined. Insights gained from a broader time-frame relate to specification of economic, political, and demographic shifts that shape the political agenda. Second, meso-level specification of organizational actors is necessary to assess the logic behind these actors' shifting positions. Organizational theory carries the analysis further than do previous theoretical perspectives, primarily because it specifies which political actors, either inside or outside the polity, attempt to influence their environment. It is through an organizational theory framework that we can determine effective strategies for instituting social change. Finally, using organizational theory and extrapolating from past events, some predictions for the future of Social Security are suggested.

Page generated in 0.0496 seconds