• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 433
  • 38
  • 35
  • 29
  • 19
  • 11
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 4
  • 4
  • Tagged with
  • 757
  • 757
  • 464
  • 347
  • 184
  • 182
  • 159
  • 122
  • 112
  • 112
  • 108
  • 103
  • 100
  • 86
  • 84
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
721

The role of inventory control in service quality in a South African academic library

Retief, Esther 30 June 2005 (has links)
Service quality has always been a tacit assumption within the delivery of academic library services, but since the 1990s demands for accountability from different stakeholders, including the clients, made service quality a highly debated and researched focus in academic libraries all over the world. The scope of the study covers a wide-ranging analysis of discourses underpinning service quality and its accompanying performance indicators in academic libraries. Using the academic library of the University of South Africa as an illustrative case study, this study examines the possible impact of inventory control on the service quality of the academic library in three areas, namely access to information resources, retrieval of information resources and positive implications for sound financial management. The study's findings all point to a positive enhancement of service quality in regard to the three areas mentioned. / Information Science / M. Inf.
722

A risk based approach for managing information technology security risk within a dynamic environment

Mahopo, Ntombizodwa Bessy 11 1900 (has links)
Information technology (IT) security, which is concerned with protecting the confidentiality, integrity and availability of information technology assets, inherently possesses a significant amount of known and unknown risks. The need to manage IT security risk is regarded as an important aspect in the daily operations within organisations. IT security risk management has gained considerable attention over the past decade due to the collapse of some large organisations in the world. Previous investigative research in the field of IT security has indicated that despite the efforts that organisations use to reduce IT security risks, the trend of IT security attacks is still increasing. One of the contributing factors to poor management of IT security risk is attributed to the fact that IT security risk management is often left to the technical security technologists who do not necessarily employ formal risk management tools and reasoning. For this reason, organisations find themselves in a position where they do not have the correct approach to identify, assess and treat IT security risks. The IT security discipline is complex in nature and requires specialised skills. Organisations generally struggle to find a combination of IT security and risk management skills in corporate markets. The scarcity of skills leaves organisations with either IT security technologists who do not apply risk management principles to manage IT security risk or risk management specialists who do not understand IT security in order to manage IT security risk. Furthermore, IT is dynamic in nature and introduces new threats and vulnerabilities as it evolves. Taking a look at the development of personal computers over the past 20 years is indicative of how change has been constant in this field, from big desktop computers to small mobile computing devices found today. The requirement to protect IT against threats associated with desktops was far less than the requirement associated with protecting mobile devices. There is pressure for organisations to ensure that they stay abreast with the current technology and associated risks. Failure to understand and manage IT security risk is often cited as a major cause of concern within most organisations’ IT environments because comprehensive approaches to identify, assess and treat IT security risk are not consistently applied. This is due to the fact that the trend of IT security attacks across the globe is on the increase, resulting in gaps when managing IT security risk. Employing a formal risk based approach in managing IT security risk ensures that risks of importance to an organisation are accounted for and receive the correct level of attention. Defining an approach of how IT security risk is managed should be seen as a fundamental task and is the basis of this research. This study aims to contribute to the field of IT security by developing an approach that assists organisations in treating IT security risk more effectively. This is achieved through the use of a combination of existing best practice IT security frameworks and standards principles, basic risk management principles, as well as existing threat modelling processes. The approach developed in this study serves to encourage formal IT security risk management practices within organisations to ensure that IT security risk is accounted for by senior leadership. Furthermore, the approach is anticipated to be more proactive and iterative in nature to ensure that external factors that influence the increasing trend of IT security threats within the IT environment are acknowledged by organisations as technology evolves. / Computing / M. Sc. (Computing)
723

Assessing security measures at hotels : a case study from Gauteng

Cebekhulu, Nomsa Pride 09 1900 (has links)
This study is about assessing security measures in the hotel industry in Gauteng Province, South Africa. The researcher divided Gauteng into five regions (Mogale City; Tshwane; Central Johannesburg; Ekurhuleni; and Sedibeng). The researcher adopted the qualitative approach where one-on-one interviews were conducted with the participants. There were 20 hotels that were selected to participate in the study. From the 20 hotels, where only one participant from each was involved, the researcher conducted one-on-one interviews with twenty (20) Security Managers or anybody who was responsible for the security functions at senior level at the hotels. A semi-structured interview schedule with probing questions was used as a guide to obtain comprehensive information about security measures from the participants. Random sampling approach was used in the study. From the population of 70 hotels in Gauteng, where the sample of twenty (20) was derived, was the group within which the researcher was interested in for obtaining data. Since Gauteng Province is huge, the researcher only conducted research within the four metropolitan areas consisting of Johannesburg, Mogale City, Tshwane and Ekurhuleni. The aims and objectives of the research study are as follows: • Outline the nature of business that hotels are engaged in; • Investigate if there are security policies and procedures as part of effective security component; • Examine what important assets need to be protected at hotel facilities; • Uncover the risks facing assets in the hotel facilities; • Determine what incidents of loss took place in the hotel facilities; • Examine what assets are mainly targeted by perpetrators at hotels; • Uncover the profile and modus operandi of hotel perpetrators; • Examine the effectiveness of security measures and systems that are put in place at hotels; • Explore if security systems are integrated at hotels; • Determine the frequency of conducting risk assessment at hotels; • Check if pre and post-employment screening is conducted for security officers at hotels; • Find out if the guests inquire about security measures when making reservations; and • Find out how guests feel about security at the hotel facilities. The study revealed the following: • Hotels are business entities which attract different types of guests, nationally and internationally. Different services that are offered at the hotels which make hotels the main choice of destination to the guests are: accommodation for sleeping, leisure, and work commitments such as workshops or conferences. The study also revealed that most of the clientele comes from the corporate sector. • There are basic security measures in place in the hotels. These range from security policies, security procedures, physical security (for example, technological security such as Close Circuit Television (CCTV) surveillance system, adequate security lighting, security personnel (contract or in-house), alarm systems, armed response, access control systems and security fence or walls). The security measures were also appeared to be put in place in accordance with the location of the hotel. If the hotel was surrounded by other business areas, the level of security was more focused in the inner security layer. If the hotel was standing alone, the different security layers (the inner security layer, the outer and the middle security layers) were adequately protected. • Hotels are faced with different risks such as theft, prostitution, murder and assault, among others. Theft however was found to be across the board; for example, people were stealing the hoteliers’ property or the guests’ property. • Prostitution was found to be prevalent at hotels. Prominent people from political arena, corporate environment and other guests were interested in the prostitutes. Prostitutes were said to have their own modus operandi of using drugs to their prospective clients and then rob them of their money and belongings thereafter. • Most of the assets which are targeted by hotel perpetrators were found to be: guests/hotel money, hotel goods, guests’ cars, goods in guests’ cars, televisions, home music systems and mobile devices such as laptops and cell phones. • The profile and modus operandi of hotel perpetrators. • Security assessments are conducted at hotels so as to figure out what security risks are facing the hotels. • Hotels need to be protected at all times against criminality as it tarnishes their image. • Most of the guests do enquire about the safety of the hotel before making a booking. Some of the guests mainly from the corporate sector do send their security specialists to assess the level of security at the hotel prior to making a booking. As the findings on this study were based on aims and objectives, recommendations for crime combating, proactive protection and future research were identified. The recommendations will, hopefully, also improve any inadequate security measures that may have been revealed by the study. / Criminology and Security Science / M.A. (Criminal Justice)
724

The investigative methodology to initiate internal investigations in the South African corporate environment

Ferreira, De Wet 07 1900 (has links)
Conducting internal investigations in the corporate environment in South Africa has become an everyday occurrence where companies need to take action after an incident took place. Each company has a different view regarding their processes followed when investigating internal matters, and the different objectives that drive the process. Some companies would prefer the suspects be disciplined and removed from their employment, and no further action taken after the dismissal and some companies would have a different approach and would follow the process through the disciplinary, the criminal prosecution and institute civil litigation to recover losses. Investigation differs, and the approach would be different as well with various reasons for the approach of the company. To establish what the methodology is that is followed when initiating an internal investigation and the drive behind the methodology followed was done. The methodology and process followed determines how the internal investigation process is done and concluded to ensure that similar incidents do not occur again, and thus protect the corporate environment in South Africa. / Police Practice / M. Tech. (Forensic Investigation)
725

The law of data (privacy) protection: a comparative and theoretical study

Roos, Anneliese 31 October 2003 (has links)
In present-day society more and more personal information is being collected. The nature of the collection has also changed: more sensitive and potentially prejudicial information is collected. The advent of computers and the development of new telecommunications technology, linking computers in networks (principally the Internet) and enabling the transfer of information between computer systems, have made information increasingly important, and boosted the collection and use of personal information. The risks inherent in the processing of personal information are that the data may be inaccurate, incomplete or irrelevant, accessed or disclosed without authorisation, used for a purpose other than that for which they were collected, or destroyed. The processing of personal information poses a threat to a person's right to privacy. The right to identity is also infringed when incorrect or misleading information relating to a person is processed. In response to the problem of the invasion of the right to privacy by the processing of personal information, many countries have adopted "data protection" laws. Since the common law in South Africa does not provide adequate protection for personal data, data protection legislation is also required. This study is undertaken from a private law perspective. However, since privacy is also protected as a fundamental right, the influence of constitutional law on data protection is also considered. After analysing different foreign data protection laws and legal instruments, a set of core data protection principles is identified. In addition, certain general legal principles that should form the basis of any statutory data protection legislation in South Africa are proposed. Following an analysis of the theoretical basis for data protection in South African private law, the current position as regards data protection in South-Africa is analysed and measured against the principles identified. The conclusion arrived at is that the current South African acts can all be considered to be steps in the right direction, but not complete solutions. Further legislation incorporating internationally accepted data protection principles is therefore necessary. The elements that should be incorporated in a data protection regime are discussed. / Jurisprudence / LL. D. (Jurisprudence)
726

Improving the adoption of cloud computing by small & medium scale enterprise (SMEs) in Nigeria

Young, Destiny Assian 08 1900 (has links)
In a traditional business environment, companies set up their organisation’s IT data infrastructure, install their applications and carry out the maintenance and management of their infrastructures. Whereas Cloud computing removes the need for companies to set up own data centers and run enterprise applications. Cloud computing technology provides businesses with the advantage of on-demand access, agility, scalability, flexibility and reduced cost of computing. An appreciable increase is being observed in the acceptance and migration to this new IT model in developing economies. In Nigeria, it has been observed that there is a somewhat unimpressive rate of adoption of Cloud computing by the microfinance operators. This research investigates the reason for the slow adoption of Cloud computing by SMEs in Nigeria with special consideration to the Microfinance subsector and to develop a model for improving the adoption of cloud computing by microfinance organisations. The research was conducted using a qualitative research design method. Interview was the main data collection instrument and data collected was analysed using thematic content analysis method. The analysis of the study revealed that SMEs in Nigeria, with particular reference to microfinance subsector in Akwa Ibom State are yet fully to embrace cloud technology. It was discovered that most of the SMEs studied, has some level of reservation about cloud computing arising from not having appropriate education and enlightenment about the cloud economic offerings and potentials. From the outcome of the research, the researcher identified that most people’s concerns are as a result of lack of knowledge about cloud computing and so the researcher concluded that appropriate enlightenment by industry stakeholders, cloud service providers, cloud enthusiasts and even the government on the risks and overwhelming economic incentives of cloud computing as well as the provision of a monitored free trial services will encourage the adoption of cloud computing by SMEs. / College of Engineering, Science and Technology / M.Tech. (Information Technology)
727

E-crimes and e-authentication - a legal perspective

Njotini, Mzukisi Niven 27 October 2016 (has links)
E-crimes continue to generate grave challenges to the ICT regulatory agenda. Because e-crimes involve a wrongful appropriation of information online, it is enquired whether information is property which is capable of being stolen. This then requires an investigation to be made of the law of property. The basis for this scrutiny is to establish if information is property for purposes of the law. Following a study of the Roman-Dutch law approach to property, it is argued that the emergence of an information society makes real rights in information possible. This is the position because information is one of the indispensable assets of an information society. Given the fact that information can be the object of property, its position in the law of theft is investigated. This study is followed by an examination of the conventional risks that ICTs generate. For example, a risk exists that ICTs may be used as the object of e-crimes. Furthermore, there is a risk that ICTs may become a tool in order to appropriate information unlawfully. Accordingly, the scale and impact of e-crimes is more than those of the offline crimes, for example theft or fraud. The severe challenges that ICTs pose to an information society are likely to continue if clarity is not sought regarding: whether ICTs can be regulated or not, if ICTs can be regulated, how should an ICT regulatory framework be structured? A study of the law and regulation for regulatory purposes reveals that ICTs are spheres where regulations apply or should apply. However, better regulations are appropriate in dealing with the dynamics of these technologies. Smart-regulations, meta-regulations or reflexive regulations, self-regulations and co-regulations are concepts that support better regulations. Better regulations enjoin the regulatory industries, for example the state, businesses and computer users to be involved in establishing ICT regulations. These ICT regulations should specifically be in keeping with the existing e-authentication measures. Furthermore, the codes-based theory, the Danger or Artificial Immune Systems (the AIS) theory, the Systems theory and the Good Regulator Theorem ought to inform ICT regulations. The basis for all this should be to establish a holistic approach to e-authentication. This approach must conform to the Precautionary Approach to E-Authentication or PAEA. PAEA accepts the importance of legal rules in the ICT regulatory agenda. However, it argues that flexible regulations could provide a suitable framework within which ICTs and the ICT risks are controlled. In addition, PAEA submit that a state should not be the single role-player in ICT regulations. Social norms, the market and nature or architecture of the technology to be regulated are also fundamental to the ICT regulatory agenda. / Jurisprudence / LL. D.
728

Análise dos riscos e efeitos nocivos do uso da internet: contribuições para uma política pública de proteção da criança e do adolescente na era digital / Analysis of the risks and harmful effects of internet use: contributions to public policy child protection and adolescents in the digital age

Tono, Cineiva Campoli Paulino 10 April 2015 (has links)
O uso da internet e jogos eletrônicos online, em desarmonia com as demais atividades humanas, independentemente do dispositivo tecnológico para acesso, pode se tornar um vício e produzir efeitos nocivos em vários aspectos da vida dos usuários, potencializados quando os usuários são crianças e adolescentes, pessoas em fase especial de desenvolvimento biopsicossocial. O foco da investigação em pauta foi a análise dos riscos e danos do vício em internet, pressupondo a proteção integral das crianças e dos adolescentes nos aspectos de educação, saúde e segurança. Para tanto, buscou-se referências teóricas em artigos científicos no âmbito mundial, evidências empíricas em pesquisas de campo com adolescentes e no Programa de Pais de Dependentes de Internet do Ambulatório de Transtorno de Impulso do Instituto de Psiquiatria da Universidade de São Paulo. Como as crianças e os adolescentes são sujeitos de direito, com prioridade absoluta de proteção, sentiu-se a necessidade de haver uma intervenção e, para isso, foram propostos conteúdos e metodologias de planejamento de políticas de prevenção a esses riscos e danos, elaborados de forma interinstitucional e interdisciplinar. O método científico utilizado foi o de pesquisa-ação política, socialmente crítica e intervencionista. Para fundamentação teórica, buscaram-se subsídios na análise crítica do determinismo tecnológico e dos riscos envolvidos com a concepção e uso das tecnologias de Feenberg (1991), Giddens (1991), Marcuse (1999), Lima Filho (2005), Setzer (2002), Armstrong e Casement (2001), Smith (2009), entre outros. O trabalho de pesquisa utilizou documentos de base legal, com amparo na Declaração Universal dos Direitos Humanos (1948), na Constituição da República Federativa do Brasil (1988) e no Estatuto da Criança e do Adolescente (1990), os quais priorizam, em termos absolutos, as crianças e os adolescentes na formulação e na gestão de políticas públicas para todas as esferas de execução. Nas fases de observação, diagnose e primeiros registros, a pesquisa partiu da preocupação sobre a fala dos adolescentes de duas escolas públicas de Curitiba, em 2009, quando o problema dessa tese foi delineado riscos e efeitos nocivos da adição à internet e em jogos eletrônicos online. Para a fase de intervenção da pesquisa foi elaborado um plano de ação com foco no eixo de “Tecnologia e Dignidade Humana”, desenvolvido durante as onze audiências públicas no Estado do Paraná, coordenadas pela autora, articuladas ao Projeto UFPR Unindo Talentos com apoio da CAPES, contemplando conteúdos estruturantes para elaboração de uma política pública de prevenção ao vício na internet e, sobretudo, da internet gaming disorder, distúrbio mental previsto pela Associação Americana de Psiquiatria na quinta edição do Diagnostical and Statistical Manual of Disorder (DSM V), de maio de 2013. Desse trabalho resultaram contribuições à elaboração do eixo “Tecnologia e Dignidade Humana” da primeira edição do Plano Estadual de Educação em Direitos Humanos do Paraná (PEEDH/PR). / The use of internet and on-line video games, in harmony with other human activities, irrespective of the technological device to access, can be addictive and cause adverse effects in various aspects of life of users, potentiated when the users are children and adolescents people in particular phase of biopsychosocial development. The focus of research on the agenda was the analysis of the risks and vice damage, assuming the full protection of children and adolescents in the aspects of education, health and security. Therefore, we sought theoretical references in scientific papers at the global level, empirical evidence on field research with adolescents, and internet Dependent Parent Program Dependence Center for the Impulse Disorder Clinic at the Institute of Psychiatry, University of São Paulo. As children and adolescents are subjects of rights, with priority protection, felt the need for an intervention, and for this have been proposed content and planning methodologies prevention policies to such risks and damage, prepared in inter-institutional and interdisciplinary way. The scientific method used was the policy action research, socially critical and interventionist. For theoretical foundation sought to subsidies in the critical analysis of technological determinism and the risks involved with the design and use of technologies Feenberg (1991), Giddens (1991), Marcuse (1999), Lima Filho (2004, 2005), Andrade (2004) Setzer (2002, 2009), Armstrong and Casement (2001), Smith (2009), among others. The research used a legal basis documents, with support in the Universal Declaration of Human Rights (1948), the Constitution of the Federative Republic of Brazil (1988) and the Statute of Children and Adolescents (1990), who prioritize in terms absolute, children and adolescents in the design and management of public policies for all enforcement spheres. In phases of observation, diagnosis and first records research came from concern about the speech of adolescents from two public schools in Curitiba, in 2009, when the problem of this thesis was designed, the risks and harmful effects of adding internet and electronic games on-line. For the research intervention phase was prepared an action plan in inter-institutional focused on the “Technology and Human Dignity” axis developed in the eleven public hearings in the State of Paraná, coordinated by the author, contemplating structuring content for development of policy public prevention addiction on the Internet, and especially the internet gaming disorder, mental disorder provided by the American Psychiatric Association in the fifth edition of Diagnostical and Statistical Manual of Disorder (DSM V), May 2013. This work resulted in important contributions to the development axis “Technology and Human Dignity” of the first edition of the State Plan for Education in Human Rights of Paraná (PEEDH / PR).
729

The penalty: function and requirements / La pena: función y presupuestos

Meini Méndez, Iván Fabio 10 April 2018 (has links)
Legitimacy of criminal sanction is originated on its own purposes pursued in a state governed by the Rule of Law. That legitimacy should include the penalty as well as security measures, bearing in mind that both are imposed to someone breaking a rule of conduct, and therefore, someone capable to do it. Reviewing penal capacity or criminal liability concepts is required because if penal capacity means the capacity to understand the reality and adjust the behavior to it, and if every legitimate criminal sanction have to be imposed to someone who have the capacity of break it, then security measures also have to be imposed only to people responsible, capable to understand rules and act in accordance. With regard to people not subject to criminal liability they are standing outside Criminal Law and punish them would be illegitimate. In this line, criminal liability should be seen not only as a crime assumption but also as a basic statement for any dialogue the state shall have with the citizens: at the level of crime itself, proceedings and sentence execution . / La legitimación de la sanción penal se deriva de los fines que persigue en un Estado de derecho. Dicha legitimación debe abarcar tanto a la pena como a la medida de seguridad, y tener en cuenta que tanto la pena como la medida de seguridad se imponen a quien infringe una norma de conducta y, por tanto, a quien tiene capacidad para infringirla. Esto presupone revisar el concepto de capacidad penal o imputabilidad,pues si imputabilidad es capacidad para comprender la realidad y adecuar el comportamiento a dicha comprensión, y toda sanción penal legítima ha de imponerse a quien tiene dicha capacidad, también las medidas de seguridad han de ser impuestas solo a imputables. Los verdaderos inimputables son aquellos que están al margen del derecho penal y a quienes resulta ilegítimo imponer alguna sanción. En esta línea, la imputabilidad ha de ser vista no solo como presupuesto del delito, sino como presupuesto de cualquier diálogo que tenga el Estado con el ciudadano con respecto al delito, al proceso y a la ejecución de la pena.
730

Proposta de implementação de uma arquitetura para a Internet de nova geração / An implementation proposal of a next generation internet architecture

Wong, Walter 07 November 2007 (has links)
Orientadores: Mauricio Ferreira Magalhães, Fabio Luciano Verdi / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e Computação / Made available in DSpace on 2018-08-09T14:41:11Z (GMT). No. of bitstreams: 1 Wong_Walter_M.pdf: 1265045 bytes, checksum: 15a2435e5676b973ffe726e4757323e4 (MD5) Previous issue date: 2007 / Resumo: A concepção original da arquitetura da Internet foi baseada em uma rede fixa e confiável. Hoje em dia, a Internet se tornou dinâmica e vulnerável aos ataques de segurança. Também não era prevista a necessidade de integração de tecnologias heterogêneas nem de ambientes sem fio. A arquitetura atual apresenta uma série de barreiras técnicas para prover estes serviços, sendo uma das maiores a sobrecarga semântica do Internet Protocol (IP). O endereço IP atua como localizador na camada de rede e como identificador na camada de transporte, impossibilitando novas funcionalidades como a mobilidade e abrindo brechas de segurança. Este trabalho apresenta uma proposta de implementação de uma arquitetura para Internet de nova geração para o provisionamento de novos serviços de forma natural e integrada para a Internet atual. A proposta de arquitetura de implementação oferece suporte à mobilidade, ao multihoming, à segurança, à integração de redes heterogêneas e às aplicações legadas através da introdução de uma nova camada de identificação na arquitetura atual. Esta nova camada tem por objetivo separar a identidade da localização e se tornar uma opção de comunicação para as redes heterogêneas. Mecanismos adicionais foram propostos para prover o suporte às funcionalidades da arquitetura, tais como a resolução de nomes em identificadores, o roteamento baseado no identificador, a gerência de localização e um plano de controle para a troca de mensagens de sinalização fim-a-fim entre os componentes da arquitetura. Para a validação da arquitetura proposta, um protótipo foi implementado e vários testes de desempenho foram realizados para avaliação do overhead da implementação, do modelo de segurança, da robustez e do suporte à mobilidade e às aplicações legadas / Abstract: The original concept of the Internet architecture was based on static and reliable networks. Nowadays, the Internet became more dynamic and vulnerable to security attacks. The integration of heterogeneous technologies and wireless environment were not predicted. The current architecture presents some technical barriers to provide these services. One of these problems is the semantic overload of the Internet Protocol (IP). The IP address acts as locator in the network layer and identifier in the transport layer, preventing new features such as mobility and allowing security flaws. This work presents an implementation proposal of a next generation Internet architecture to provide new services naturally integrated to the Internet. The implementation proposal supports mobility, multihoming, security, heterogeneous networks integration and legacy applications by the introduction of a new identification layer in the current architecture. This new layer will separate the identity from the location and become an option for communication between heterogeneous networks. Additional mechanisms were proposed to support the new functionalities of the architecture, e.g., resolution of names to identifiers, identifier-based routing, location management and a control plane to exchange end-toend signalling control messages between the components of the architecture. In order to evaluate the proposed architecture, a prototype was implemented and some tests were performed considering implementation overhead, security model, robustness and support for mobility and legacy applications / Mestrado / Engenharia de Computação / Mestre em Engenharia Elétrica

Page generated in 0.0834 seconds