• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 279
  • 113
  • 54
  • 46
  • 20
  • 18
  • 7
  • 7
  • 6
  • 5
  • 4
  • 4
  • 4
  • 4
  • 3
  • Tagged with
  • 697
  • 155
  • 139
  • 111
  • 111
  • 102
  • 85
  • 79
  • 68
  • 65
  • 56
  • 56
  • 52
  • 50
  • 49
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Assessing the operational value of situational awareness for AEGIS and Ship Self Defense System (SSDS) platforms through the application of the Knowledge Value Added (KVA) methodology

Uchytil, Joseph. 06 1900 (has links)
As the United States Navy strives to attain a myriad of situational awareness systems that provide the functionality and interoperability required for future missions, the fundamental idea of open architecture is beginning to promulgate throughout the Department. In order to make rational, informed decisions concerning the processes and systems that will be integrated to provide this situational awareness, an analytical method must be used to identify process deficiencies and produce quantifiable measurement indicators. This thesis will apply the Knowledge Value Added methodology to the current processes involved in track management aboard the AEGIS and Ship Self Defense System (SSDS) platforms. Additional analysis will be conducted based on notional changes that could occur were the systems designed using an open architecture approach. A valuation based on knowledge assets will be presented in order to.
72

Staying in the zone : offshore drillers' situation awareness

Roberts, Ruby Clyde January 2015 (has links)
No description available.
73

Collaborative cyber security situational awareness

Almualla, Mohammed Humaid January 2017 (has links)
Situational awareness is often understood as the perception of environmental elements and comprehension of their meaning, and the projection of future status. The advancements in cyberspace technology have fuelled new business and opportunities, but also brought an element of risk to valued assets. Today, the growing gap between different types of cyber-attacks threatens governments and organisations, from individuals to highly organized sponsored teams capable of breaching the most sophisticated systems and the inability to cope with these emerging threats. There is a strong case to be made for effective Collaborative Cyber-Security Situational Awareness (CCSA) that is designed to protect valuable assets, making them more resilient to cybersecurity threats. Cybersecurity experts today must rethink the nature of security, and shift from a conventional approach that stresses protecting vulnerable assets to a larger, more effective framework with the aim of strengthening cyber assets, making them more resilient and part of a cybersecurity process that delivers greater value against cyber threats. This study introduces a new approach to understanding situational awareness of information sharing and collaboration using knowledge from existing situational awareness models. However, current situational awareness models lack resilience in supporting information systems infrastructure, addressing various vulnerabilities, identifying high priority threats and selecting mitigation techniques for cyber threats. The use of exploratory and explanatory analysis techniques executed by Structure Equation Modelling (SEM) allowed the examination of CCSA, in this study. Data from 377 cyber security practitioners affiliated to cybersecurity expert groups including computer emergency response team (CERT) and computer security incident response team (CSIRT) was gathered in the form of an electronic survey and analysed to discover insights and understand the mental model of those cybersecurity experts. Also, a finding from the SEM was the CSSA model aligned perfectly with the second-order Cybernetics model to test the theory in practice, confirming the possibility of using the proposed model in a practical application for this research. Furthermore, the SEM informed the design of the CCSA Environment where an empirical study was employed to verify and validate the CCSA theory in practice. In addition, the SEM informed the design of a behavioural anchor rating scale to measure participant situational awareness performance. The experiment results proved that when using the CCSA model and replicating real-world cyber-attack scenarios that the outcome of situational awareness performance was 61% more than those who did not employ the use of the CCSA model and associated dashboard tool. Further, it was found that both timeliness and accuracy are important in influencing the outcome of information sharing and collaboration in enhancing cyber situational awareness and decision-making. This thesis for the first time presents a novel CCSA theory which has been confirmed in practice. Firstly, this research work improves the outcome of effectiveness in cyber SA by identifying important variables related with the CCSA model. Second, it provides a new technique to measure operators' cyber SA performance. Secondly, it provides the necessary steps to employ information sharing in order to improve cyber security incorporated in the CCSA model. Finally, cybersecurity experts should collaborate to identify and close the gap between cybersecurity threats and execution capacity. The novel CCSA model validated in this research can be considered an effective solution in fighting and preventing cyber-attacks. Attainment of cyber security is driven by how information is both secured and presented between members to encourage the use of information sharing and collaboration to resolve cyber security threats in a timely and accurate manner. This research helps researchers and practitioners alike gain an understanding of key aspects of information sharing and collaboration in CSSA which is informed by the CCSA theory and new capability that the implementation of this theory has shown to deliver in practice.
74

Analýza dopadů legislativních restrikcí na tabákové společnosti a trh v ČR / Marketing enviroment and the introduction of new brands

Poul, Jaroslav January 2011 (has links)
The aim is to provide a comprehensive view of the market of tobacco products. Focus is mainly on cigarette market, where I will zoom on the possibilities of DanCzek Teplice a.s., which is supplier of own brand cigarettes. Seeking answers to questions that will help company gain competitive advantage through creative solutions. The work includes a situation analysis, segmentation of target group customers, own recommendations to marketing activities. All advices must compete in real market enviroment and comply with legislative requirements.
75

Enhancing situational awareness in highly automated vehicles through driver monitoring

Kashef, Omeed 01 August 2019 (has links)
With the development of level 3 AVs, drivers can now disengage from the driving task for extended periods of time. However, drivers are still responsible for the overall safety of their drive. Moreover, when drivers are not engaged in their monitoring task, they lose situational awareness. This leaves drivers vulnerable when they have to retake control from the AV. This research looks to advance the development of camera-based driver monitoring systems that measure situational awareness. In addition, this research examines the effect of adaptable warning systems on driver situational awareness and takeover performance. In this study, we use situational awareness as ground truth to compare adaptable warning systems that reengage drivers in the monitoring task. Camera-based driver monitoring systems that measure gaze behavior can be used to adapt warning systems. Twenty-four participants split into three groups were asked to drive for approximately 40 miles in a level 3 AV simulator while completing a visual-manual secondary task. During the drive, participants experienced four events in which they had to disengage from the secondary task and take back control from the AV. Two interface designs based on gaze behavior were compared to a baseline warning system. The Attentional Maintenance group was given an alert throughout the drive after a fixed amount of time in which their gaze was directed away from the road. The State-Contingent Takeover group was given an alert only before takeover events after a fixed amount of time in which their gaze was directed away from the road. Results show that attentional maintenance alerts can increase situational awareness and takeover response time during automation failure. Future research to increase situational awareness is discussed in terms of advancements in cognitive control and bilateral communication between the driver and the AV.
76

A situational analysis of institutional intersectionality and violence against women in Dar es Salaam

January 2019 (has links)
archives@tulane.edu / Violence against women (VAW) knows no demographic boundaries, is one of the most oppressive forms of gender inequality, and is recognized by some as an impediment to the social and economic development of under-resourced communities. Tanzanian leaders’ goal of achieving middle-income status by 2025 is reviewed against the institutional policies and practices designed to address the violence women of Dar es Salaam experience and ask if VAW is a serious threat to Tanzania’s achievement of middle-income status? This question was answered by conducting a situational analysis of the international, regional, national, and local actors and their engagement with customary and statutory laws, human rights instruments, judicial activities, donor relationships, and NGO-driven activism. Large scale events like the annual “16 Days of Activism against Violence Against Women” (16 Days) and TGNP’s bi¬annual Gender Festival provided opportunities to collect data from local activities and policy discussions for addressing VAW in Dar es Salaam. Subsequent interviews and conversations with respondents, reviews of government and I/NGO reports, data from the 2015 presidential election, and legal decisions from the High Court further augmented the initial data collection. This research highlighted these key findings: (1) there is a dearth of research on the applicability of intersectionality methods and theory to institutions and organizations generally and in Tanzania specifically; (2) customary laws and traditions impact international and national laws beyond rural concerns and impedes progressive law reform as it is still filtered through culture and customs; (3) VAW remains firmly entrenched in familiar, community, and political systems that were built on patriarchal (and postcolonial) foundations; and (4) efforts to achieve middle-income status continue apart from the need to address VAW and other adverse consequences of a society still influenced by customary laws and traditions derived from patriarchal systems. / 1 / M Denise Miles-Francois
77

CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?

Chavez, Nicholas Marshall 01 June 2018 (has links)
This project examines the protection methods suggested by hackers to guard against online victimization through the lens of Situation Crime Prevention. Data were collected from 85 webpages representing three categories of electronic communications: forums, blogs, and fan pages. The goal of this project was to identify which of the 25 opportunity reduction techniques the hacking community recommend most often, as well as, what level of expertise was associated with the suggested security measures. Results indicate that the technique most recommended by the hacking community was to remove targets with 27% of the total codings. From the results three themes were found: (1) most recommendations are such that implementing the strategies would serve to protect against opportunistic, low-skilled attacks; (2) most recommendations could be considered routine precautions, that when bundled, would secure most people against cyber-theft; and finally, (3) the Situational Crime Prevention framework was not fully realized because much of cyber-theft does not involve direct victim-perpetrator interactions. From these three themes policy recommendation and limitations are presented as well as avenues for future research.
78

Climate Change, Situational Theory of Problem Solving, and Issue Framing Effects

Burch, Michael Eddie 06 November 2014 (has links)
This is an exploratory study of the Situational Theory of Problem Solving applied to the context of climate change communication. Selective exposure to politically slanted media is explored as a referent criterion and framing effects are also tested. Relationships between consumption of media characterized as conservative or liberal with referent criterion, Situational Motivation in Problem Solving, problem recognition, involvement recognition, and constraint recognition are tested.
79

The Invention of Lying (at Work): The Development and Validation of a Situational Judgment

Conway, Jeffrey S. 05 June 2014 (has links)
The focus of the current dissertation was on the construction and validation of a situational judgment test (SJT) assessing lying/dishonesty in the workplace. The scale was designed to have two dimensions corresponding to two needs based on Socioanalytic Theory: (1) the need to get along and (2) the need to get ahead. Three studies were undertaken in order to create items, pilot test items, and assess both the construct and criterion-related validity of the scale. The result of Study 1 was a pilot-tested scale with six SJT items corresponding to each of the two SJT dimension (12 items total). The dimensions of the new SJT are referred to in the paper as LAl (lying to get along) and LAh (lying to get ahead). Study 2 examined convergent and discriminant validity as well as the nomological network of other individual difference variables expected to be related to LAl and/or LAh. The results of Study 2 largely supported the construct validity of the overall scale but many of the personality constructs based on the Five Factor Model (FFM) were not related to LAl or LAh. In Study 3, LAl and LAh were unrelated to several aspects of supervisor rated performance as well turnover intentions and objective career outcomes (e.g., promotions). The primary contribution of the dissertation was the creation of a construct valid SJT measuring lying in organizations whose dimensions could be assessed reliably using coefficient alpha as opposed to test-retest reliability. Future research directions and limitations of the study are discussed in the final section of the dissertation.
80

New approaches to measuring emotional intelligence

MacCann, Carolyn Elizabeth January 2006 (has links)
Doctor of Philosophy (PhD) / New scoring and test construction methods for emotional intelligence (EI) are suggested as alternatives for current practice, where most tests are scored by group judgment and are in ratings-based format. Both the ratings-based format and the proportion-based scores resulting from group judgments may act as method effects, obscuring relationships between EI tests, and between EI and intelligence. In addition, scoring based on standards rather than group judgments add clarity to the meaning of test scores. For these reasons, two new measures of emotional intelligence (EI) are constructed: (1) the Situational Test of Emotional Understanding (STEU); and (2) the Situational Test of Emotion Management (STEM). Following test construction, validity evidence is collected from four multi-variate studies. The STEU’s items and a standards-based scoring system are developed according to empirically derived appraisal theory concerning the structure of emotion [Roseman, 2001]. The STEM is developed as a Situational Judgment Test (SJT) with situations representing sadness, fear and anger in work life and personal life settings. Two qualitative studies form the basis for the STEM’s item development: (1) content analysis of responses to semi-structured interviews with 31 psychology undergraduates and 19 community volunteers; and (2) content analysis of free responses to targeted vignettes created from these semi-structured interviews (N = 99). The STEM may be scored according to two expert panels of emotions researchers, psychologists, therapists and life coaches (N = 12 and N = 6). In the first multi-variate study (N = 207 psychology undergraduates), both STEU and STEM scores relate strongly to vocabulary test scores and moderately to Agreeableness but no other dimension from the five-factor model of personality. STEU scores predict psychology grade and an emotionally-oriented thinking style after controlling vocabulary and personality test scores (ΔR2 = .08 and .06 respectively). STEM scores did not predict academic achievement but did predict emotionally-oriented thinking and life satisfaction (ΔR2 = .07 and .05 for emotionally-oriented thinking and .04 for life satisfaction). In the second multi-variate study, STEU scores predict lower levels of state anxiety, and STEM scores predict lower levels of state anxiety, depression, and stress among 149 community volunteers from Sydney, Australia. In the third multi-variate study (N = 181 psychology undergraduates), Strategic EI, fluid intelligence (Gf) and crystallized intelligence (Gc) were each measured with three indicators, allowing these constructs to be assessed at the latent variable level. Nested structural equation models show that Strategic EI and Gc form separate latent factors (Δχ2(1) = 12.44, p < .001). However, these factors relate very strongly (r = .73), indicating that Strategic EI may be a primary mental ability underlying Gc. In this study, STEM scores relate to emotionally-oriented thinking but not loneliness, life satisfaction or state stress, and STEU scores do not relate to any of these. STEM scores are significantly and meaningfully higher for females (d = .80), irrespective of gender differences in verbal ability or personality, or whether expert scores are derived from male or female experts. The fourth multi-variate study (N = 118 psychology undergraduates) distinguishes an EI latent factor (indicated by scores on the STEU, STEM and two emotion recognition ability measures) from a general cognitive ability factor (indicated by three intelligence measures; Δχ2(1) = 10.49, p < .001), although again cognitive ability and EI factors were strongly related (r = .66). Again, STEM scores were significantly higher for females (d = .44) and both STEU and STEM relate to Agreeableness but not to any other dimension from the five-factor model of personality. Taken together, results suggest that: (1) STEU and STEM scores are reasonably reliable and valid tests of EI; (2) EI tests assess slightly different constructs to existing measures of Gc, but more likely form a new primary mental ability within Gc than an entirely separate construct; and (3) the female superiority for EI tests may prove useful for addressing adverse impact in applied settings (e.g., selection for employment, promotion or educational opportunities), particularly given that many current assessment tools result in a male advantage.

Page generated in 0.0938 seconds