• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 433
  • 38
  • 35
  • 29
  • 19
  • 11
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 4
  • 4
  • Tagged with
  • 757
  • 757
  • 464
  • 347
  • 184
  • 182
  • 159
  • 122
  • 112
  • 112
  • 108
  • 103
  • 100
  • 86
  • 84
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
641

Users’ perceptions on security of mobile computing for adoption of e-applications in South Africa

Mapande, Fhatuwani Vivian January 2018 (has links)
M.Tech (Department of Information technology, Faculty of Applied and Computer Science), Vaal University of Technology. / The advancement of technology, particularly in the area of mobile computing, revolutionizes the way business is done in many industries such as the education sector, government sector, financial institutions, retail sector and the way people conduct their daily activities. The current technology provides influential tools for organisations and can significantly influence their operation, structure and approach. The development of mobile computing has created a new innovation for various industries by increasing the availability, frequency and speed of communication between the organisations and the individuals. However, users’ perceptions can play an important role towards the adoption of these new developments. The overriding purpose of this study was to investigate the users’ perceptions on the security of mobile computing in South Africa for adoption of e-applications. The literature review was concentrated on the process of progressive development occurring during the study. To accomplish that goal it became necessary to reach some essential objectives i.e. investigating the users’ perceptions models in literature. For the purpose of the study, it was important to propose a research framework for users’ perceptions on the security of mobile computing with the potential for the adoption of e-applications in South Africa. The research evaluated the proposed framework to establish if there is any relationship between the e-application adoption factors. Furthermore, the hypotheses were tested to determine which factors would influence the adoption of e-applications in South Africa. Technology Adoption Model 2 (TAM2) and Diffusion of Innovation (DOI) provide the theoretical basis for explaining how users perceive e-application services that they access and operate through mobile computing. To achieve that, a quantitative study was conducted with South African residents, with respect to mobile security perceptions; 476 valid questionnaires were received from the participants who were selected non-randomly. Questionnaires were developed from the proposed research framework derived from DOI and TAM2 and the items were adopted from other prior technology adoption studies. Through the use of the survey instrument developed for this study, data were collected in order to address the importance of this study based on the problem statement posed in the first chapter of this dissertation. The valid questionnaires were analysed by using the Statistical Package for the Social Sciences (SPSS), Version 24.0. Reliability analysis, principal component analysis, correlations and multiple linear regression tests were conducted. Among other things this study made sure that ethical considerations are adhered to. The findings revealed positive relationships between perceived usefulness of security mechanisms, perceived ease of use of security mechanisms, subjective norm on security mechanisms, relative advantage of security mechanisms, compatibility of security mechanisms, complexity of security mechanisms, aesthetics of security mechanisms interface and intention to adopt e-applications. Furthermore, subjective norm on security mechanisms was strongly correlated to intention to adopt e-applications, complexity of security mechanisms strongly correlated to perceived usefulness of security mechanisms, relative advantage of security mechanisms and aesthetic of security mechanisms interface strongly correlated to perceived usefulness of security mechanisms. In addition, subjective norm of security mechanisms strongly influence intention to adopt eapplications in South Africa. Also, aesthetics of security mechanisms interface strongly influence both perceived usefulness of security mechanisms and perceived ease of use of security mechanisms. The reason behind it may be interpreted as users nowadays seeing the beauty as the platform to attract and encourage them to use e-applications. Finally, the proposed model analysis and survey evaluation will enable South African organizations to make informed decisions about the use of e-applications services. These findings contribute to a road map for the education sector, government sector, financial institutions, and retail sector as well as to encourage their customers or clients to adopt e-applications.
642

Bezpečnostní opatření proti extrémizmu v Bosně a Hercegovině: prostor pro zlepšení? / Extremism-countering security measures in Bosnia-Herzegovina: Room for improvement?

Karabin, Kevin January 2018 (has links)
1 Abstract This diploma thesis' aim was to find out what are the security measures countering radicalization and extremism in Bosnia-Herzegovina and whether there is any room for improvement. Firstly, the thesis analysed several official documents related to the security of Bosnia-Herzegovina and the relevant reports of the international community, in order to review the concrete security measures and compared them with security measures, which are in effect in other European countries. This allowed the author to draw specific security recommendation for Bosnia-Herzegovina based on the best-practices from abroad. Secondly, this thesis provides the opinions of three experts on Bosnia-Herzegovina and its internal situation. The experts assessed the security situation in the country, identified the areas of security which shall be enhanced and proposed concrete measures, which could elevate the security situation in the country. This thesis's main assumption was that the security measures currently in effect are insufficient and that there is much room for improvement. The analysis of the documents showed that there are many specific security measures, in terms of fighting radicalisation of youth, online radicalisation or religious extremism, which are used abroad, that could be implemented to...
643

Towards a framework to ensure alignment among information security professionals, ICT security auditors and regulatory officials in implementing information security in South Africa

Basani, Mandla 02 1900 (has links)
Information security in the form of IT governance is part of corporate governance. Corporate governance requires that structures and processes are in place with appropriate checks and balances to enable directors to discharge their responsibilities. Accordingly, information security must be treated in the same way as all the other components of corporate governance. This includes making information security a core part of executive and board responsibilities. Critically, corporate governance requires proper checks and balances to be established in an organisation; consequently, these must be in place for all information security implementations. In order to achieve this, it is important to have the involvement of three key role players, namely information security professionals, ICT security auditors and regulatory officials (from now on these will be referred to collectively as the ‘role players’). These three role players must ensure that any information security controls implemented are properly checked and evaluated against the organisation’s strategic objectives and regulatory requirements. While maintaining their individual independence, the three role players must work together to achieve their individual goals with a view to, as a collective, contributing positively to the overall information security of an organisation. Working together requires that each role player must clearly understand its individual role, as well the role of the other players at different points in an information security programme. In a nutshell, the role players must be aligned such that their involvement will deliver maximum value to the organisation. This alignment must be based on a common framework which is understood and accepted by all three role players. This study proposes a South African Information Security Alignment (SAISA) framework to ensure the alignment of the role players in the implementation and evaluation of information security controls. The structure of the SAISA framework is based on that of the COBIT 4.1 (Control Objectives for Information and Related Technology). Hence, the SAISA framework comprises four domains, namely, Plan and Organise Information Security (PO-IS), Acquire and Implement Information Security (AI-IS), Deliver and Support Information Security (DS-IS) and Monitor and Evaluate Information Security (ME-IS). The SAISA framework brings together the three role players with a view to assisting them to understand their respective roles, as well as those of the other role players, as they implement and evaluate information security controls. The framework is intended to improve cooperation among the role players by ensuring that they view each other as partners in this process. Through the life cycle structure it adopts, the SAISA framework provides an effective and efficient tool for rolling out an information security programme in an organisation / Computer Science / M. Sc. (Computer Science)
644

A holistic model to create organizational information security awareness programs – iSAP

Rydefelt Calatayud, Leonor January 2011 (has links)
There is a large number of information security awareness programs (iSAP) found in the literature with multiple approaches. Considering that the number of security breaches performed by insiders is as high as 48%, the effectiveness of such programs is questionable. This leaves a considerable space for external, but also internal criminals, to perform and succeed in their attacks, something that can cause heavy losses (both economical and less tangible as reputation) to organizations. This thesis decided to study some of those iSAP to see their strengths and weaknesses. After studying the approaches in focus for this thesis, and following an inductive research method, a new model to develop iSAP from a holistic point of view was presented. The solution has been aligned with subject matter experts (SME) at “Company X” and with end-users external to that company. The model is now ready to be studied empirically in organizations to evaluate its effectiveness.
645

Selected antecedents towards the acceptance of m-payment services and the relationship with attitude and future intentions

Makokoe, Isaac 01 March 2017 (has links)
M. Tech. (Marketing, Faculty of Management Sciences), Vaal University of Technology / Keywords: Mobile payments, usefulness, ease of use, security, attitude, future intentions. An increased reliance on mobile phones by consumers for making retail purchases has been witnessed over the years. Given the pervasive use of m-payments and the incessant diffusion of innovations in South Africa, it is important for marketers to have knowledge of the right set of factors that enhance consumers’ intent towards favouring m-payments in future encounters. This study draws from the undertones of Davis’s (1989) Technology acceptance Model (TAM). Whereas the theory alludes to the influences of both usefulness and ease of use on consumer attitudes and behaviour, this study further amplifies the salience of cosumer perceptions of security as a salient drive towards m-payment acceptance. This is because m-payments involve moneybased transactions and therefore it is important for consumers to have assurance that they operate along a secure platform. The TAM was nominated as the underlying theory in this research owing to its effectiveness when applied during the initial phases of an innovation, to avoid costly mistakes of implementing innovation attributes that do not offer the requiredset of elements for persuading consumers. The purpose of this study was to test an integrative research model of the antecedents of mpayment acceptance using a South African sample of consumers. A quantitative study comprising a non-probability snowball sample of 474 consumers aged between 18 and 50 years was conducted in 2016, in and around the five major towns of Southern Gauteng province in South Africa. The structured questionnaire requested respondents to indicate their perceptions regarding the usefulness, ease of use and security of m-payment platforms they have utilised. In addition, the questionnaire relates to consumers’ attitude evaluations of m-payments in general, as well as their intentions to both use and recommending m-payments to others in the future. Initially, descriptive statistics were performed on the data set, including correlation analysis and multicolinearity testing. Subsequently, structural equation modelling was applied by first, assessing the measurement model using fit indices, confirmatory factor analysis and statistical accuracy tests of reliability and validity. Specification of the measurement model led to the conclusion that the future intentions model was a five-factor structure comprising usefulness, ease of use, security, attitude and future intentions. Thereafter, the results of the structural model (Structural model A) supported the existence of a direct influence between usefulness and security with attitude, while the latter was found to have a direct influence on future intentions. Nevertheless, the relationships between ease of use and attitude was not significant and therefore, alternative hypothesis Ha3 could not be supported in this study leading to the need to specify a vi subsequent competing model. Under Structural model B, perceived usefulness is used as both a dependent and an independent variable since it is predicted by perceived ease of use and in turn predicts attitude towards using and behavioural intention to use simultaneously. The results of Structural model B led to the decision to accept the competing model as the ultimate model for this research since the model presents complete evidence of path weights that are greater than 0.20, interpreted as evidence for significant path outcomes. Insights gained from this study could assist both marketing academics and practitioners to understand the perceptions of consumers towards m-payments. In this regard, if a determination is made that conducting m-payment transactions in secure and effort-free environments could enhance the effectiveness of consumers in their jobs and lives in general, then marketers could be in a better position to deliver a worthwhile innovation solution for South African consumers.
646

Krajní pravice jako problém Policie České republiky od roku 1989 / Far-right as the problem of Czech police since 1989

Horová, Nikola January 2015 (has links)
Thesis closely deals with two heavily discussed aspects of contemporary society, that are very strongly inter-connected. The first aspect of society is the problem of right-wing radicalism and extremism in Czech republic, which manifests itself by xenophobic and hateful behavior, which then disrupts public order and therefore is related to Police of Czech republic, whose job is to prevent the ruptures in order. Thesis deals with development of extremism and Police of Czech republic since 1989 and how the police reacts to this development by adequately improving its equipment, tactics, etc. The year 1989 has been set because it is the year when political regime changed and new rules in society were established. Organizational structure of the police itself is discussed in detail, considering their interventions at events organized by right-wing radicals and extremists, which nowadays most often take form of demonstrations and meetings. Keywords The Police of the Czech Republic, radikalism, extremism, gathering, order police units, anti-conflict team, security measures.
647

The design of an effective extreme controller mechanism scheme for software defined cognitive radio network

Sibanda, Brian January 2021 (has links)
Thesis( M. A. (Computer Science)) -- University of Limpopo , 2021 / In Software Defined Cognitive Radio Network (SDCRN), network security is a significant issue. This issue arises when Software Defined Network (SDN) architecture integrates with the Cognitive Radio Network (CRN) technology. SDN is designed to improve network resource management, while CRN technology is meant at improving spectrum management. These technologies are vulnerable to several malicious attacks. These attacks include Distributed Denial of Service (DDoS) and Primary User Emulation (PUE). Both the DDoS and PUE can be disrupt services in the SDCRN. To curb these attacks, schemes which hardens the security of SDCRN need to be designed. Thus, in this study we propose a security mechanism called Extreme_Controller_Mechanism (XCM) that reduce the effects of DDoS and PUE. The proposed XCM scheme was designed and evaluated in three simulation environment, the OMNeT++, Octave, and MATLAB simulators. The SDCRN data set was generated using the Neural Network back propagation algorithms. The data set was then used in Matlab to evaluate the effectiveness of the prosed XCM scheme. XCM proved to be effective and efficient at detection and prevention of DDoS and PUE attacks in SDCRN. In terms of memory and processor utilisation, XCM proved to the best when compared to other schemes such as the Advanced Support Vector Machine (ASVM) and deep learning convolution network (CDLN). But in terms of detection time, the ASVM was found to be the best performing scheme. Regarding our test for detection rate, false positive and false negative, the XCM, ASVM and CDLM performed the same. The results of the XCM were therefore the best and superior to the ASVM and CDLM. This can be attributed to the fact that the XCM scheme is optimised for DDoS and PUE attacks. We can therefore conclude that our XCM scheme is the best performing scheme compared to the ASVM and CDLN schemes.
648

Campus Sexual Assault: How Oregon University System Schools Respond

Murphy, Michael William 01 January 2011 (has links)
College is usually thought of as a time where students, often living alone for their first time, are encouraged towards healthy risk-taking behavior, as well as social, intellectual, and vocational development. Unfortunately for female students, college becomes the time of their lives where they are exposed to the highest risk of sexual victimization. Many colleges across America have taken steps to address the significant problem of sexual assault on their campuses. However, even with rising concern about the sexual victimization of college students, there remains very little systematic information published about the content of sexual assault policies, protocols and programs that exist on college campuses. Focusing on the seven schools of the Oregon University System (OUS), this study sought to examine the schools' sexual assault policies, as well as their prevention and response efforts to sexual assault. Additionally schools' willingness for assistance and training from Oregon Sexual Assault Task Force (OSATF) was also studied. Specifically, official school sexual assault policies were content analysis and secondary survey data gathered by the OSATF was examined. Results demonstrated that, in most cases, policies of the OUS schools were vague in their definitions of what constituted a sexual assault, and lacked the additional information necessary for victims to respond to their sexual victimization. However, Universities also offered various forms of educational opportunities and awareness raising activities. While this proves promising, there is clearly room for improvement. OUS schools also appeared willing to work with the OSATF to improve the delivery of their sexual assault prevention services. The findings of this thesis are important in directing future actions of the OUS when developing and implementing sexual assault response and prevention strategies.
649

Particle swarm optimization applied to real-time asset allocation

Reynolds, Joshua 05 1900 (has links)
Particle Swam Optimization (PSO) is especially useful for rapid optimization of problems involving multiple objectives and constraints in dynamic environments. It regularly and substantially outperforms other algorithms in benchmark tests. This paper describes research leading to the application of PSO to the autonomous asset management problem in electronic warfare. The PSO speed provides fast optimization of frequency allocations for receivers and jammers in highly complex and dynamic environments. The key contribution is the simultaneous optimization of the frequency allocations, signal priority, signal strength, and the spatial locations of the assets. The fitness function takes into account the assets' locations in 2 dimensions, maximizing their spatial distribution while maintaining allocations based on signal priority and power. The fast speed of the optimization enables rapid responses to changing conditions in these complex signal environments, which can have real-time battlefield impact. Results optimizing receiver frequencies and locations in 2 dimensions have been successful. Current run-times are between 450ms (3 receivers, 30 transmitters) and 1100ms (7 receivers, 50 transmitters) on a single-threaded x86 based PC. Run-times can be substantially decreased by an order of magnitude when smaller swarm populations and smart swarm termination methods are used, however a trade off exists between run-time and repeatability of solutions. The results of the research on the PSO parameters and fitness function for this problem are demonstrated.
650

Passengers' protection and rights in international civil aviation

Balasubramaniam, Usha. January 2007 (has links)
No description available.

Page generated in 0.0667 seconds