• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 433
  • 38
  • 35
  • 29
  • 19
  • 11
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 4
  • 4
  • Tagged with
  • 757
  • 757
  • 464
  • 347
  • 184
  • 182
  • 159
  • 122
  • 112
  • 112
  • 108
  • 103
  • 100
  • 86
  • 84
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
701

Water security and its importance in protecting public health

Ramirez, Christina M. 01 January 2012 (has links) (PDF)
The need for access to clean, healthy water is a subject that surrounds the world. The United States is fortunate to have the latest technology for access to water and treatment of water; however, one subject that hits at the heart of the nation is water security. A breach in the water systems in the U.S. would cause direct public harm because the population relies on water to sustain life. Protecting potable water systems is necessary because of natural disasters, but it has gained importance since the September 11, 2001 attacks on the U.S. Threats on the water systems from intentional attacks cause high risk in affecting public health. Water Security is an area of defense that has recently been evolving and research in this subject has increased. Detection methods are of high importance in protecting from contamination. This thesis determines the most detrimental contaminants; discusses the importance of detection methods, sensor networks, and Contamination Warning Systems (CWS); provides prevention and detection devices currently available; and explains in depth the threats, prevention, detection, response, and rehabilitation associated with water contamination events. NOTE: Both archival copies of the manuscript were missing pages 208-210.
702

Exploring the sensitivity of Biometric Data: A Comparative Analysis of Theoretical and Human Perspectives

Jose, Dayona January 2024 (has links)
Biometric technology, leveraging distinctive physiological or behavioral traits for identification, has transformed authentication methods. This thesis explores biometric data sensitivity from theoretical and human perspectives. Theoretical analysis examines factors like uniqueness, permanence, and potential misuse, while empirical research surveys societal attitudes towards biometric sensitivity. Discrepancies between theoretical constructs and real-world perceptions underscore the complexity of this issue. Privacy, security, and trust emerge as central concerns, emphasizing the need for comprehensive approaches in biometric technology development and policy-making. The discussion interprets survey findings, highlighting implications for stakeholders. Future research could explore cultural influences on biometric perceptions, conduct longitudinal studies, and investigate innovative solutions to privacy and security concerns. Collaboration between academia, industry, and policymakers is crucial for advancing biometric technology ethically and responsibly in an increasingly digital world.
703

Jewellery store robbery: a victim risk and intervention perspective

Zannoni, Elio 30 April 2008 (has links)
The exploratory study investigated jewellery store robbery from a victim risk and intervention perspective. An explanation of the phenomenon was offered based on the information obtained from a review of the existing literature, case studies, personal observations at jewellery stores, discussions with jewellers, a scientific questionnaire submitted to jewellers, and semi-structured and structured interviews conducted with a group of knowledgeable respondents and victimised jewellers respectively. A predominantly quantitative research method was applied. The research findings obtained during the study enabled a proposal for a jewellery store robbery intervention model based on the situational crime prevention perspective, which is inclusive of decisional, environmental, situational, procedural, personnel and business-oriented strategies. / Criminology / M.A. (Criminology)
704

Kriminologiese analise van sekuriteitrisiko's binne die kommersiële produksiegebied van Transvaal Suiker Beperk

Kruger, Johannes Frederick Eric 30 November 2004 (has links)
This research focusses on crime prevention on farms with Transvaal Sugar Limited as a selected study. The printed media, quantitative and qualitative research principles were used to gather data and to determine to what extend crime is experienced by the respondents. The primary aim of the quantitative research principles is to investigate the nature and extent of crime on the company`s agricultural sites. Existing crime prevention measures on the different agricultural sites are also evaluated and recommendations made where necessary. Interviews with various respondents brought to the fore interesting opinions related to crime based on the empirical-phenomenological method. The support farmers received from the SAPS is discussed in full. The value of the primary physical barriers or obstructions with regard to crime prevention were emphasised in this study. Without the support of conventional electronics, together with the inputs of the human factor, physical crime prevention measures will be of little value, especially on geographical far reached agricultural estates. Farm attacks as a separate phenomenon is part of this study and serves as a comprehensive discussion regarding media reports and previous research on this subject. The ADSC crime prevention model is developed as a result of this study with the aim of contributing to the prevention of crime on farms. Good interpersonal and loyal attitudes are identified as key factors on which the farmers must concentrate in order to prevent crime. / Criminology / D. Litt. et Phil.(Criminology)
705

An investigation of safety and security measures at secondary schools in Tshwane, South Africa

Van Jaarsveld, Leandri 11 1900 (has links)
Violence in schools creates a climate of insecurity and fear, which impairs and impacts on the core educational purpose of schools. Accordingly, the main purpose of installing and implementing security measures at schools is to create a safer environment wherein individuals can move freely and feel secure in going about their daily schooling activities. The nature and extent of school violence was briefly examined within this study to assess the effectiveness of security measures within the schools. It is important for any institution to first examine and identify the specific risks it is facing before those risks can be addressed successfully. Security measures are valuable and helpful resources that can assist in creating safe and secure school environments. As this study highlighted, the more security measures a school had, the safer the scholars and the educators felt and the lower their crime rates appeared to be. / Educational Studies / M. Tech. (Security Management)
706

Kriminologiese analise van sekuriteitrisiko's binne die kommersiële produksiegebied van Transvaal Suiker Beperk

Kruger, Johannes Frederick Eric 30 November 2004 (has links)
This research focusses on crime prevention on farms with Transvaal Sugar Limited as a selected study. The printed media, quantitative and qualitative research principles were used to gather data and to determine to what extend crime is experienced by the respondents. The primary aim of the quantitative research principles is to investigate the nature and extent of crime on the company`s agricultural sites. Existing crime prevention measures on the different agricultural sites are also evaluated and recommendations made where necessary. Interviews with various respondents brought to the fore interesting opinions related to crime based on the empirical-phenomenological method. The support farmers received from the SAPS is discussed in full. The value of the primary physical barriers or obstructions with regard to crime prevention were emphasised in this study. Without the support of conventional electronics, together with the inputs of the human factor, physical crime prevention measures will be of little value, especially on geographical far reached agricultural estates. Farm attacks as a separate phenomenon is part of this study and serves as a comprehensive discussion regarding media reports and previous research on this subject. The ADSC crime prevention model is developed as a result of this study with the aim of contributing to the prevention of crime on farms. Good interpersonal and loyal attitudes are identified as key factors on which the farmers must concentrate in order to prevent crime. / Criminology and Security Science / D. Litt. et Phil.(Criminology)
707

Jewellery store robbery: a victim risk and intervention perspective

Zannoni, Elio 30 April 2008 (has links)
The exploratory study investigated jewellery store robbery from a victim risk and intervention perspective. An explanation of the phenomenon was offered based on the information obtained from a review of the existing literature, case studies, personal observations at jewellery stores, discussions with jewellers, a scientific questionnaire submitted to jewellers, and semi-structured and structured interviews conducted with a group of knowledgeable respondents and victimised jewellers respectively. A predominantly quantitative research method was applied. The research findings obtained during the study enabled a proposal for a jewellery store robbery intervention model based on the situational crime prevention perspective, which is inclusive of decisional, environmental, situational, procedural, personnel and business-oriented strategies. / Criminology and Security Science / M.A. (Criminology)
708

An investigation of safety and security measures at secondary schools in Tshwane, South Africa

Van Jaarsveld, Leandri 11 1900 (has links)
Violence in schools creates a climate of insecurity and fear, which impairs and impacts on the core educational purpose of schools. Accordingly, the main purpose of installing and implementing security measures at schools is to create a safer environment wherein individuals can move freely and feel secure in going about their daily schooling activities. The nature and extent of school violence was briefly examined within this study to assess the effectiveness of security measures within the schools. It is important for any institution to first examine and identify the specific risks it is facing before those risks can be addressed successfully. Security measures are valuable and helpful resources that can assist in creating safe and secure school environments. As this study highlighted, the more security measures a school had, the safer the scholars and the educators felt and the lower their crime rates appeared to be. / Educational Studies / M. Tech. (Security Management)
709

Secure Digital Provenance: Challenges and a New Design

Rangwala, Mohammed M. January 2014 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Derived from the field of art curation, digital provenance is an unforgeable record of a digital object's chain of successive custody and sequence of operations performed on the object. It plays an important role in accessing the trustworthiness of the object, verifying its reliability and conducting audit trails of its lineage. Digital provenance forms an immutable directed acyclic graph (DAG) structure. Since history of an object cannot be changed, once a provenance chain has been created it must be protected in order to guarantee its reliability. Provenance can face attacks against the integrity of records and the confidentiality of user information, making security an important trait required for digital provenance. The digital object and its associated provenance can have different security requirements, and this makes the security of provenance different from that of traditional data. Research on digital provenance has primarily focused on provenance generation, storage and management frameworks in different fields. Security of digital provenance has also gained attention in recent years, particularly as more and more data is migrated in cloud environments which are distributed and are not under the complete control of data owners. However, there still lacks a viable secure digital provenance scheme which can provide comprehensive security for digital provenance, particularly for generic and dynamic ones. In this work, we address two important aspects of secure digital provenance that have not been investigated thoroughly in existing works: 1) capturing the DAG structure of provenance and 2) supporting dynamic information sharing. We propose a scheme that uses signature-based mutual agreements between successive users to clearly delineate the transition of responsibility of the digital object as it is passed along the chain of users. In addition to preserving the properties of confidentiality, immutability and availability for a digital provenance chain, it supports the representation of DAG structures of provenance. Our scheme supports dynamic information sharing scenarios where the sequence of users who have custody of the document is not predetermined. Security analysis and empirical results indicate that our scheme improves the security of the typical secure provenance schemes with comparable performance.
710

Smart card fault attacks on public key and elliptic curve cryptography

Ling, Jie January 2014 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Blömmer, Otto, and Seifert presented a fault attack on elliptic curve scalar multiplication called the Sign Change Attack, which causes a fault that changes the sign of the accumulation point. As the use of a sign bit for an extended integer is highly unlikely, this appears to be a highly selective manipulation of the key stream. In this thesis we describe two plausible fault attacks on a smart card implementation of elliptic curve cryptography. King and Wang designed a new attack called counter fault attack by attacking the scalar multiple of discrete-log cryptosystem. They then successfully generalize this approach to a family of attacks. By implementing King and Wang's scheme on RSA, we successfully attacked RSA keys for a variety of sizes. Further, we generalized the attack model to an attack on any implementation that uses NAF and wNAF key.

Page generated in 0.0447 seconds