• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 433
  • 38
  • 35
  • 29
  • 19
  • 11
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 4
  • 4
  • Tagged with
  • 757
  • 757
  • 464
  • 347
  • 184
  • 182
  • 159
  • 122
  • 112
  • 112
  • 108
  • 103
  • 100
  • 86
  • 84
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
511

Fatores associados aos eventos adversos em unidade de terapia intensiva / Factors associated with the adverse events in Intensive Care Unit

Toffoletto, Maria Cecilia 12 December 2008 (has links)
A segurança do paciente grave é uma meta da qualidade do atendimento em Unidade de Terapia Intensiva (UTI), daí a necessidade de se investigar os fatores relacionados à ocorrência de eventos adversos nesse contexto. Trata-se este estudo de uma pesquisa quantitativa, retrospectiva, analítico-transversal que teve como objetivo analisar os fatores associados aos incidentes e/ou eventos adversos (INC/EA) no preparo e administração de medicamentos, nos cuidados com tubo endotraqueal/traqueostomia, sondas, drenos, cateteres e queda em UTI segundo as características demográficas e clínicas do paciente e recursos estruturais da Unidade. Os dados foram coletados por meio dos registros de INC/EA dos prontuários dos pacientes que tiveram notificado algum tipo de INC/EA no período de 2003 e 2006, inclusive, em cinco UTI de cinco hospitais do Município de São Paulo. No tratamento estatístico, foi utilizada a análise de regressão logística multivariada para a identificação dos fatores independentes de INC/EA e condições de saída da Unidade. Para a identificação dos fatores independentes do tempo de permanência nas UTI, utilizou-se a análise de regressão linear múltipla. As variáveis que entraram nos modelos foram aquelas que apresentaram na regressão logística univariada um valor de teste Wald<0,20; em todas as análises realizadas foi utilizado o nível de significância de 5%. Do total de 21.230 admissões nas UTI, 377 (1,78%) pacientes sofreram algum tipo de INC/EA. Foram notificadas 461 ocorrências, a maioria relacionada ao preparo e administração de medicamentos (196-42,51%), seguidas aos cateteres periféricos e arteriais (105-22,77%) e às sondas nasogástricas (73-15,83%). Quanto aos fatores associados aos INC/EA e recursos materiais/equipamentos e ambiente físico das unidades, o baixo número de ocorrências (16-2,82%) inviabilizou a análise dessas variáveis. Da mesma forma, nenhum hospital dispunha das escalas diárias de enfermagem com dados retrospectivos sobre os recursos humanos existentes no período do estudo. Verificou-se que o número de dias de permanência dos artefatos terapêuticos foi um dos principais fatores independentes associados aos INC/EA quer no preparo e administração de medicamentos (número de dias de TE/Traq.), quer nos cuidados com cateter periférico, sonda nasogástrica e cateter central (número de dias de artefatos terapêuticos), seguidos da gravidade e da não sobrevivência dos pacientes. Referente ao tempo de permanência na UTI, os fatores associados foram número de dias de sondas, drenos e cateteres, número de itens da prescrição medicamentosa, não sobrevivência e INC/EA com cateteres periféricos e medicamentos. Finalizando, constatou-se que pacientes não sobreviventes tiveram maior número de dias com TE/Traq., eram mais graves e apresentaram, aproximadamente, cinco vezes mais chance de sofrer um INC/EA com TE/Traq.. Considerando que o enfoque da segurança do paciente é de responsabilidade compartilhada de todos os profissionais, da área de saúde ou não, julga-se que os resultados dessa investigação contribuam para a melhoria da assistência ao paciente crítico, por abrir perspectivas para o estabelecimento de protocolos de prevenção dessas ocorrências / The safety of serious patients is a goal of the quality of service in Intensive Care Units (ICUs), therefore, the need to investigate the factors related to the occurrence of adverse events in this context. This study reports a quantitative, retrospective, analytic-transversal research that aimed to analyze the factors associated with the incidents and/or adverse events (INC/AE) in the preparation and administration of medication, in the care of endotracheal/tracheostomy tubes, probes, drains, catheters and fall in ICUs according to the demographic and clinical characteristics of patients and structural resources of the Units. Data was collected from the registry of INC/AE made in the charts of patients that were notified with some type of INC/AE in five ICUs of five hospitals of the City of Sao Paulo from 2003 to 2006. The statistical treatment consisted of an analysis of multivariate logistic regression to identify the independent factors of INC/AE and exit conditions of the Units. The author also ran the multiple linear regression analysis to identify the independent factors of the length of stay in the ICUs. Variables that presented a Wald test rate <0,20 in the univariate logistic regression entered in the models. All analysis adopted a 5% significance level. From 21.230 total admissions in the ICUs, 377 (1,78%) patients suffered some type of INC/AE. A total of 461 occurrences were notified. Most of these occurrences were related to the preparation and administration of medication (196-42,51%), followed by the peripheral catheters and A- lines (105-22,77%), and the nasograstic tubes (73-15,83%). The low number of occurrences (16-2,82%) of factors associated with INC/AE, material/equipment resources and physical settings of the units made the analysis of these variables unfeasible. The same way, no hospital made available daily nursing schedules that contained retrospective data about the existing human resources at the time of the study. The author verified that the number of days of use of therapeutic artifacts was one of the main independent factors associated with INC/AE. These related to the preparation and administration of medication (number of days of TE/Traq.), as well as to the care of peripheral catheters, nasograstic tubes and central catheters (number of days of therapeutic artifacts), followed by seriousness and non-survival of the patients. The factors associated with the length of stay in the ICU were number of days with probes, drains and catheters, number of items of the prescribed medication, non-survival and INC/AE with peripheral catheters and medication. At last, the author established that non-survival patients spent a greater number of days with TE/Traq. They were also more serious and were about five times more likely to suffer INC/AE with TE/Traq. Considering that the focus of a patient safety is shared responsibility of all professionals, from the health field or not, the author considers that the results of this investigation contribute to the improvement of the assistance to critical patients, as it opens perspectives for the establishment of protocols for the prevention of such occurrences
512

Secure mobile radio communication over narrowband RF channel.

January 1992 (has links)
by Wong Chun Kau, Jolly. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1992. / Includes bibliographical references (leaves 84-88). / ABSTRACT --- p.1 / ACKNOWLEDGEMENT --- p.3 / Chapter 1. --- INTRODUCTION --- p.7 / Chapter 1.1 --- Land Mobile Radio (LMR) Communications / Chapter 1.2 --- Paramilitary Communications Security / Chapter 1.3 --- Voice Scrambling Methods / Chapter 1.4 --- Digital Voice Encryption / Chapter 1.5 --- Digital Secure LMR / Chapter 2. --- DESIGN GOALS --- p.20 / Chapter 2.1 --- System Concept and Configuration / Chapter 2.2 --- Operational Requirements / Chapter 2.2.1 --- Operating conditions / Chapter 2.2.2 --- Intelligibility and speech quality / Chapter 2.2.3 --- Field coverage and transmission delay / Chapter 2.2.4 --- Reliability and maintenance / Chapter 2.3 --- Functional Requirements / Chapter 2.3.1 --- Major system features / Chapter 2.3.2 --- Cryptographic features / Chapter 2.3.3 --- Phone patch facility / Chapter 2.3.4 --- Mobile data capability / Chapter 2.4 --- Bandwidth Requirements / Chapter 2.5 --- Bit Error Rate Requirements / Chapter 3. --- VOICE CODERS --- p.38 / Chapter 3.1 --- Digital Speech Coding Methods / Chapter 3.1.1 --- Waveform coding / Chapter 3.1.2 --- Linear predictive coding / Chapter 3.1.3 --- Sub-band coding / Chapter 3.1.4 --- Vocoders / Chapter 3.2 --- Performance Evaluation / Chapter 4. --- CRYPTOGRAPHIC CONCERNS --- p.52 / Chapter 4.1 --- Basic Concepts and Cryptoanalysis / Chapter 4.2 --- Digital Encryption Techniques / Chapter 4.3 --- Crypto Synchronization / Chapter 4.3.1 --- Auto synchronization / Chapter 4.3.2 --- Initial synchronization / Chapter 4.3.3 --- Continuous synchronization / Chapter 4.3.4 --- Hybrid synchronization / Chapter 5. --- DIGITAL MODULATION --- p.63 / Chapter 5.1 --- Narrowband Channel Requirements / Chapter 5.2 --- Narrowband Digital FM / Chapter 5.3 --- Performance Evaluation / Chapter 6. --- SYSTEM IMPLEMENTATION --- p.71 / Chapter 6.1 --- Potential EMC Problems / Chapter 6.2 --- Frequency Planning / Chapter 6.3 --- Key Management / Chapter 6.4 --- Potential Electromagnetic Compatibility (EMC) Problems / Chapter 7. --- CONCLUSION --- p.80 / LIST OF ILLUSTRATIONS --- p.81 / REFERENCES --- p.82 / APPENDICES --- p.89 / Chapter I. --- Path Propagation Loss(L) Vs Distance (d) / Chapter II. --- Speech Quality Assessment Tests performed / by Special Duties Unit (SDU)
513

Distributed file systems in an authentication system

Merritt, John W January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries / Department: Computer Science.
514

Analysis of security issues in cloud based e-learning

Kumar, Gunasekar, Chelikani, Anirudh January 2011 (has links)
Cloud based E-Learning is one of the booming technologies in IT field which brings powerful e-learning products with the help of cloud power. Cloud technology has numerous advantages over the existing traditional E-Learning systems but at the same time, security is a major concern in cloud based e-learning. So security measures are unavoidable to prevent the loss of users’ valuable data from the security vulnerabilities. Cloud based e-learning products also need to satisfy the security needs of customers and overcome various security threats which attack valuable data stored in cloud servers.So the study investigates various security issues involved in cloud based e-learning technology with an aim to suggest solutions in the form of security measures and security management standards. These will help to overcome the security threats in cloud based e-learning technology. To achieve our thesis aim, we used theoretical and empirical studies. Empirical study is made through the information gathered through various cloud based e-learning solution vendors websites. And the theoretical study is made through the text analysis on various research articles related to our subject areas. And finally the constant comparative method is used to compare the empirical findings with the facts discovered from our theoretical findings. These analysis and research studies are leads to find various security issues in cloud based e-learning technology. / Program: Magisterutbildning i informatik
515

Citizen participation in crime prevention : the case of residential patrols and guards

Radasky, Toby Gayle January 1976 (has links)
Thesis. 1976. M.C.P.--Massachusetts Institute of Technology. Dept. of Urban Studies and Planning. / Microfiche copy available in Archives and Rotch. / Bibliography: leaves 129-133. / by Toby G. Radasky. / M.C.P.
516

Embedded System Security: A Software-based Approach

Cui, Ang January 2015 (has links)
We present a body of work aimed at understanding and improving the security posture of embedded devices. We present results from several large-scale studies that measured the quantity and distribution of exploitable vulnerabilities within embedded devices in the world. We propose two host-based software defense techniques, Symbiote and Autotomic Binary Structure Randomization, that can be practically deployed to a wide spectrum of embedded devices in use today. These defenses are designed to overcome major challenges of securing legacy embedded devices. To be specific, our proposed algorithms are software- based solutions that operate at the firmware binary level. They do not require source-code, are agnostic to the operating-system environment of the devices they protect, and can work on all major ISAs like MIPS, ARM, PowerPC and X86. More importantly, our proposed defenses are capable of augmenting the functionality of embedded devices with a plethora of host-based defenses like dynamic firmware integrity attestation, binary structure randomization of code and data, and anomaly-based malcode detection. Furthermore, we demonstrate the safety and efficacy of the proposed defenses by applying them to a wide range of real- time embedded devices like enterprise networking equipment, telecommunication appliances and other commercial devices like network-based printers and IP phones. Lastly, we present a survey of promising directions for future research in the area of embedded security.
517

Data security and reliability in cloud backup systems with deduplication.

January 2012 (has links)
雲存儲是一個新興的服務模式,讓個人和企業的數據備份外包予較低成本的遠程雲服務提供商。本論文提出的方法,以確保數據的安全性和雲備份系統的可靠性。 / 在本論文的第一部分,我們提出 FadeVersion,安全的雲備份作為今天的雲存儲服務上的安全層服務的系統。 FadeVersion實現標準的版本控制備份設計,從而消除跨不同版本備份的冗餘數據存儲。此外,FadeVersion在此設計上加入了加密技術以保護備份。具體來說,它實現細粒度安全删除,那就是,雲客戶可以穩妥地在雲上删除特定的備份版本或文件,使有關文件永久無法被解讀,而其它共用被删除數據的備份版本或文件將不受影響。我們實現了試驗性原型的 FadeVersion並在亞馬遜S3之上進行實證評價。我們證明了,相對於不支援度安全删除技術傳統的雲備份服務 FadeVersion只增加小量額外開鎖。 / 在本論文的第二部分,提出 CFTDedup一個分佈式代理系統,利用通過重複數據删除增加雲存儲的效率,而同時確保代理之間的崩潰容錯。代理之間會進行同步以保持重複數據删除元數據的一致性。另外,它也分批更新元數據減輕同步帶來的開銷。我們實現了初步的原型CFTDedup並通過試驗台試驗,以存儲虛擬機映像評估其重複數據删除的運行性能。我們還討論了幾個開放問題,例如如何提供可靠、高性能的重複數據删除的存儲。我們的CFTDedup原型提供了一個平台來探討這些問題。 / Cloud storage is an emerging service model that enables individuals and enterprises to outsource the storage of data backups to remote cloud providers at a low cost. This thesis presents methods to ensure the data security and reliability of cloud backup systems. / In the first part of this thesis, we present FadeVersion, a secure cloud backup system that serves as a security layer on top of todays cloud storage services. FadeVersion follows the standard version-controlled backup design, which eliminates the storage of redundant data across different versions of backups. On top of this, FadeVersion applies cryptographic protection to data backups. Specifically, it enables ne-grained assured deletion, that is, cloud clients can assuredly delete particular backup versions or files on the cloud and make them permanently in accessible to anyone, while other versions that share the common data of the deleted versions or les will remain unaffected. We implement a proof-of-concept prototype of FadeVersion and conduct empirical evaluation atop Amazon S3. We show that FadeVersion only adds minimal performance overhead over a traditional cloud backup service that does not support assured deletion. / In the second part of this thesis, we present CFTDedup, a distributed proxy system designed for providing storage efficiency via deduplication in cloud storage, while ensuring crash fault tolerance among proxies. It synchronizes deduplication metadata among proxies to provide strong consistency. It also batches metadata updates to mitigate synchronization overhead. We implement a preliminary prototype of CFTDedup and evaluate via test bed experiments its runtime performance in deduplication storage for virtual machine images. We also discuss several open issues on how to provide reliable, high-performance deduplication storage. Our CFTDedup prototype provides a platform to explore such issues. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Rahumed, Arthur. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2012. / Includes bibliographical references (leaves 47-51). / Abstracts also in Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Cloud Based Backup and Assured Deletion --- p.1 / Chapter 1.2 --- Crash Fault Tolerance for Backup Systems with Deduplication --- p.4 / Chapter 1.3 --- Outline of Thesis --- p.6 / Chapter 2 --- Background and Related Work --- p.7 / Chapter 2.1 --- Deduplication --- p.7 / Chapter 2.2 --- Assured Deletion --- p.7 / Chapter 2.3 --- Policy Based Assured Deletion --- p.8 / Chapter 2.4 --- Convergent Encryption --- p.9 / Chapter 2.5 --- Cloud Based Backup Systems --- p.10 / Chapter 2.6 --- Fault Tolerant Deduplication Systems --- p.10 / Chapter 3 --- Design of FadeVersion --- p.12 / Chapter 3.1 --- Threat Model and Assumptions for Fade Version --- p.12 / Chapter 3.2 --- Motivation --- p.13 / Chapter 3.3 --- Main Idea --- p.14 / Chapter 3.4 --- Version Control --- p.14 / Chapter 3.5 --- Assured Deletion --- p.16 / Chapter 3.6 --- Assured Deletion for Multiple Policies --- p.18 / Chapter 3.7 --- Key Management --- p.19 / Chapter 4 --- Implementation of FadeVersion --- p.20 / Chapter 4.1 --- System Entities --- p.20 / Chapter 4.2 --- Metadata Format in FadeVersion --- p.22 / Chapter 5 --- Evaluation of FadeVersion --- p.24 / Chapter 5.1 --- Setup --- p.24 / Chapter 5.2 --- Backup/Restore Time --- p.26 / Chapter 5.3 --- Storage Space --- p.28 / Chapter 5.4 --- Monetary Cost --- p.29 / Chapter 5.5 --- Conclusions --- p.30 / Chapter 6 --- CFTDedup Design --- p.31 / Chapter 6.1 --- Failure Model --- p.31 / Chapter 6.2 --- System Overview --- p.32 / Chapter 6.3 --- Distributed Deduplication --- p.33 / Chapter 6.4 --- Crash Fault Tolerance --- p.35 / Chapter 6.5 --- Implementation --- p.36 / Chapter 7 --- Evaluation of CFTDedup --- p.37 / Chapter 7.1 --- Setup --- p.37 / Chapter 7.2 --- Experiment 1 (Archival) --- p.38 / Chapter 7.3 --- Experiment 2 (Restore) --- p.39 / Chapter 7.4 --- Experiment 3 (Recovery) --- p.40 / Chapter 7.5 --- Summary --- p.41 / Chapter 8 --- Future work and Conclusions of CFTDedup --- p.43 / Chapter 8.1 --- Future Work --- p.43 / Chapter 8.2 --- Conclusions --- p.44 / Chapter 9 --- Conclusion --- p.45 / Bibliography --- p.47
518

Dynamic capabilities and strategic management : explicating the multi-level nature of dynamic capabilities : insights from the information technology security consulting industry

Akpobi, Tega Cosmos January 2017 (has links)
The dynamic capabilities perspective has become one of the most vibrant approaches to strategic management. Despite its growing popularity, it has faced criticism because of ambiguity and contradictions in dynamic capabilities literature. There has been increasing calls to address the fragmentation in the literature and provide empirically collaborated insights if it is to fulfil its potential as a distinct approach to strategic management. The microfoundations research agenda remains an emerging theme in the dynamic capabilities literature and since the overarching emphasis of a microfoundational approach is in the explanatory primacy of the micro-level especially in its relation to macro-level entities, it covers a wide array of subjects at several levels. One of the main criticisms of the microfoundations approach is a lack of multi-level analysis and there has been calls for multi-level theory development to connect levels within particular contexts since dynamic capabilities are path dependent and context-specific. This thesis explores the multi-level nature of dynamic capabilities in the Information Technology Security context and empirically investigates the impact of microfoundations of dynamic capabilities on firm capability renewal and reconfiguration. It overcomes the challenge associated with fragmentation in dynamic capabilities by presenting a conceptual model for the multi-level nature of dynamic capabilities. By explicating where dynamic capabilities reside, we can more purposely impact on them to advance our scholarly understanding and proffer practical managerial interventions to directly enhance specific abilities of sensing, seizing and reconfiguring to achieve superior outcomes. The research employed the Gioia qualitative case study research methodology and research methods used were 35 semi-structured interviews and observations. The research findings suggest that firms renew and reconfigure their capabilities to align with the changing industry and industry standards, and client needs. Firms also renew and reconfigure capabilities and capability framework due to internal strategic organisational learning and to align with firm’s specific business strategies. Capability renewal and reconfiguration is vital to achieve technical and evolutionary fitness. In addition, findings inform that dynamic capabilities in the form of ability to sense, seize and reconfigure exhibit at macro, meso and micro levels. Actor’s external engagement with significant institutions enables superior sensing ability. Accumulated experience is exploited to gain credibility with clients to win business, and demystifying firm processes and clarity of language in firm artefacts achieve superior knowledge articulation and codification processes by actors. Structuring of simple routines and capabilities enable ease of internal knowledge transfer but susceptibility to intellectual property theft by outsiders whereas complex routines and capabilities create challenges for knowledge transfer but are harder for competitors to discern and copy. Drawing on the research findings, the thesis presents a conceptual model for the multi-level microfoundations of dynamic capabilities in knowledge-intensive domains with relevance for theory and practice.
519

Using Machine Learning to improve Internet Privacy

Zimmeck, Sebastian January 2017 (has links)
Internet privacy lacks transparency, choice, quantifiability, and accountability, especially, as the deployment of machine learning technologies becomes mainstream. However, these technologies can be both privacy-invasive as well as privacy-protective. This dissertation advances the thesis that machine learning can be used for purposes of improving Internet privacy. Starting with a case study that shows how the potential of a social network to learn ethnicity and gender of its users from geotags can be estimated, various strands of machine learning technologies to further privacy are explored. While the quantification of privacy is the subject of well-known privacy metrics, such as k-anonymity or differential privacy, I discuss how some of those metrics can be leveraged in tandem with machine learning algorithms for purposes of quantifying the privacy-invasiveness of data collection practices. Further, I demonstrate how the current notice-and-choice paradigm can be realized by automatic machine learning privacy policy analysis. The implemented system notifies users efficiently and accurately on applicable data practices. Further, by analyzing software data flows users are enabled to compare actual to described data practices and regulators can enforce those at scale. The emerging cross-device tracking practices of ad networks, analytics companies, and others can be supplemented by machine learning technologies as well to notify users of privacy practices across devices and give them the choice they are entitled to by law. Ultimately, cross-device tracking is a harbinger of the emerging Internet of Things, for which I envision intelligent personal assistants that help users navigating through the increasing complexity of privacy notices and choices.
520

Computer security and the bank security officer : "You are required to render it secure"

Glavin, Howard E. 03 June 2011 (has links)
This thesis has taken an in-depth look into bank computer security, the bank security officer, and "The 1968 Bank Protection Act."To accomplish this, a questionnaire was developed and furnished to all bank members of the Indiana Bankers Association to be responded to by the bank security officers. This document was based on the premise that this bank officer is ill-trained, overworked by unrelated duties, and generally not interested in security."The 1968 Bank Protection Act" made this officer's position a legal requirement to maintain its banking operation and charged this officer with certain duties.The resultant responses verified the original hypothesis and showed a need for future training.This thesis shows the profile of, a computer criminal and also some cases to illustrate the type and scope of criminal ventures related to bank computer facilities. This was all coupled with an analysis of the law as it applies and offers a training vehicle to bring this officer up to a level of competency in this field.Ball State UniversityMuncie, IN 47306

Page generated in 0.0714 seconds